Cloud spam protection for forums, boards, blogs and sites

No Captcha, no questions, no counting animals, no puzzles, no math. Fight spam!

Reader mode: Pagination in mobile emails

Development of responsive design make reading emails on mobile devices easier. On the other hand, the side effect is the fact that to read the massive letters now you need a lot of scrolling. As a result, to the end of the message get only the most persistent readers. If you give people the ability

Read more

WordCamp Europe in Vienna and the vector of development of WordPress

  This year the conference WordCamp Europe 2016 took place in Vienna and attracted more than 2300 guests. The capital of Austria is an excellent choice for such events, there are all conditions: convenient location, large meeting halls, and an active WordPress community. And there is something to see after the conference. Several of our

Read more

“Write letters”: Three techniques of a good layout of emails

To the layout of letters and mailings devoted to a huge amount of tutorials. In this volume of information is very easy to get lost, and to write letters and do mailings still need. So today we have prepared material, which was collected three popular techniques for effective layout of emails, suitable for beginner web

Read more

How-to: Techniques of creating interactive e-mail using CSS

In our blog, we have already talked about how to implement pagination in a letter, but this is not the only version of interactive e-mailing. In some cases, you can create eye-catching emails using the hover-effect when the content changes when you hover over it. Today we present to your attention a selection of FreshInbox

Read more

Magic project builds on WordPress with package managers and a file

Today I want to share with the audience of Habra my approach to the organization of the automated project build on WordPress, which saves time when creating new sites. Precondition So, you make websites on WordPress, and with each new project  you have to go to wordpress.org to download from there, in fact, WordPress itself

Read more

DDoS on 600 GB/s as the democratization of censorship

Well-known American journalist Brian Krebs for a long time writes on the topics of information security, revealing the identity of dark speculators mainly from Eastern Europe. Over the years, Brian had to over pass through a lot. Evil Ukrainian hacker has gathered on the forums for two bitcoins to buy heroin and send it to

Read more

Vulnerabilities of CCTV systems allow hackers to create massive botnets

According to a statement from US-CERT, in the firmware of digital video products (DVR) AVer Information EH6108H+ found serious vulnerabilities that could allow attackers to easily get to them with remote access and even to form botnets. Vulnerabilities Security researchers have found three critical vulnerabilities. The first (CVE-2016-6535) is the presence of two hidden accounts

Read more

Breeding Business: from ordinary blog to extraordinary magazine

Geek at heart, I always have been coding littles projects on localhost and a few failing websites. I guess I never really took Internet seriously. Then, I realized these jobs I was doing in luxury hospitality were not making me happy. I just loved coming back home and writing, developing and designing. It’s just what

Read more

What is AMP (Accelerated Mobile Pages)? How to setup CleanTalk for AMP

What is AMP? Accelerated Mobile Pages — it’s the tool for static content web-page creation with almost instant load for mobile devices. It consists of three parts: AMP HTML — it’s HTML with limitations for reliable performance and some extensions for building rich content. AMP JS — is library which ensures the fast rendering of

Read more

How to protect a Linux system: 10 tips

At the annual LinuxCon conference in 2015 the Creator of the GNU/Linux core Linus Torvalds has shared his opinion about the safety of the system. He stressed the need to mitigate the effect of the presence of certain bugs by competent protection order in violation of one component to the next layer overlaps the problem

Read more