uncleflo

profile picture

Some cool dude. Higher order of decision making. Absolute.

Registered since September 28th, 2017

Has a total of 3393 bookmarks.

Showing top Tags within 36 bookmarks

development   information   howto   guide   reference   administration   website   software   design   solution   linux   business   service   web   code   online   server   uk   tool   application   system   blog   list   data   description   tutorial   article   security   video   company   technology   world   windows   explanation   product   download   free   javascript   network   project   lookup   experience   london   performance   file   library   tools   research   php   programming   html   opensource   example   control   create   support   beautiful   technical   community   build   music   image   computer   learn   dance   share   webdesign   database   browser   mobile   user   internet   feature   hardware   work   platform   css   quality   3d   money   install   search   camera   event   access   course   standard   source   travel   management   manage   test   phone   story   client   api   script   marketing   google   fast   digital   simple   review   developer   communication   question   interface   documentation   usa   app   photography   idea   content   program   device   youtube   study   startup   cheap   advice   live   professional   monitor   process   account   profile   setup   media   market   installation   analysis   resource   flash   ubuntu   inspiration   industry   speed   develop   customer   social   js   university   graphics   personal   framework   command   package   photo   report   buy  


Tag selected: check.

Clear all

Showing 36 results.

Looking up check tag. Showing 36 results. Clear

Dauntless Boatyard, UK

http://dauntlessboatyard.com/

Saved by uncleflo on January 31st, 2019.

Dauntless Boat Yard Ltd Canvey Road Canvey Island Essex SS8 0QT. Here at Dauntless Boatyard our professional and qualified staff are available and fully insured to lift out vessels up to 45ft long and weighing 20 tonnes. We can load you onto blocks and stands for a secure lay up in our yard or you may wish to be loaded from our quay side onto a trailer or transport. Whether you are coming by road or water, you can be assured our versatile machinery and experienced staff are ready for your requirements.

dauntless water side service yard crane yacht vessel flexible protect machinery sail shop boat check arrange offer boatyard insure load secure weigh block trailer transport experience product company profile


Lens Tests: A Simple Method

http://www.zen20934.zen.co.uk/photography/LensTests/simplemethod.htm

Saved by uncleflo on January 6th, 2019.

This is a simplified subjective method of testing lenses optical sharpness. This should not be confused with tests for focus accuracy and discrimination in a 3D environment, that is a totally different issue although often confused by the inexperienced. A focus accuracy test is suggested here Focus Test. The advantage over this method, compared to just taking a shot of a garden etc, is elimination of variables such as subject and camera movement, insufficient depth of field, flatness of field and variations in focus location. It uses a nice consistent high contrast subject to make comparisons easy; checking sharpness on general photographic views is not very easy. As the method is subjective, it is worth testing against a known good lens for comparison.

sharpness histogram sharpen broadsheet flatness clipping lens stabilizer timer infinity check focal pixel recommend exposure adjust compensate focus filter optical hardware camera comparison accuracy precise precision photo photography test testing environment confuse compare equipment standard quality


Linux Daemon Writing HOWTO

http://www.netzmafia.de/skripten/unix/linux-daemon-howto.html

Saved by uncleflo on January 4th, 2019.

A daemon (or service) is a background process that is designed to run autonomously,with little or not user intervention. The Apache web server http daemon (httpd) is one such example of a daemon. It waits in the background listening on specific ports, and serves up pages or processes scripts, based on the type of request. Creating a daemon in Linux uses a specific set of rules in a given order. Knowing how they work will help you understand how daemons operate in userland Linux, but can operate with calls to the kernel also. In fact, a few daemons interface with kernel modules that work with hardware devices, such as external controller boards, printers,and PDAs. They are one of the fundamental building blocks in Linux that give it incredible flexibility and power. Throughout this HOWTO, a very simple daemon will be built in C. As we go along, more code will be added, showing the proper order of execution required to get a daemon up and running.

daemon forking portability fork kernel terminate compile coding directory multitude files execution loop setup check apache logging skeleton methodology structured code function technical development howto application design architecture


Social Media Management Platform | Buffer

https://buffer.com/

Saved by uncleflo on December 23rd, 2018.

Get Started with Buffer for free. No credit card required! All prices are all-inclusive as opposed to a "per team member" cost. Want to see the full details for each plan? Check out our plans and pricing. Save time managing social media for your business. Buffer makes it easy for businesses and marketing teams to schedule posts, analyze performance, and manage all their accounts in one place. Schedule content and check analytics for all your social accounts in one place, rather than going to six different networks. Schedule social media posts for your preferred times. Schedule posts for all of your social accounts at once, and Buffer will publish them automatically, according to the posting schedule you put in place. Review your analytics to see how your posts are performing. You can use the analytics to see your social media performance, understand how to improve your results, and create reports for your manager or clients. Add multiple team members and set access levels. You can add up to 25 team members to your Buffer account and give them the appropriate access levels — full posting access or approval required.

buffer analyze scheduling learn standby productive queue thoughts publish amazing marketing schedule check browser profile tips automatically engage journey media content marketer tool scheduler comfort convenience control oversight analytics networks howto member performance network report automatic administrator


NFS - which ports to open? - Storage - Discussions

https://discussions.citrix.com/topic/289912-nfs-which-ports-to-open/

Saved by uncleflo on December 23rd, 2018.

No problem connecting to NFS with firewalls disabled,but even with TCPView it's not obvious which ports require opening.
We've opened port 2049 for both UDP and TCP and all seems well, but there's a selection of ports mentioned across the web for NFS. So with XenServer just 2049? Sharing filesystems by NFS: Regardless of which choice is made for ID mapping you will need to adjust any firewall the system is using so that NFS clients can communicate with the server. You will need to ensure that the following ports are open before sharing any filesystem: UDP: 111, 1039, 1047, 1048 and 2049. TCP: 111, 1039, 1047, 1048 and 2049. See _this article_ Tobias

firewall helpful reply answer server accept client fix topic check procedure administration port suggestion solution open connect nfs require tcp map system article discussion administrator


How To Use NSLOOKUP to View Your DNS Records

https://support.managed.com/kb/a2312/how-to-use-nslookup-to-view-your-dns-records.aspx

Saved by uncleflo on December 23rd, 2018.

This article is for the Windows OS NSLOOKUP functionality. If your machine does not have NSLOOKUP, or are using a different OS, that information will beyond the scope of this article. You may find the need to check the status of your domains DNS records, or check the Name Servers to see which records the servers are pulling.

check knowledge status records name record administration domain lookup windows howto solution article blog technical


SSL Checker

https://decoder.link/sslchecker

Saved by uncleflo on December 19th, 2018.

Submit the Hostname and Port in the fields below. This checker supports SNI and STARTTLS.

host technical lookup domain name tls ssl port secure check security website tool online link useful administration


OWASP Zed Attack Proxy Project

https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project

Saved by uncleflo on June 22nd, 2018.

The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers*. It can help you automatically find security vulnerabilities in your web applications while you are developing and testing your applications. Its also a great tool for experienced pentesters to use for manual security testing.

owasp proxy attack hacker hacking automation check pentesting experience application develop test vulnerability scan browser international world popular tool security continuous delivery


Coinigy - Digital currency trading made easy

https://www.coinigy.com

Saved by uncleflo on February 11th, 2018.

Tap into the global digital currency economy and Trade on 45+ Exchanges from a single account and trade hundreds of currencies from the palm of your hand with Coinigy for Android. Rest easy knowing Coinigy's 24/7 Exchange & Wallet Portfolio Monitoring is always keeping an eye on your balances, even while you're sleeping. We are a Cloud-Based Platform that offers Superior 99.9% Uptime from our Google Datacenters. Never miss a trade opportunity again with Coinigy.

coinigy coin trade algorithms tool interface monitor portfolio opportunity center balance instruction check offer currency economy crypto cryptocurrency exchange account


Acunetix - Website Security

https://www.acunetix.com/

Saved by uncleflo on June 30th, 2017.

Audit your website security. Firewalls, SSL and hardened networks are futile against web application hacking! Hackers are concentrating on web-based applications (shopping carts, forms, login pages, etc) – accessible 24/7 – and directly connected to your database backends with valuable data. Web applications are tailor-made, less tested than off-the-shelf software and likely to have undiscovered vulnerabilities that can be a recipe for disaster. Don’t overlook Website security at your organization! Acunetix is the leading web vulnerability scanner used by serious fortune 500 companies and widely acclaimed to include the most advanced SQL injection and XSS black box scanning technology. It automatically crawls your websites and performs black box AND grey box hacking techniques which finds dangerous vulnerabilities that can compromise your website and data. Acunetix tests for SQL Injection, XSS, XXE, SSRF, Host Header Injection and over 3000 other web vulnerabilities. It has the most advanced scanning techniques generating the least false positives possible. Inbuilt vulnerability management helps you prioritize and manage vulnerability resolution.

security category web zone compromise possible vulnerable audit check assess corporate advanced scan website priority dangerous technique management built business procure service profile company


Show Server Headers for a Webpage

http://tools.seobook.com/server-header-checker/

Saved by uncleflo on June 30th, 2017.

Gain a Competitive Advantage Today Your top competitors have been investing into their marketing strategy for years. Now you can know exactly where they rank, pick off their best keywords, and track new opportunities as they emerge. Explore the ranking profile of your competitors in Google and Bing today using SEMrush. Enter a competing URL below to quickly gain access to their organic & paid search performance history - for free. See where they rank & beat them!

seo competition advantage competitor invest header keyword performance check checker analysis online monitor advice


HTTP Server Header

https://www.iplocation.net/http-server-header

Saved by uncleflo on June 30th, 2017.

Welcome to IP Location, the home of IP Geolocation and IP Resources. This website was built to offer tips, tutorials and articles on IPv4 and IPv6 addresses, and how it relates to TCP/IP and Internet. HTTP is the protocol used to transfer data between the web server and browsers. When a browser requests a HTML document from a web server, the browser send an URL (web address) with a request header. The server respond to a browser by providing a HTTP response header and the requested document (if exists). This tool extracts the HTTP server response headers, and displays them to you.

ip network location server header administration computer infrastructure security check apache iis webserver certificate url domain address checker validator


Start your Fortify on Demand Trial

https://saas.hpe.com/signup/try/fortify-on-demand

Saved by uncleflo on December 9th, 2016.

What's included: 15 days to try the Fortify on Demand service at no cost; 2 Assessment units to spend on 2 express scans; 3 types of scans: express mobile, dynamic or static. (sign up using a business email address; dynamic scans won't work with public email domains like Gmail, Yahoo! Mail, etc.); Full scan reports; No contract or credit card required; No downloads or installation;

fortify trial software saas service business scan security helpful administration sql penetration test testing development code check safety hacking prevention tool evidence signup


How to make REST calls in PHP

https://support.ladesk.com/061754-How-to-make-REST-calls-in-PHP

Saved by uncleflo on December 2nd, 2016.

Four examples on how to get four different calls in PHP, to send a GET/POST/PUT/DELETE request to an API call, to implement a REST service.

php development analyse check assess request service api rest create develop information lookup code example howto


Vertical Axis Wind Turbine Information: How Efficient are Vertical Axis Wind Turbines compared to Horizontal?

http://verticalaxiswindturbines.blogspot.co.uk/2010/10/how-efficient-are-vertical-axis-wind.html

Saved by uncleflo on September 8th, 2016.

Are you looking to build a wind turbine, or to buy a windmill, and you want to know whether it is better to get yourself a vertical axis wind turbine or a conventional horizontal windmill? It is a good idea to educate yourself on the differences between vertical and horizontal axis wind turbines. Obviously, you want to get the one that has the best return on investment, whether you will buy a wind turbine or build it yourself.

vertical axis wind turbine efficient question solution answer study energy electricity windmill build construct difference compare check


GoPro microSD Card Considerations

https://gopro.com/help/articles/Block/microSD-Card-Considerations

Saved by uncleflo on July 14th, 2016.

To consistently achieve the best results with your GoPro camera it is important to select microSD cards that are known to work well with your camera. Please visit the Works with GoPro page to view the most up to date list of GoPro verified microSD cards and other 3rd party products that we recommend to be compatible with GoPro cameras.

microsd sd gopro equipment memory card camera product list information lookup reference official manufacturers hero4 hardware check


ARITHMETICA LIMITED 07761840

http://companycheck.co.uk/company/07761840/ARITHMETICA-LIMITED/financial-accounts

Saved by uncleflo on June 13th, 2015.

Financial figures are extracted from accounts submitted to Companies House annually. The key financials are based on the most recent financial period available (31/03/2014). ARITHMETICA LIMITED is due to submit 2015 Accounts on or before 31/12/2015. We base our company checks on the accounting figures recorded in the public domain. We do not have access to accounts prepared by ARITHMETICA LIMITED internally. For a full picture of the company's financial health, you could request a copy of the full accounts from the business directly and have them analysed by a suitable expert. We can carry out this work on your behalf and provide a qualified accountant's opinion for only £199.

arithmetica limited profile number company information lookup administration financial account figure graph house prepare quality analyse check business berify


Using Access Control Rules - ServiceNow Wiki

http://wiki.servicenow.com/index.php?title=Using_Access_Control_Rules#Creating_ACL_Rules

Saved by uncleflo on March 26th, 2015.

An instance uses access control list (ACL) rules, also called access control rules, to control what data users can access and how they can access it. ACL rules require users to pass a set of requirements in order to gain access to particular data. The system searches for ACL rules that match both the object and operation the user wants to access. If there are no matching ACL rules for the object and operation combination, then the object does not require any additional security checks and the instance grants the user access to them. By default, the system provides ACL rules to restrict access to all database and configuration operations.

acl rules object database configuration operation check instance access security system administration script control permission


Alexander Stetsenko » MySQL: how to ignore checking of foreign key constraints for InnoDB tables

http://www.stetsenko.net/2008/10/mysql-how-to-ignore-checking-of-foreign-key-constraints-for-innodb-tables/

Saved by uncleflo on February 16th, 2015.

There is a session variable FOREIGN_KEY_CHECKS which allows to ignore checking of foreign key constraints for InnoDB tables. If set to 1 (the default), foreign constraints are checked. If set to 0, they are ignored. Setting FOREIGN_KEY_CHECKS to 0 also affects data definition statements like DROP TABLE which drops tables that have foreign keys that are referred to by other tables. Disabling foreign key checking can be useful for reloading InnoDB tables in an order different from that required by their parent/child relationships.

mysql insert foreign ignore key constraint check sql dump import database solution problem drop flag


Domain Name Maker/Brandable Name Generator - BustAName

http://www.bustaname.com/word_maker

Saved by uncleflo on February 16th, 2015.

An extremely useful website for finding a good brand name for a new service, especially if you try out the 'Make Random' button! Or generally seek some name inspiration for an available domain name. Welcome to the new Domain Maker tool. Enter a start word and the domain maker will generate domains based on the start word that sound natural.

domain name maker brand generator word natural business find search inspiration availability check checker make


Check Username Availability at Multiple Social Networking Sites

http://namechk.com/

Saved by uncleflo on February 16th, 2015.

Check to see if your desired username or vanity url is still available at dozens of popular Social Networking and Social Bookmarking websites. Promote your brand consistently by registering a username that is still available on the majority of the most popular sites. Find the best username with namechk.

tools socialmedia social media social media search username check branding brand domain network availability reference quick lookup find site checker


NameChecklist. Find your name the easy way!

http://www.namechecklist.com/

Saved by uncleflo on February 16th, 2015.

Use namechecklist to check if your brandname, username, domain and vanity url are still available on the worldwide web.

brand socialmedia username availablility domain url social media social media web check checker lookup find search name easy tool useful


namecheckr.com - Social and Domain Name Availability Search For Brand Professionals

https://www.namecheckr.com/

Saved by uncleflo on February 16th, 2015.

A very useful website, to quickly find out availability of a brand accross the internet. Check domain & social username availability across multiple networks.

username url tools tool check brand brainstorming socialmedia social media social media domain lookup useful search checker web mutlitask result


HTML Purifier XSS Attacks Smoketest

http://htmlpurifier.org/live/smoketests/xssAttacks.php

Saved by uncleflo on January 20th, 2015.

A list of XSS attack to check for. Caveats: Google.com has been programatically disallowed, but as you can see, there are ways of getting around that, so coverage in this area is not complete. Most XSS broadcasts its presence by spawning an alert dialogue. The displayed code is not strictly correct, as linebreaks have been forced for readability. Linewraps have been marked with ». Some tests are omitted for your convenience. Not all control characters are displayed.

security javascript html web test attack reference xss hack crack development check list


Uploading Files with PHP - Codular

http://codular.com/php-file-uploads

Saved by uncleflo on January 20th, 2015.

You can't go on any site nowadays without seeing an option to upload an image. All of the big sites are doing it, however it's one of those things that is very poorly covered in PHP articles across the internet. We'll cover the basic upload process and then in a future article move on to additional things like image resizing and cropping.

php upload graphics development website file size check checklist howto resize crop cover article option site codular large database process input