Speed up your workflow by launching your favorite programs in one click using batch (.bat) files. Continue reading »
What we have here is an excellent method for preventing a great deal of blog spam. With a few strategic lines placed in your .htaccess file, you can prevent spambots from dropping spam bombs by denying access to all requests that do not originate from your domain. Continue reading »
Within the right-click context menu is the option to create "New" file items. While the list of available documents within the "New" submenu often contains several useful file types, such as .txt or .zip, it also contains lots of unnecessary entries. So let’s delete any unwanted context menu items in WinXP.. Continue reading »
This brief tutorial explains how to add a background image to any folder in Windows XP. Really enables you to customize your workflow and experience using WinXP. Estimated time to completion: around 5 minutes (it’s easy). Continue reading »
DOS (Disk Operation System) is a tool which allows you to control the operation of the IBM PC. DOS is software which was written to control hardware. Here is a summary of some essential DOS commands. Continue reading »
There are several files that appear not to have extensions in Windows XP. Perhaps the best known example is the HOSTS file. Files such as the HOSTS file that appear to be “extensionless” actually contain an invisible period “.” — or dot — at the end the file name. It is this invisible dot that will enable us to select a specific program with which to open files with no extensions. Continue reading »
Recently, every website on our primary server was simultaneously attacked. The offending party indiscriminately replaced the contents of every index file, regardless of its extension or location, with a few vulgar lines of code, which indicated intention, identity, and influence. Apparently, the attack occurred via Germany, through a server at the University of Hamburg (uni-hamburg.de). This relatively minor attack resulted in several hours of valuable online education. In this article, it is our intention to share experience with website attack […] Continue reading »
Follow these steps to backup the “Block Senders” list in Outlook Express: Continue reading »
Well, they aren’t really that amazing, but for Windows and Linux users, they sure save time. Continue reading »
A list of HTTP Error codes and corresponding definitions: Informational Codes 100 — Continue 101 — Switching Protocols Successful Client Requests 200 — OK 201 — Created 202 — Accepted 203 — Non-Authoritative Information 204 — No Content 205 — Reset Content 206 — Partial Content Client Request Redirected 300 — Multiple Choices 301 — Moved Permanently 302 — Moved Temporarily 303 — See Other 304 — Not Modified 305 — Use Proxy 307 — Temporary Redirect Client Request Errors […] Continue reading »