Jun 18

Web 2.0 is one of the latest crazes running amuck on the internet. It is cropping up in web sites and the topics of conversations from web designers - to site engineers - to user interface deconstructionists. It is powerful and useful, and it is anything but new.

Normally when someone today talks about Web 2.0, what they are speaking about specifically is the use of Asynchronous JavaScript and XML or more commonly named AJAX. AJAX uses a blend of several web technologies that have been around for quite a while, but is now becoming a standard and methods are compliant across most popular and industry standard web browsers. You can use Web 2.0 applications in Internet Explorer, Netscape’s last browser, Fire Fox from Mozilla and even in Opera. (more…)

May 1

According to Entomologists, ants and termites have been at war for the last 250,000 years. Spammers and those folks in charge to keeping spam out of your email inbox are locked into a similar battle. While it’s been less than 15 years since spam began to plague the Internet, the likelihood of a solution being just around the corner is slim. Let’s take a look at the current state of the anti-spam war machine. (more…)

Feb 13
Guide to Securing Microsoft Vista
February 13, 2007
Posted in: Personal Computing by CSS-Hoster

A simple guide to securing Microsoft Vista from viruses, phishing, and spyware.

Securing Vista Guide

The Pros and Cons of a CMS
Guide to Securing Microsoft Vista
Choosing a Stats Package
Five Tips to ‘Hot-Rod’ Your Web Code
File Structure Fanatacism