Server Logs Search Results

How To: Program faster with some PHP speed tips

If you're looking to shave a few milliseconds off the Zend Engine's work load, check out this tutorial for some PHP programming speed tips. This efficency will pay off when you have tons of traffic to your site and save you valuable server resources.

How To: Become a level 99 thief in RuneScape

Become the best at thieving of anyone else on your RuneScape server! Starting as just a level one Pickpocket, this guide shows you how to take your character all the way up to level 99 in thieving! Everyone had better watch their belongings around you.

How To: Install the Joomla CMS on a GoDaddy server

In this clip, you'll learn how to install the Joomla content mangement system on GoDaddy. It's an easy process and this home-computing how-to presents a complete demonstration. For more information, including detailed, step-by-step instructions, and to get started installing Joomla on your own GoDaddy webserver, take a look.

How To: Turn a PS3 into a media server

While the PlayStation 3 is great at playing BluRay discs, if you want to play back downloaded videos, it can prove to be quite problematic. Use this software hack to unlock the Play Station 3 for video playback, whether it be from a hard drive or streamed off the internet.

How To: Install the PHP5 GD Library for Moodle

Interested in teaching an online course using your own server but can't quite figure out how to install everything you'll need? This video demonstrates how to sinstall the PHP GD Library for Moodle, the free, open source course management utility, via SSH. For exhaustive, step-by-step instructions, take a look.

How To: Adjust Moodle folder properties with Webmin

Interested in teaching an online course using your own server but can't quite figure out how to configure everything? This video demonstrates how to adjust folder settings within Moodle, the free, open source course management utility, via the Webmin interface. For step-by-step instructions, take a look.

How To: Install Webmin on a Debian server via SSH

This video demonstrates how to install Webmin via SSH. Once you've downloaded the Webmin interface package, you'll want to install it onto your serve. In order to do that, you'll need to depackage it. If you're new to Linux or otherwise unclear about how to proceed, then watch this video for step-by-step instructions.

How To: Share your calendar 3 ways with Outlook 2007

This tutorial shows you how to share your calendar three ways in Microsoft Office Outlook 2007. If your company uses Microsoft Exchange Server, you can share your calendar within the organization by using that feature. You can also send a snapshot of your calendar in e-mail to people outside your company. And you can publish your calendar on the Microsoft Office Online Web site and restrict how much detail is shown and who can access it.

How To: Deploy a form template in SharePoint 2007

Now you can enable users to fill out Microsoft Office InfoPath 2007 forms by using a Web browser, which makes your forms more accessible to a wider audience. This instructional video shows you how to go through the process an IT Administrator can use to verify, upload, and activate an administrator-approved form template on a Microsoft Office SharePoint Server 2007 site.

How To: Save and load view state info for a custom web server

In this video tutorial, Chris Pels will show how to persist and restore information in the ViewState of a custom user control. First, learn how to persist simple values containing .NET primitive types such as String, Int32, Boolean, etc. Then see how to persist complex types such as Class which contain properties storing information. The sequence of processing View State information during the lifecycle of an ASP.NET page is also discussed.

How To: Use 'Sign in with Apple' on iOS 13 for Better Security & Privacy

We've all seen the login pages that allow you to log in to third-party accounts using your credentials from Facebook, Google, or Twitter. It saves you the trouble of creating another account and remembering more passwords — but it can also become a privacy and security issue, which is why Apple created the "Sign in with Apple" feature for iOS 13.

How To: Extract & Back Up All of Your Text Messages on Android

It always helps to be prepared for the worst. This applies to our phones now more than ever, as we depend on them to be our record keepers for text messages from friends, family, and coworkers. If you ever lose or severely damage your phone, having a backup of your precious texts gives you the peace of mind of knowing that you can always get them back.

How To: Use SpiderFoot for OSINT Gathering

During a penetration test, one of the most important aspects of engaging a target is information gathering. The more information you have coming into an attack, the more likely the attack is to succeed. In this article, I'll be looking at SpiderFoot, a modular cross-platform OSINT (open-source intelligence) gathering tool.

Hack Like a Pro: Metasploit for the Aspiring Hacker, Part 12 (Web Delivery for Linux or Mac)

Welcome back, my budding hackers! Metasploit, one of my favorite hacking/pentesting tools, has so many capabilities that even after my many tutorials on it, I have only scratched the surface of it capabilities. For instance, it can be used with Nexpose for vulnerability scanning, with Nmap for port scanning, and with its numerous auxiliary modules, nearly unlimited other hacking related capabilities.

How To: PIN-Protect Photos, Log-in Credentials, Credit Card Info, Notes, & More with Keeply

In the weeks before Apple officially released iOS 8, consumers were abuzz over rumors that a new feature would password-protect your photos and text messages from prying eyes. Unfortunately, this ended up being untrue, though we did cover some alternatives to protecting your important information using some built-in features and a third-party app. Now, there's a new iOS app that can do it all.

How to Hack Databases: Cracking SQL Server Passwords & Owning the Server

Welcome back, my rookie hackers! A short while back, I began a new series on database hacking, and now it's time to continue and extend your education in that field. As you know, the database contains all of the most valuable info for the hacker, including personally identifiable information, credit card numbers, intellectual property, etc. So, it's the ultimate goal of cybercrime and the APT hacker.

How To: Transfer music files between computers in iTunes 9

How to use Home Sharing in iTunes 9 to transfer music files to another computer. First make sure both computers have iTunes version 9 installed. To check this go to the iTunes 9 menu next to file in upper left and select the about item. On windows machines this will be in the help menu. In the computer with the music files we need to make sure the iTunes library is nicely organized. Again go to iTunes menu, this time open the preferences menu, and advanced icon. Check mark both sections "Keep...