Kraken Review: A

Kraken Review: A

Kraken is a San Francisco-based Bitcoin and cryptocurrency exchange owned by Payward, Inc. Kraken is a general Bitcoin exchange and trading platform, meaning that they are focused on building their system for active traders rather than just people who want to acquire Bitcoin. They work with altcoins, but it is not their focus. As of 4/23/14, they exchange the following cryptocurrencies,
(more…)

 
5 Kudos
You are
awsome 🙂

A detailed look at SatoshiBet’s Minesweeper

 A detailed look at SatoshiBet’s Minesweeper

SatoshiBet has recently released a new Minesweeper game, which many players should already be familiar with. The goal is simple: you simply have to get to the end of the minefield without hitting any bombs.

(more…)

 
9 Kudos
You are
awsome 🙂

CLOUDHASHING.COM REVIEW

CLOUDHASHING.COM is a really big player in the current cloud mining game. They are the biggest cloud mining provider. As stated in the International Business Times magazine they are preparing a $20 Million a Month Bitcoin Mining Operation to even expand further! (more…)

 
5 Kudos
You are
awsome 🙂

PBMINING.COM

PBMINING.COM is a very promising cloud mining provider as of right now. They have the lowest prices per GHS. With every difficulty increase they automatically lower their prices. Mostly they are sold out of mining contracts right after the difficulty increase / price (more…)

 
5 Kudos
You are
awsome 🙂

Protection against harvesting email addresses

Protection against harvesting email addresses

Spam!

We all hate it, but how to fight against it? Well if you are admin of a website you should take an action against harvesting email addresses check Admin Guide bellow, else if you are user you want to check User Guide.

How email harvesting works

 

Admin Guide:

(more…)

 
3 Kudos
You are
awsome 🙂

Restricted Web Access with Htaccess

htaccess

What is Restricted Access and HTaccess?

Access is having restrictions on who is able to view or edit a certain directory in a site. Using HTaccess is one way to restrict access and it utilizes three methods to do so:

1. Username/password level access authorization. This method requires a user to enter a valid username and password to access a certain web page.

2. Rejection or acceptance of connections based on Internet address, hostname or domain name of the Web client.

3. The combination of 1 and 2.

* Note: None of these methods are foolproof.

(more…)

 
3 Kudos
You are
awsome 🙂