Profile cover photo
Profile photo
Panacia Softwares
4 followers -
A Step Towards Active Commerce
A Step Towards Active Commerce

4 followers
About
Posts

Post has attachment
Start Your Own E-commerce Business Today!
Visit www.panaciasoftwares.com & Get a quote.
Photo
Add a comment...

Post has attachment
Grow Your Business With Facebook.
www.panaciasoftwares.com
Photo
Add a comment...

Post has attachment
Reach Targeted Audience Through Facebook Ads.
www.panaciasoftwares.com
Photo
Add a comment...

Post has attachment
FUTURE IN INFORMATION TECHNOLOGY
Photo
Add a comment...

Post has attachment
We are living in a crucial time. The future of our planet depends on the actions we take today.
GO GREEN...
www.panaciasoftwares.com
Photo
Add a comment...

Post has attachment
SAVE WATER – Don’t waste the world’s blood.
www.panaciasoftwares.com
Photo
Add a comment...

BEST PRACTICES FOR MANAGING  PASSWORDS

A Strong password is an important protection help you have safer online access. Here are some steps to create a strong password.

- Length- Make your passwords at least eight (8) long.
- Complexity - Include a combination of at least three (3) upper   
  and/or lowercase letters, punctuation, symbols, and numerals.
- The more variety of characters in your password, the better.
- Variation - Change your passwords often. Set an automatic  
  reminder to update passwords on your email, banking, and credit   
  card websites every three months.
- Variety -  Don't use the same password for everything. Cyber 
  criminals can steal passwords from websites that have poor 
  security, and then use those same passwords to target more 
  secure environments, such as banking websites.
- Test your password with a password checker
- Avoid common password pitfalls
- Avoid creating passwords that use:
           A. Dictionary words in any language.
           B. Words spelled backwards, common misspellings, and    
               abbreviations.
           C. Common letter-to-symbol conversions, such as changing  
               "and" to "&" or "to" to "2".
           D. Sequences or repeated characters. Examples:  
               12345678, 222222, abcdefg, or adjacent letters on your  
               keyboard (qwerty).
           E. Personal information that could be guessed or easily  
               discovered. Your name, birthday, driver's license  
               number, passport number, or similar information

Hope by using the above tips you can avoid most of the security attack and you can maintain your accounts in a secured way.
Add a comment...

BEST PRACTICES TO AVOID GUMBLAR ATTACK

Are you facing gumblar attack for your sites ? This is caused by first harvesting your login details and uploading malware and spamware files.Follow the below practices to avoid it.

- You should change the FTP details of your site regularly.
- Reseller account passwords should be changed at regular intervals.
- Protect your system with antivirus and make sure it is installed with   original OS
- Don't share your passwords to more people.
- Backup your sites regularly
- Don't save your passwords in browser
- Keep alphanumeric characters as your password and it should be        
   tough
- Keep all your software updated
- Remove any scripts, plugins, or other software that you are no longer   using
- If you are using any third party software,make sure its plugins are  
  properly used.
- Use proper file permission.Don't give full permission to any file

Hope using the above tips you can avoid most of the gumblar attack and you can maintain your sites in a secured way. 
Add a comment...

BEST PRACTICES TO SPEED UP YOUR WEBSITE LOAD TIMES

Do you want your website to load blazing fast ? This best practices will teach you how to make your website load faster than you ever thought possible. 

- Avoid bad requests by removing broken links that results in 404/410 errors.

- Minimize redirects from one URL to another that cut out additional wait time.

- Compress and scale the images.

- Minify HTML,CSS,JAVA scripts.

- Utilize browser caching.

- Combine images to CSS sprites.

- Reduce the number of files that need to be loaded.

- Remove unused plugins.
Add a comment...

Post has attachment
METHODS TO KILL FORM MAIL SPAMMERS

Spammers adopt a variety of novel techniques to achieve their desired aim. But spammers cannot be given a free ride either, and we need to devise adequate strategies to counter their unethical practices.

Methods Spammers Use To Hijack a Form

- View-Source & URL submission:- From the view source of web pages spammers know the field names as well as form action. Mostly this action page is used to send emails.

- Page submission:- In this case spammers use their own page to  submit the form, and the form action is set to www.yoursite.com/mail.php. This method is used so that the POST validation used in the mail script is over ridden. 

- Manual submission:- spammers manually insert the values and submit the form. This method, however, is rarely used and the solution to block manual submission are limited.


Methods to Block Spam Leads:

- Captcha Code:- Captcha code is one of the best methods used by web masters to avoid spam mail.

- Use “POST” Method:- Always make the form method to POST  and the mail sending script should check only for POST values and not GET or REQUEST method. This will make sure that URL submission won’t execute the script.

- Filter all the inputs:- Filter all the inputs from the form mail as spammers usually insert script tags or URLs in to form.

- SQL Injection:- If the form details are saved in to database use mysql_real_escape_string to avoid SQL injection.

- Blocking IP

- Server side validation
Photo
Add a comment...
Wait while more posts are being loaded