uncleflo

profile picture

Some cool dude. Higher order of decision making. Absolute.

Registered since September 28th, 2017

Has a total of 3509 bookmarks.

Showing top Tags within 96 bookmarks

development   howto   information   guide   reference   administration   website   software   design   solution   linux   business   service   server   code   web   online   uk   tool   application   system   blog   data   list   tutorial   article   description   video   company   security   product   explanation   technology   world   windows   download   free   javascript   network   experience   project   lookup   create   london   performance   file   library   tools   build   php   research   control   programming   beautiful   learn   support   html   example   opensource   image   technical   community   music   computer   database   dance   share   user   browser   mobile   platform   feature   webdesign   internet   work   css   hardware   quality   course   money   install   3d   developer   search   access   camera   standard   source   test   event   manage   travel   management   phone   documentation   client   question   story   marketing   youtube   api   simple   script   setup   review   fast   digital   professional   content   google   advice   communication   cheap   usa   app   interface   photography   program   account   profile   customer   process   device   idea   startup   industry   live   develop   study   market   speed   installation   monitor   buy   resource   construction   package   media   analysis   flash   boat   ubuntu   inspiration   cloud   social   compare   framework   europe   js   personal  


Tag selected: internet.

Clear all

Showing 96 results.

Looking up internet tag. Showing 96 results. Clear

Buy Email Backup Wizard Online — Official Order Page

https://emailbackupwizard.com/buy.html

Saved by uncleflo on July 11th, 2019.

Get All Email Backup Tools in One Package Lite Edition For Personal Use Prices valid up to July 2019

refund recommend categorize convert valid pro guarantee activation customer purchase configuration speed software lifetime tool copy howto wizard online order official price package lite edition personal account secure internet email development administration recover


RFC 3986 - Uniform Resource Identifier (URI): Generic Syntax (RFC3986)

http://www.faqs.org/rfcs/rfc3986.html

Saved by uncleflo on June 23rd, 2019.

A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme.

internet standard uri character resource specification syntax resolve resolution convert requirement security analysis scheme component guideline consideration perform identifier format quideline rfc


Just got this email from my ISP

https://www.reddit.com/r/24hoursupport/comments/1bvgao/just_got_this_email_from_my_isp/c9amhh9/?context=3

Saved by uncleflo on October 26th, 2018.

Charter Communications ("Charter") has been notified by a copyright owner, or its authorized agent, that your Internet account may have been involved in the exchange of unauthorized copies of copyrighted material (e.g., music, movies, or software). We are attaching a copy of the Digital Millennium Copyright Act (DMCA) notice that Charter received from the copyright holder which includes the specific allegation. Under the DMCA, copyright owners have the right to notify Charter’s register agent if they believe that a Charter customer has infringed on their work(s). When Charter receives a complaint notice from a copyright owner, Charter will notify the identifiable customer of the alleged infringement by providing them a copy of the submitted DMCA notice. As required by law, Charter may determine that the customer is a repeat copyright infringer and reserves the right to suspend or terminate the accounts of repeat copyright infringers.

charter communication copyright owner authorize agent internet account involve exchange unauthorize receive dmca customer infringe question solution forum suggestion howto


Ludovico Einaudi - All Rights Reserved

http://www.ludovicoeinaudi.com/

Saved by uncleflo on October 23rd, 2018.

Luminous, emotive, effortlessly lyrical and always supremely refined the music and performance of Ludovico Einaudi have attracted an ever growing audience over the last two decades whose diversity and devotion are without parallel. He has released a series of chart-topping albums , sells out the most prestigious concert halls worldwide, composed a string of award-winning film scores and routinely tops audience polls becoming an internet phenomenon. With a unique musical alchemy that draws on elements of classical, rock, electronica and world musics he has rendered traditional ideas of genre and audience divide obsolete and become not only one of the best known composers in the world today but almost certainly the best loved too.

singer effortless supreme music performance attract grow audience decade devote parallel release series album prestigious concert hall worldwide award score poll internet phenomenon unique alchemy classical traditional idea genre divide obsolete composer world compose website profile biography product


LeadPages - Turn Clicks Into Customers

https://www.leadpages.net/

Saved by uncleflo on June 25th, 2018.

Confidently build your business with high-converting landing pages and lead generation campaigns you can easily DIY. Easily build and customize one of our professional landing page designs and enjoy unlimited publishing for lead pages, squeeze pages, pop ups, splash pages, and thank you pages. With our drag and drop editor, you’ll never need to code or hire a designer again. Need qualified sales leads in a hurry? Ditch complex ad managers and start driving the best of Facebook's 2 billion users right to your landing pages and squeeze pages with our integrated Facebook Ad Builder. Select your target audience, publish your ad, track performance in real time, and watch your business bloom with quality business leads. Confidently optimize every aspect of your marketing campaigns with the help of our human-friendly analytics. Right inside our landing page software, you can easily decipher page performance, ad spend, and traffic so that you can make quick optimizations to capture more qualified leads.

lead pages business convert optimize campaign editor publish ad performance realtime friendly analytics qualified page target audience software marketing spend monitor see build control internet money save


Using the URL Rewrite Module

https://docs.microsoft.com/en-us/iis/extensions/url-rewrite-module/using-the-url-rewrite-module

Saved by uncleflo on April 7th, 2018.

The Microsoft URL Rewrite Module 2.0 for IIS 7 and above enables IIS administrators to create powerful customized rules to map request URLs to friendly URLs that are easier for users to remember and easier for search engines to find. You can use the URL Rewrite module to perform URL manipulation tasks, some of which include: Define powerful rules to transform complex URLs into simple and consistent Web addresses; Easily replace Web application URLs to produce user and search engine friendly results; Rewrite URLs based on HTTP headers and IIS server variables; Perform redirects, send custom responses, or stop HTTP requests based on the logic expressed in the rewrite rules; Control access to Web site content based on URL segments or request metadata. The URL Rewrite module is available both as a download that you can install on your own IIS server, and on Microsoft's Azure Web Sites cloud platform.

azure platform iis internet server administration rewrite url howto information http download microsoft tool software installation description request process cloud


Marco Bonzanini - Mining Twitter Data with Python (Part 1: Collecting data)

https://marcobonzanini.com/2015/03/02/mining-twitter-data-with-python-part-1/

Saved by uncleflo on February 19th, 2018.

Twitter is a popular social network where users can share short SMS-like messages called tweets. Users share thoughts, links and pictures on Twitter, journalists comment on live events, companies promote products and engage with customers. The list of different ways to use Twitter could be really long, and with 500 millions of tweets per day, there’s a lot of data to analyse and to play with. This is the first in a series of articles dedicated to mining data on Twitter using Python. In this first part, we’ll see different options to collect data from Twitter. Once we have built a data set, in the next episodes we’ll discuss some interesting data applications. Update July 2016: my new book on data mining for Social Media is out! Part of the content in this tutorial has been improved and expanded as part of the book, so please have a look. Chapter 2 about mining Twitter is available as a free sample from the publisher’s web site, and the companion code with many more examples is available on my GitHub

mining data analyse twitter social howto example event product interaction tweet python article option publisher development code share message internet text engage


RFC 4515 - Lightweight Directory Access Protocol (LDAP): String

http://www.faqs.org/rfcs/rfc4515.html

Saved by uncleflo on February 7th, 2018.

This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Lightweight Directory Access Protocol (LDAP) search filters are transmitted in the LDAP protocol using a binary representation that is appropriate for use on the network. This document defines a human-readable string representation of LDAP search filters that is appropriate for use in LDAP URLs (RFC 4516) and in other applications.

ldap document directory protocol string rfc standard technology community request discussion improvement improve specification binary representation search filter url application howto reference lookup internet suggestion administration


Instapaper

https://www.instapaper.com/

Saved by uncleflo on December 28th, 2017.

Save all of the interesting articles, videos, cooking recipes, song lyrics, or whatever else you come across while browsing. With one click, Instapaper lets you save, read, and manage the things you find on the Internet. Instapaper syncs the articles and videos you save so that they’re waiting for you on all your devices - iPhone, iPad, Android, or Kindle. You can read anything you save, anywhere and anytime you want, even offline! Find that great quote you want to remember and share? Instapaper makes it easy to highlight and comment on text in any article so you can easily store it, retrieve it, quote it and share it.

social media video song lyrics browse manage internet synchronize article device save offline anywhere read share highlight comment interesting bookmark mark personal workflow subscription service convenience reader cook lookup reference


Add N Edit Cookies

https://addons.mozilla.org/en-US/firefox/addon/add-n-edit-cookies/

Saved by uncleflo on June 30th, 2017.

Cookie Editor that allows you add and edit "session" and saved cookies.

firefox plugin addon tool add-on module computer desktop internet install developer test development cookie technology change alter


StopTheHacker

https://www.stopthehacker.com/

Saved by uncleflo on June 27th, 2017.

Based in San Francisco, California, StopTheHacker is one of the tech industry’s most respected leaders; a provider of SaaS services focused on cyber warfare in the arenas of web malware, security and reputation protection. StopTheHacker’s Artificial Intelligence and Machine Learning based technology is supported by the National Science Foundation and has won multiple awards since 2009. StopTheHacker has become widely recognized globally, protecting website owners ranging from large multi-nationals to web hosting companies and small business owners, all who are vulnerable to malicious hacker attacks.

reputation website hacker prevention security hack technology industry company support service cyberattack warfare online internet global protect administration prevent preventative saas lookup list analysis web blacklist award


OWASP - Web Application Security Testing Cheat Sheet

https://www.owasp.org/index.php/Web_Application_Security_Testing_Cheat_Sheet

Saved by uncleflo on June 27th, 2017.

This checklist is intended to be used as an aide memoire for experienced pentesters and should be used in conjunction with the OWASP Testing Guide. It will be updated as the Testing Guide v4 is progressed. The intention is that this guide will be available as an XML document, with scripts that convert it into formats such as pdf, Media Wiki markup, HTML etc. This will allow it to be consumed within security tools as well as being available in a format suitable for printing. All feedback or offers of help will be appreciated - and if you have specific changes you think should be made, please log in and make suggestions.

owasp security application checklist prevention technical development cheatsheet online information security information prevent preventative website administration harden guide community script experience offer production internet tool


Just Join Me to Make Difference with Screen Share

https://www.join.me/

Saved by uncleflo on May 15th, 2017.

As if video didn’t make meetings engaging enough, join.me offers video bubbles - simple, light, floating visual images of you and the people you are meeting. Users can view live video bubbles of one another during video-only meetings or while simultaneously sharing their screens. All our advanced audio features are included standard in your join.me PRO or BUSINESS license. This includes local conference numbers in the U.S. and 50+ countries, optional toll-free numbers, and audio controls for meeting hosts such as Active Speaker, Individual Mute and Roll Call. Plus, no matter how everyone joins the meeting, whether by phone or internet calling (VoIP), unlimited bridged audio conferencing means everyone will be on the same call, no matter how they got there!

share screen howto show demonstrate productivity administration tool app development teach meeting schedule connect feature saas video conference call voip user number cloud phone internet communicate business communication speak productive simple


The OAuth 1.0 Protocol

https://tools.ietf.org/html/rfc5849

Saved by uncleflo on May 5th, 2017.

OAuth provides a method for clients to access server resources on behalf of a resource owner (such as a different client or an enduser). It also provides a process for end-users to authorize third-party access to their server resources without sharing their credentials (typically, a username and password pair), using useragent redirections.

client access server resource oauth rfc protocol description technical internet standard specification owner authorize credentials share request token login authenticate


Assigned Internet Protocol Numbers

http://www.iana.org/assignments/protocol-numbers/protocol-numbers.xml

Saved by uncleflo on February 8th, 2017.

In the Internet Protocol version 4 (IPv4) [RFC791] there is a field called "Protocol" to identify the next level protocol. This is an 8 bit field. In Internet Protocol version 6 (IPv6) [RFC2460], this field is called the "Next Header" field.

administration server network infrastructure data protocol number assignment iana assign field value reference list lookup standard world internet


Transaction Internet Protocol, Version 3.0

https://www.ietf.org/rfc/rfc2371.txt

Saved by uncleflo on December 2nd, 2016.

This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited.

document internet transaction protocol version standard description ietf organization official request community tip technical howto server distributed


The Transaction Internet Protocol in Practice: Reliability for WWW Applications

http://www.vs.inf.ethz.ch/publ/papers/MaluTransactIntProt.pdf

Saved by uncleflo on December 2nd, 2016.

One of the most interesting domains of future Internet applications will be located in the area of electronic commerce, where online products and services are offered. Products of value are accounted by monetary transactions, involving a bank or credit card service to handle the electronic cash flow. To achieve a reliable and consistent flow of information in these applications, the concept of transactions has been proven to be the right choice.

transaction tip protocol description example test internet practice www application online multiple adminsitration research development security analysis reference paper document howto pdf download useful


The HTTP OPTIONS method and potential for self-describing RESTful APIs

http://zacstewart.com/2012/04/14/http-options-method.html

Saved by uncleflo on December 2nd, 2016.

The OPTIONS method is a somewhat obscure part of the HTTP standard that could be used today with a strong impact on the interconnectedness of the interwebs while requiring minimal effort. It's role is well defined in RFC2616, yet no web services that I can find are taking advantage of it. What is the HTTP OPTIONS method? To quote the spec: This method allows the client to determine the options and/or requirements associated with a resource, or the capabilities of a server, without implying a resource action or initiating a resource retrieval. Minimally, the response should be a 200 OK and have an Allow header with a list of HTTP methods that may be used on this resource. As an authorized user on an API, if you were to request OPTIONS /users/me, you should receive something like...

http options rest api self describe description resource data access server methodology capability internet transfer automatic call administration development


Tech firms seek to frustrate internet history log law

http://www.bbc.com/news/technology-38068078

Saved by uncleflo on November 23rd, 2016.

Plans to keep a record of UK citizens' online activities face a challenge from tech firms seeking to offer ways to hide people's browser histories. Internet providers will soon be required to record which services their customers' devices connect to - including websites and messaging apps. The Home Office says it will help combat terrorism, but critics have described it as a "snoopers' charter". Critics of the law have said hackers could get access to the records.

technology vpn history log firm company bbc provider internet record isp uk world connection monitor article law order


WebSocket.org - Echo Test

https://www.websocket.org/echo.html

Saved by uncleflo on October 21st, 2016.

The first section of this page will let you do an HTML5 WebSocket test against the echo server. The second section walks you through creating a WebSocket application yourself. You can also inspect WebSocket messages using your browser.

websocket internet web socket test simple demonstration code html javascript js howto browser client server learn explanation guide


WebSockets

https://www.fullstackpython.com/websockets.html

Saved by uncleflo on October 21st, 2016.

A WebSocket is a standard protocol for two-way data transfer between a client and server. The WebSockets protocol does not run over HTTP, instead it is a separate implementation on top of TCP. A WebSocket connection allows full-duplex communication between a client and server so that either side can push data to the other through an established connection. The reason why WebSockets, along with the related technologies of Server-sent Events (SSE) and WebRTC data channels, are important is that HTTP is not meant for keeping open a connection for the server to frequently push data to a web browser. Previously, most web applications would implement long polling via frequent Asynchronous JavaScript and XML (AJAX) requests as shown in the below diagram.

websocket socket remote communication technology http establish application webserver data channel development administration python script howto code server nginx fullduplex internet tech ajax javascript


How to Recover Your Firefox Session When All Hope is Lost - TechRant

http://techrant.co.uk/2012/03/how-to-recover-your-firefox-session-when-all-hope-is-lost/

Saved by uncleflo on September 8th, 2016.

Last week my house had some electrical issues, and our landlord came round to take a look at things. During this time, my computer got turned off without warning when a fuse was removed. It recovered fine, but next time I went to shut down in a hurry, Firefox was hanging around, and I wanted it dead. I chose to kill it and shut down—a mistake I would soon regret.

recover firefox session rant technology internet data restore migrate operating system computer destroy lose software configuration administration


Welcome to Schema.org

http://schema.org/

Saved by uncleflo on July 19th, 2016.

Schema.org is a collaborative, community activity with a mission to create, maintain, and promote schemas for structured data on the Internet, on web pages, in email messages, and beyond. Schema.org vocabulary can be used with many different encodings, including RDFa, Microdata and JSON-LD. These vocabularies cover entities, relationships between entities and actions, and can easily be extended through a well-documented extension model. Over 10 million sites use Schema.org to markup their web pages and email messages. Many applications from Google, Microsoft, Pinterest, Yandex and others already use these vocabularies to power rich, extensible experiences. Schema.org is sponsored by Google, Microsoft, Yahoo and Yandex. The vocabularies are developed by an open community process, using the public-schemaorg@w3.org mailing list and through GitHub. A shared vocabulary makes it easier for webmasters and developers to decide on a schema and get the maximum benefit for their efforts. It is in this spirit that the sponsors, together with the larger community have come together, to provide a shared collection of schemas.

schema data information definition collection community development administration creation structured internet understand machine interpretation automation vocabularies site application documentation app developer develop process


Outlook.com Smart Network Data Services

https://postmaster.live.com/snds/index.aspx?wa=wsignin1.0

Saved by uncleflo on July 18th, 2016.

Deliverability to Outlook.com is based on your reputation. The Outlook.com Smart Network Data Services (SNDS) gives you the data you need to understand and improve your reputation at Outlook.com. But just looking at the data isn't enough! Maintaining a good reputation is a lot of work. You should use this data to keep your mailing lists clean and to monitor the IPs you control for unusual behavior. Reputation is always the responsibility of the sender. SNDS gives senders access to detailed data about individual IPs, and it also includes our Junk Email Reporting Program, which lets you receive reports when users junk your messages. Now you can view IP data and manage feedback loop settings from one convenient website.

reputation management outlook reference preview assess commercial network data service smart reaction send mail benefits description monitor server administration internet safety protect responsible settings behavior report deliver business


USB tethering with android phone--question

http://ubuntuforums.org/showthread.php?t=2245059

Saved by uncleflo on April 13th, 2016.

I'm trying to set up USB tethering between my galaxy s2 and my ubuntu laptop. I'm using the following how-to: https://wiki.archlinux.org/index.php/Android_tethering. At one point it says to run ip link in a terminal, and then: "You should be able to see a usb0 or enp?s??u? device listed like this (notice the enp0s20u3 device)." But neither of these devices show up in the output when I run ip link. The laptop recognizes my phone when I connect it via USB, so I'm wondering if there's some way to get the device to show up.

ubuntu share sharing mobile gsm tethering internet howto tutorial forum question galaxy responses laptop android archlinux linux community administration help