Member Avatar
i've just got python ver3 it keeps jumping outof script mode what am i doing wrong, is there a command to return it to script mode ?
by Gordon_2 in Programming ()
Member Avatar
what is the highest paying jobs in Canada?
by hilarysanders in Community Center ()
Member Avatar
It's all too easy to think that spam is an old problem, and one that has largely been dealt with. Certainly, many people will tell you that they see very little evidence of spam in their mailboxes. This, however, has less to do with the demise of the spammer and …
by happygeek 1,608 in Community Center ()
Member Avatar
Hi guys, I need someone to help me solve this problem. The conditions in the statement are very strict: APPLES AND PEARS Tom has three boxes with fruits in his barn: one box with apples, one box with pears, and one box with both apples and pears. The boxes have …
by apekodonkorjewel in Community Center ()
Member Avatar
Hello guys, pls help me solve this: THE ROUND TABLE Helen and her husband invited their neighbors - two couples - for a dinner at their home. The six of them sat at a round table. Helen tells you the following: Victor sat on the left of the woman who …
by apekodonkorjewel in Community Center ()
Member Avatar
The Electronic Frontier Foundation (EFF) has released the latest version of its 'Who Has Your Back?' ... and accompanying infographic, and it makes for interesting reading. Once you appreciate that what the EFF is talking about here is how good, measured as a response to a handful of yes or …
by happygeek 1,608 in Community Center ()
Member Avatar
One of the great things about social media is the way that it utilises the wisdom of crowds. This concept is perhaps best known through Wikipedia, where user editing can often create some wildly inaccurate entries in the short term but over time these get corrected by the larger volume …
by happygeek 1,608 in Digital Marketing ()
Member Avatar
According to the latest ... all but four per cent of the security incidents analyzed by researchers could be accounted for by just nine basic attack types. That's pretty useful information for enterprise looking to prioritize their approach to security in terms of establishing a stronger security posture. So, as …
by happygeek 1,608 in Community Center ()
Member Avatar
It's that time of year again, and the latest ... has been published. This analysed anonymous data gathered from scans right across 2014 of millions of computers which have Secunia Personal Software Inspector (PSI) installed and revealed some interesting statistics. On average, the computers used by the people running PSI …
by happygeek 1,608 in Microsoft Windows ()
Member Avatar
You may be wondering what a superfecta actually is, and the answer is: the most dangerous and serious threat to business. To clarify, the superfecta as defined by secure cloud hosting outfit FireHost is a group of four attack vectors that comprises of Cross-Site Request Forgery (CSRF), Cross-Site Scripting (XSS), …
by happygeek 1,608 in Information Security ()
Member Avatar
According to research commissioned by security vendor , nearly half (49%) of the organisations questioned admitted they simply didn't know if their businesses had been compromised or not. This uncertainty regarding cyber-attack detection ability comes in stark contrast to the 32% who confirmed they had been attacked during the previous …
by happygeek 1,608 in Microsoft Windows ()
Member Avatar
Research results just published by digital marketing agency Visibility IQ would appear to confirm what the savvy marketeer already knows: social video is an important driver for engagement and purchase behaviour amongst online consumers. The research, conducted by Entertainment Media Research Ltd, was based upon interviews with more than 2,600 …
by happygeek 1,608 in Digital Marketing ()
Member Avatar
There's a truism that I like to share with as many people as possible: if you don't want other people to see something, then don't post it online. It is, you might think, a pretty simple concept to grasp. After all, you wouldn't stroll into a bar with a megaphone …
by happygeek 1,608 in Digital Marketing ()
Member Avatar
Some interesting ... from security outfit Proofpoint was published this morning which reveals that unsolicited email heading towards users in the UK is three times more likely to contain malicious URLs than that destined for users in the United States, or Germany, or France for that matter. It's not, as …
by happygeek 1,608 in Information Security ()
Member Avatar
According to newly published research from cloud-based social Wi-Fi software outfit , of 2,540 consumer questioned vastly more were concerned about getting access to pornography than were worried about matters of data security. The 'Using Wi-Fi in Public Places’ study revealed that 28 percent of those asked (711 people) don't …
by happygeek 1,608 in Networking ()
Member Avatar
Bugs are, and always have been, a fact of life for the software developer. However, if Microsoft researcher Andrew Begel has his way, they could be a thing of the past. Last month a paper entitled '' was published which Begel co-authored. This week, Begel spoke at the annual Microsoft …
by happygeek 1,608 in Software Development ()
Member Avatar
The average car is increasingly becoming a vehicle for the Internet; but does this also make it a vehicle for cybercrime? Security vendor Kaspersky Lab, in cahoots with Spanish digital media outfit IAB, reckons that software updates, in-car mobile apps and privacy are all areas which have ripe potential for …
by happygeek 1,608 in Hardware and Software ()
Member Avatar
If a week is a long time in politics, then 24 hours is an absolute age in ecommerce security terms. Which make the findings of a Tripwire survey, published today, all the more worrying. The survey, conducted by Atomic Research, questioned 102 financial organizations and 151 retail organizations which process …
by happygeek 1,608 in Digital Marketing ()
Member Avatar
Hey guys could you help me out regarding how to use the Google disavow tool and its functionalities, uses.
by christiangel.mathews in Search Engine Strategies ()
Member Avatar
Today is another of those 'Hallmark' IT security days; in the case of Tuesday the 11th of February 2014 that means 'Safer Internet Day'. I'm not going to start yet another rant about the pointlessness of this, and why every day should be Safer Internet Day. If you want to …
by happygeek 1,608 in Information Security ()
Member Avatar
As a gamer myself, I thought that last year was a pretty good one. After all, not only did I get to play both GTA V and Call of Duty: Ghosts (indeed, I'm still playing it and working my may through the prestige levels) but if I had enough spare …
by happygeek 1,608 in Game Development ()
Member Avatar
If you have never stopped to think about language in terms of Search Engine Optimisation (SEO) then the results of a survey by digital marketing agency Greenlight might make you do just that. According to the global Search and Social Survey, some 76% of people do their online searching in …
by happygeek 1,608 in Search Engine Strategies ()
Member Avatar
The iPad is, as those annoyingly creative TV adverts show us, used for all sorts of things by all sorts of people. However, according to a press release that hit the DaniWeb news desk today, you might be forgiven for thinking that shopping isn't one of them. As usual though, …
by happygeek 1,608 in UI / UX Design ()
Member Avatar
A survey of more than 700 tablet owners in US, UK and Australia has revealed some interesting insights into how people use their devices. The $195 Gartner 'Consumers Buy Media Tablets Based on Lower Prices and Better Quality, not Brand' report (gotta love that snappy title, huh?) unsurprisingly shows that …
by happygeek 1,608 in Mobile and Wearables ()
Member Avatar
Gartner defines the '' as being "the convergence and mutual reinforcement of social, mobility, cloud and information patterns that drive new business scenarios". The global IT analyst outfit has also just released details of research which suggests that the perceived level of maturity when it comes to the privacy activity …
by happygeek 1,608 in Digital Marketing ()
Member Avatar
Your web browser provides a window onto the Internet, but unless you are timely in updating the client you use then, say researchers with security vendor Kaspersky Lab,that window may be cracked and allow a draft of insecurity to blow through into your network, your computer and your data. With …
by happygeek 1,608 in UI / UX Design ()
Member Avatar
When participants of a recent study were asked to share sensitive information on two different online surveys -- one designed to look unprofessional and the other backed by a major university -- the participants were more likely to share private information on the unprofessional-looking site. Researchers from Carnegie Mellon released …
by Emily Banks in Digital Marketing ()
Member Avatar
A Freedom of Information request from staff at the UK offices of the Huffington Post has revealed, according to a BBC report on the story, that more than 300,000 attempts were made to access pornographic websites from the Houses of Parliament during the last 12 months. Of course, just looking …
by happygeek 1,608 in Information Security ()
Member Avatar
According to the fourth annual from Imperva retailers suffer from twice as many SQL injection attacks when compared to other industry sectors. What's more, the United States remains the number one source of all web attacks. Other key findings of the report include the startling revelation that one website was …
by happygeek 1,608 in Databases ()
Member Avatar
Hi Guys, I just want to introduce the members of this forum a brand new keyword tool. It's FREE and always will be. We are in beta mode at the moment and strictly invitation only. Watch the video if you like the idea sign up we are looking to launch …
by nichols2449 4 in Search Engine Strategies ()