FREE THOUGHT · FREE SOFTWARE · FREE WORLD

The Net is vast and infinite...

Trace Email Back to the Sender

Locate the sender of an email and their geographical location, including messages sent through anonymous email services like Gmail, Yahoo, and Hotmail.

Software

Top 5 Vulnerability Port Scanners

Asked some hackers and Computer Security gurus to list their 5 favorite Vulnerability/Port Scanners. Here are the results.

Hacking

Debug apache log files from php

Secure phpinfo.php with .htaccess, Now instead of getting a 404 error you will see debug information which will help you find out what the problem is.

PHP

Using TIME_HOUR and TIME_MIN for htaccess RewriteCond

If you want to redirect to a different version of a file based on the time, this code is for you! Please read: Serve Alternate Content based on Time

Htaccess

Caching Tutorial for Webmasters

If you examine the preferences dialog of any modern Web browser (like Internet Explorer, Safari or Mozilla), you'll probably notice a 'cache' setting. This lets you set aside a section of your computer's hard disk to store representations that you've seen, just for you. The browser cache works according to fairly simple rules. It will check to make sure that the representations are fresh, usually once a session (that is, the once in the current invocation of the browser).

Optimization

Vulnerability Scanners Review

Hacking

Arp Packet Hacking

Hacking

PHPMailer tutorial

PHP

Speed Up Sites with htaccess Caching

2 awesome ways to implement caching on your website using Apache .htaccess or httpd.conf. Both methods are extremely simple to set up and will dramatically speed up your site!

Htaccess

Setting charset in htaccess

Learning about charset's and file types maybe pretty boring, but using .htaccess it can be fun! Here's a quicklist htaccess cheatsheet for adding the correct Charset to a web document.

Htaccess

Page: « First101617181920

Information is freedom. Freedom is non-negotiable. So please feel free to modify, copy, republish, sell, or use anything on this site in any way at any time ;)

My Online Tools

Popular Articles
Hacking and Hackers

The use of "hacker" to mean "security breaker" is a confusion on the part of the mass media. We hackers refuse to recognize that meaning, and continue using the word to mean someone who loves to program, someone who enjoys playful cleverness, or the combination of the two.
-- Richard M. Stallman

Live Free or Die

The power of the Web is in its universality. Access by everyone regardless of disability is an essential aspect. -Tim Berners-Lee


It's very simple - you read the protocol and write the code. -Bill Joy

HTML | DCMI | GRDDL | OGP | XOXO | XDMP | XFN | XML | CSS 2.1 | W3C |

Except where otherwise noted, content on this site is licensed under a Creative Commons Attribution 3.0 License, just credit with a link.
This site is not supported or endorsed by The Apache Software Foundation (ASF). All software and documentation produced by The ASF is licensed. "Apache" is a trademark of The ASF. NCSA HTTPd.
UNIX ® is a registered Trademark of The Open Group. POSIX ® is a registered Trademark of The IEEE.

Site Map | Contact Webmaster | License and Disclaimer | Terms of Service | @Htaccess

↑ TOPMain