In this tutorial, I will guide you through the steps of doing Mod _Auth_MySQL authentication with the help of user login id’s and passwords stored in a MySQL database.
This type of authentication is usually good for protecting web pages and web directories from unauthentic access. It is quite similar to LDAP authentication, with the exception of database involvement here and is fast also. mod_auth_mysql is an apache module which can work with both Apache 1.x and Apache 2.x and can be installed from http://modauthmysql.sourceforge.net/ Before we continue with the directives that needs to be set in the .htaccess file, we need to know the prerequisites.
Last day, I had a requirement of storing my bookmarks online as a portability requirement.
Google Chrome bookmarks synchronization came to the rescue. This is very good way of synchronizing your chrome bookmarks online to your Google Accounts under the heading Google Chrome Bookmarks Sync. Once this has been done you can use any computer in the world with chrome installed and sync in your bookmarks again in new installation. Continue reading
I have been ever wondering, what is the use of google wave without those social features of sharing out waves with others. We know google wave helps us collaborate in real time and that can be helpful in many ways like documenting things, collab games etc. The best part is we can replay all of those to know who did what. But still the major part is sharing and bringing in more participation.
Now that can be done by embedding the Wave in your WordPress blog post. This can be done by installing Wavr Plugin for WordPress. Continue reading
In our last post we told you about the benefits of installing custom comment management and moderation system for your blog. In this post we will tell you how to about installing IntenseDebate on your blog.
It is very easy to setup IntenseDebate as they proclaim in 3 easy steps. Just like WordPress 5 Minute installation.
Recently we decided to pump up the comment section of our blog. The comment section is one section which really needs attention in case of blogs. Without comments your blog is dormant. So the more you make it easy for your readers to comment, the more your blog comes to life. Comments also increases pageviews for your blog, by bringing back the readers which previously commented and have subscribed by email to the future comments in that post. Comments are very necessary to build engagement of users around your content. Most of the blogs today don’t use the default commenting system of wordpress for this reason only, that it is cumbersome for users to enter their details all over again to comment. Continue reading
You may get excited when you have just joined twitter and many people started following you or when you suddenly get many people following you within a short period of time, unless you are not a celebrity
If you want to know what type of people are following you, or if at all they are spammers or robots, who just came to spam twitter for any reasons. Twitblock is a nice tools which scans your twitter account to find these kind of people. You can only scan your account with this tool as it requires twitter account (OAuth) authorization before scanning. Continue reading
Posted in Twitter
Tagged apps, Spam, Twitter
As seeing enormous Chinese Hackers attacks on various oganisations (including Google and Tcs.com), india seems to be prone to Hackers attack as a latest case was noticed at National Security Advisor M.K. Narayanan’s Office.
Google faced some similar suspicious activities and has decided to shut down its operations at Beijing as some of the suspicious activities were from there itself. On December 15th, Narayan claimed that many of the Govt. agencies were attacked by emails, containing malicious attachments seeking information and remote access.
Narayan also pointed that they are working to strengthen their security measures. According to Narayanan,
“This was not the first instance of an attempt to hack into our computers,” he also said that “It is difficult to find the exact source but [China] is the main suspicion. It seems well founded.