CentOs – The Rise and Fall

CentOs – The Rise and Fall

CentOS – The Rise and Fall Originally created from Red Hat’s Source Code, CentOS offered a free alternative for many startup businesses and was widely adopted by many who would ultimately trade up to ‘full fat’ Red Hat Enterprise. CentOS (or...
Phishing along the Amazon

Phishing along the Amazon

Important Security Scam   No matter how much you try to limit the number of people that know your email address, eventually it will become far more public than you ever intended it to be. Suddenly, you will start to receive the attention of scumbags and chancers,...
Hi, your account has been infected!

Hi, your account has been infected!

Hi, your account has been infected! Before you start to panic because you just received an email saying your account has been hacked, a word of advice… it’s almost certainly a clumsy scam from one of the many scumbags that plague the Web. How to tell These...
Search Engines Influencing Design

Search Engines Influencing Design

Designing for Algorithms “Focus on the user and all else will follow” is the Google mantra, yet when a search engine is making value judgements using an algorithm, how important is the “user”? Arguably the “user” takes on a...
Phishing along the Amazon

Domain Renewal Emails Beware the “Slammers”

Domain renewal emails have become commonly used by scammers and are known as “Domain Slamming’. This is a scam whereby an unscrupulous, offending, domain name registrar, attempts to trick domain owners, into switching from their existing registrar to their...
Should you report SQL injection?

Should you report SQL injection?

Should you report SQL injection attempts? If you have a website running on WordPress, Joomla, Drupal or any other database driven system, it will only be a matter of time before it attracts the attention of would be hackers. Most attacks actually originate from...