forgotz writes:  
Do not rely on the government or someone else to protect what you have worked so hard to achieve. One vital component of an overall security strategy is the legal rights of both your site and its members. Be very clear right up-front, as to what you will, can and in some cases do that may be necessary to protect the information stored in your database(s).

One tool is available to assist and virtually cover every right and protection afforded to you and visitors to your site, Legal Module 1.0. Click here for screens and here for download (registration required).
 Read More...
 

 

Raven's Who Is Where Block v1.5 Released! More about

Posted on Sunday, January 28, 2007 @ 18:12:44 CST in My Scripts and/or Mods
by Raven

Sorry for 2 releases in 2 days, but I had even more work I wanted to do to this block. Most of it is behind the scenes, but you want to be sure to read the CHANGES and the README.

v1.5 - Some of the changes:
- Removed includes/RWH_wiw.inc.php
+ Moved the setting $refreshRate out of the block code into a configuration file: RWS_WhoIsWhere_config.inc.php.
+ Added "php" short tag to all scripts.
+ Removed all hard coded language to language folder.
+ All table names are now stored as defines in the lang file
+ Speed improvements
+ Almost 100% XHTML compliant
+ Finally fixed the style sheet problem with integration to your nuke style

v1.4 - Some of the changes:
+ Speed improvements
+ Almost 100% XHTML compliant
+ Security fixes
+ Code cleanup
+ Finally (Hopefully) fixed the style sheet problem with integration to your nuke style
 

 
nukeevangelist writes:  
We run directories of PHPNuke-modules, blocks, hacks and themes - they are dispersed all over the globe.

And the fact that the development is organized in a distributed way is a very very good thing. It is much much more shock resistant and implements an ecological aspect. Our global knowledge-architecture: - it is dispersed in much more than 200 hot spots ;-). Every hotspot is very very active and very often the site runs a forum [e.g.. ulsoft.scarbridge.co.uk]

Altogether we have a great network of human and non-human actants (See Note): Modules, blocks, hacks, themes - inscribe human agency. Well - in this sense writing code is like a kind of literary inscription

 Read More...

Note: 
Definition of acants
In sociology, AI and programming language theory, actants are the principal concern of the actor-network theory, the activity of which is described as "mediation" or "translation".
 

 

NukeCode Yahoo Search Blocks V2 More about Read More...

Posted on Sunday, January 28, 2007 @ 16:49:32 CST in Add-Ons
by Raven

Seven writes:  
This package contains a set of four blocks for phpnuke all are for Yahoo! search.
Each block opens its search results in it's own window so your users are not taken away from your site.
There are basically 2 sets of blocks one with site search, one without.

Site search blocks:
block-Yahoo_Search_CTR_SS.php is a center block
block-Yahoo_Search_SIDE_SS.php is a site block
 Read More...
 

 

LaptopLock More about Read More...

Posted on Sunday, January 28, 2007 @ 16:46:40 CST in Security
by Raven

southern writes:  
LaptopLock protects the data and aids in the recovery process of a computer if it's stolen. The LaptopLock can:

Delete information
Encrypt files
Show a message to the user
Play a sound
Visible or hidden from user


How do I setup LaptopLock?
Sign up for a free account to register the computer(s). Install the LaptopLock agent for Windows2000/XP. Complete the setup wizard, to create a set of actions in case the computer is stolen.
 Read More...
 

 

KeyScrambler More about Read More...

Posted on Sunday, January 28, 2007 @ 16:43:57 CST in Security
by Raven

southern writes:  
KeyScrambler, a web browser plugin, encrypts your keystrokes to protect your important personal information from keyloggers.

How Keyloggers Work

When you type on your keyboard, the keys travel along a path within the operating system before it arrives at your browser. Keyloggers plant themselves along this path and observe and record your keystrokes. The collected information is then sent to the criminals who will use it to steal from you.
 Read More...
 



Page 229 of 659 (3950 total stories) [ << | < | 224 | 225 | 226 | 227 | 228 | 229 | 230 | 231 | 232 | 233 | 234 | > | >> ]  

News ©

Site Info

Last SeenLast Seen
  • vashd1
  • neralex
Server TrafficServer Traffic
  • Total: 514,330,043
  • Today: 114,403
Server InfoServer Info
  • May 02, 2025
  • 02:46 pm CDT