The cart is empty
09
Aug

Discovery of OpenSSH Vulnerability: regreSSHion (CVE-2024-6387)

A critical vulnerability in the OpenSSH server (sshd) named regreSSHion (CVE-2024-6387) was recently discovered. This vulnerability allows remote code execution without authentication, granting full root privileges. It affects the default configuration and requires no user interaction, posing a significant risk of exploitation. Immediate updates are recommended. More information at: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2024-6387
09
Aug

Starting in August, it will be necessary for ad codes in Sklik to include the consent parameter

Starting August 1, 2024, for Seznam's conversion and retargeting codes to function correctly, they will need to include the consent parameter with a value of 1. Through this parameter, advertisers inform Seznam whether the user has given consent for targeted advertising or conversion tracking. For more information, please refer to Seznam's blog. For websites and e-shops under…
09
Aug

Google Changes Plans and Will Not End Support for Third-Party Cookies in Chrome

Google has changed its plans and will not end support for third-party cookies in its Chrome browser as originally planned. Instead, the company has decided on a new approach that will give users greater control over their privacy while browsing the internet. This decision represents a significant shift in Google's approach to privacy protection and brings relief…
08
Aug

meta name="RATING" content="RTA o co jde?

An alternative title for this article could be "How to Protect Children from Online Pornography." Let's admit it, we can’t fully achieve this. However, we can help limit inappropriate content from both the webmaster's and the parents' sides. The American Association of Sites Advocating Child Protection (ASACP) developed the RTA meta tag, which allows for better filtering…
08
Aug

How to stop website spamming

Let's approach website spamming objectively and discuss how to defend against bot attacks and identify weak spots. The most common types of spam include registration spam, comment spam, post spam, and contact form spam. Nowadays, custom-made websites are rare, and most sites are built on well-known CMS systems like Wordpress or Joomla, or discussion forums like PHPBB,…