I’m Stephen Stanton and I have a growing desire to make computers and technology way more accessible to the average person. What I am willing to do is, replace the frustration that you and your friends probably feel way too often.I will change this with the sense of amazement and confidence that you should feel every day.Fill out the contact form and I will do my best to answer any of your questions.

Monday, December 9, 2013

Google Hacking

Google hacking is the term used when a hacker tries to find exploitable targets and sensitive data by using search engines. The Google Hacking Database (GHDB) is a database of queries that identify sensitive data. Although Google blocks some of the better known Google hacking queries, nothing stops a hacker from crawling your site and launching the Google Hacking Database queries directly onto the crawled content.
What a Hacker can do if your Website is Vulnerable
Information that the Google Hacking Database identifies:
  • Advisories and server vulnerabilities
  • Error messages that contain too much information
  • Files containing passwords
  • Sensitive directories
  • Pages containing logon portals
  • Pages containing network or vulnerability data such as firewall logs.
How to Check for Google Hacking Vulnerabilities
The easiest way to check whether your web site & applications have Google hacking vulnerabilities, is to use a Web Vulnerability Scanner. A Web Vulnerability Scanner scans your entire website and automatically checks for pages that are identified by Google hacking queries. (Note: Your web vulnerability scanner must be able to launch Google hacking queries).
Acunetix Web Vulnerability Scanner includes an offline copy of the Google Hacking Database (GHDB), allowing to identify pages which can be exploited using search engines.
Preventing Google Hacking Attacks
Verify the all pages identified by Google hacking queries. Since these pages generally provide information which should not be found on your web site, you should generally remove such pages from your site. If these pages are required by your site, arrange the page so that it is not indexed by search engines and arrange the wording so that it is not  easy to detect by Google hacking queries.

some of this information was taken from this site: http://www.acunetix.com

Three steps that protect web sites from hackers

You’ve worked hard on your website – so take the time to protect it by implementing basic hacking protections!
In addition to regularly backing up your files (which you should already be doing), use the following three easy steps will help to keep your website safe:

1.make sure any platforms or scripts you’ve installed are up-to-date.  Because many of these tools are created as open-source software programs, their code is easily available – both to good-intentioned developers and malicious hackers.  Hackers can pour over this code, looking for security loopholes that allow them to take control of your website by exploiting known platform and script weaknesses

2. One more important rule is to have a strong password that hackers cannot guess easily
Making sure that passwords are harder to guess will strengthen your site.

3. Change your passwords frequently.

What is the Difference Between Web Design and Web Development

Many people use the two terms “web design” and “web development” interchangeably, but they really do have two different meanings. If you’re looking for a new job or someone to build your website, you need to know the difference

Web Design

Web design is the customer-facing part of the website. A web designer is concerned with how a site looks and how the customers interact with it. Good web designers know how to put together the principles of design to create a site that looks great. They also understand about usability and how to create a site that customers want to navigate around in because it’s so easy to do.

Web Development

Web development is the back-end of the website, the programming and interactions on the pages. A web developer focuses on how a site works and how the customers get things done on it. Good web developers know how to program CGI and scripts like PHP They understand about how web forms work and can keep a site running effectively.

Steps that protect web sites from hackers

You’ve worked hard on your website – so take the time to protect it by implementing basic hacking protections!
In addition to regularly backing up your files (which you should already be doing), use the following three easy steps will help to keep your website safe:

Make sure any platforms or scripts you’ve installed are up-to-date.  Because many of these tools are created as open-source software programs, their code is easily available – both to good-intentioned developers and malicious hackers.  Hackers can pour over this code, looking for security loopholes that allow them to take control of your website by exploiting known platform and script weaknesses
2 If you’re running a WordPress website, you’ll want to look into free plugins like Better WP Security and Bulletproof Security.

Sunday, December 8, 2013

Why do peaple hack web sites

There are a few reasons why people would hack a website:
  1. Links back to their website
  2. Links to another website (paid for links)
  3. Hijacking your websites traffic
  4. Inject content onto your website
  5. Gain access to paid for items
  6. Gain all registered users email addresses
And of course, just for fun.

How to prevent your website from being hacked

Have you ever worried about the security of your WordPress website?
What  precautions have you taken to stop people hacking your website?
We all know that  life can become far more stressful if the website was to get broken into.
Not only would you have to figure out how they did it, but you would have to repair all the damage!
 I will explain how you can take steps to stop a hacker from breaking into your website
n most cases, the people that are trying to break into your website are actually not people, they are robots.
These bots are set up to trawl the internet for admin screens and try to log into them.
The most basic of these bots will go to your login screen, set the username to admin and try some of the most common passwords:
  • password
  • password123
  • hello
  • hello123
  • qwerty
  • qwertyuiop
  • your name
  • company name
Some slightly more advanced robots will add a couple of steps in before they get to the login screen.
First they will crawl the pages www.your-domain.com/author/1, / up to /author/9.
If these pages don’t return a 404 error (page not found), then there is an author set in the database.
They simply take the first name of that author, and try those common passwords with the username set to their first name.
The final (common) method for gaining access to your admin, is by trying to access a file that is known to have issues.More on safe hacking on next Blog

SQL injection

From Wikipedia, the free encyclopedia
Jump to: navigation, search
SQL injection is a code injection technique, used to attack data driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker).[1] SQL injection must exploit a security vulnerability in an application's software, for example, when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and unexpectedly executed. SQL injection is mostly known as an attack vector for websites but can be used to attack any type of SQL database.
Classification of SQL injection attack vectors in 2010
A Classification of SQL injection attacking vector until 2010.
In a 2012 study, security company Imperva observed that the average web application received 4 attack campaigns per month, and retailers received twice as many attacks as other industries.[2]

2 million Facebook, Gmail and Twitter passwords stolen in massive hack ...


Hackers have stolen usernames and passwords for nearly two million accounts at Facebook, Google, Twitter, Yahoo and others, according to a report released this week.

Data breach was a result of key-logging software maliciously installed on a number of computers around the world, researchers at cyber security firm Trustwave said. The virus was capturing log-in credentials for key websites over the past month and sending those usernames and passwords to a server controlled by the hackers.
On Nov. 24, Trustwave researchers tracked that server, located in the Netherlands. They discovered compromised credentials for more than 93,000 websites.This sort of hacking continues to happen on a daily bases.Hackers attack your data base by using sql injections to figure out your password, banking information etc.What can we do about it?The best advice that I can give you is to change your password every month or
two.Don't use the same password for all your accounts.This makes it too easy for hackers to get all of your information.My next post I will talk about what sql injections are.

Some of this information was taken from this web site: money.cnn.com/

Tuesday, November 26, 2013

Web hacking: Is your data really safe,what can you do.

If you think your data is safe,this does not mean your database  has not already been cloned and is  elsewhere ready to be sold to the highest bidder. To make matters worse, only recently, it has been discovered that hackers are not simply selling your data; they’re also selling the fact that you have vulnerabilities to other  hackers, industrial spies or terrorists.What can we do?Here is a solution we can try
The Acunetix WordPress Security plugin is the ultimate must-have tool when it comes to WordPress security. The plugin is free and monitors your website for WordPress security weaknesses that hackers might exploit and tells you how to easily fix them. You can see all your security alerts from your WordPress dashboard.
  This information was taken from http://www.acunetix.com
I will talk some more on web security in my next blogs.Lets keep our sites safe 

Monday, August 26, 2013


AmazonSimpleAdmin lets you easily integrate Amazon products into your wordpress pages.
By using the template feature, you can present the products in different styles on different


Ninite - Update Multiple Apps at Once

This best and, fastest way to update or install software for your new computer,without worrying about add ware or unwanted advertizements,toolbars etc. Ninite downloads and installs programs
automatically in the background.


Sunday, July 28, 2013

How to Make a Wordpress Website

WP Shopping Pages

WP Shopping Pages is a new and powerful affiliate plugin  that creates content-rich Shopping
Pages filled with Amazon, Linkshare and Commission Junction products as well as eBa y
auctions.    It    supports different popular affiliate programs, whose catalogs feature tens of
thousands of different products you could display on your weblogs and all of which will earn
you commission for doing so.

How to Create a Website with Joomla

Here is a video on how to build a website, I thought this may be helpful if you are thinking about designing your own web site or contact me and I can give you some helpful tips

Sunday, July 21, 2013

MaxBlogPress Ninja Affiliate

http://mbpninjaaffiliate.com/index -1.php
Ninja Affiliate is WordPress plugin developed to instantly double or triple your affiliate
marketing commissions with almost no effort on your part.  Using Ninja  Affiliate, you can
automatically convert any keyword in your blog to an affiliate link instantly. You can also
cloak your affiliate links, track them and manage them right from your WordPress text

Tuesday, July 9, 2013

Digg Digg

Digg Digg is a plugin which integrate popular social buttons into WordPress easily with its
all-in-one social vote buttons.  It is able to display counts for popular social butons like Digg,
LinkedIn, Google +1, Reddit, dDone, Twitter, TweetMeme, Topsy, Yahoo Buzz,   facebook
share, facebook like, StumbleUpon, Delicious, Sphinn, Google Buzz, Designbump, WebBlend,
BlogEngage and Serpd

Thursday, July 4, 2013

Wibya Toolbar

This Toolbar enables blogs to integrate Facebook likes, Facebook recommendations,
Twitter feeds and the ability to share through customized web-based toolbar into their blog.This
is a very handy toolbar that every blogger should have.


Saturday, June 29, 2013

Twitter Ultimate

It is a  highly customizable  plugin that displays real  time twitter feed-live tweets ,  incoming
tweets and live tweets.  You  can display tweets from usernames or tweets  that are relevant
to your website content.


Wednesday, June 19, 2013

Facebook Traffic Pop

Facebook traffic pop is a  plugin that create 'popups’ that will allow you to have your users
like your pages.    This generates you free publicity on Facebook with the help of your web
visitors. The plugin is fully customized right from the WordPress admin area.

Monday, June 17, 2013

Facebook Like Box Widget

Facebook Like Box Widget is a social plugin that enables Facebook Page owners to attract
and gain Likes & Recommendation Comments from their own website. The Like Box enables
users to: see how many users already like this page, and which of their friends like it too,
read recent posts from the page and Like the page  with one click, without needing to visit
the page.

Saturday, June 15, 2013

Cyberbullying . So what can be done?

  • Pay Closer Attention -- Reports show that 27% of parents of 13- to 15- year-old teens incorrectly believe that  they know what their children are doing online. Parents need to monitor their children's activity to be able to guard against bullies - or against their children becoming a bully. This could include knowing a teen's passwords and account names or even becoming their friend on social networks.Teens usually have more than one account on there favorite social sites
  • Explain the Consequences -- 47% of teens believe there are no real consequences for cyberbullying. Parents need to explain to teens and younger children that their actions online have as much in the way of consequences as their "real world" actions or share the stories of cyberbullying victims  to get the discussion started.
Watch for Signs -- Victims of cyber bullies display many of the same symptoms and behaviors as traditional victims. Adults should be on the lookout for teens who become withdrawn, sullen, or suddenly spend much less time online. These can all be warning signs of teenagers being bullied.

Twitter Goodies Widgets

 Twitter Goodies Widgets
This plugin will allow you to create any  one of the four Twitter widgets located at twitter's
website twitter.com/goodies/widgetspage  with the friendly wordpress drag & drop
convenience of widgets.    You can save  multiple  themes for your twitter widget and  easly
switch between the different twitter widget types.

Friday, June 7, 2013

Adding a start menu to windows 8

      You have purchased a new computer, and you are now faced with the Start Screen. Does this leave you wondering how to go back in to the Start Menu. The Start Screen has most of the functionality of the old Start Menu, and some new. It takes up the whole screen, has massive icons, and is different from what we know and love.  How do I to get the old one back. Microsoft has removed the code for the classic Start Menu from Windows 8 once and for all. However there are many programs out there.

      Today I’m going to tell you about  Classic Shell, which offers a Start Menu .Shell is a free, open source, customizable Start Menu replacement that can also log you directly into the desktop.

      The first step is to download Classic Shell. You can get the latest version by going to: http://sourceforge.net/projects/classicshell/files/latest/download

Just follow the down load instructions.  Hope this is helpful. If you run into problems,leave a comment and I will try to help you through it

Social Slider

I thought that I would share a word press plugin to help link your social sites.

The Social Slider plugin display on your blog an expandable box, that has links to your
profiles in different social sites.  It  can be easily customized  to include more social site icons
and its position can be changed on your site.

http://wordpress.org/extend/plugins/social -slider-2/

Wednesday, June 5, 2013

Related RSS Plugin

 Here is a some useful infromation on Related RSS Plugin is a Wordpress plugin and it promises to help you automatically create
unique and most importantly relevant RSS feed for every page of your Wordpress site. The
best thing is the RSS feed will be relevant to the page it is placed on, so it will certainly help
your Google rankings!



   Do you find yourself useing  social media a lot. Are you constantly on your phone ,internet  to check your messages and updates? Why not try LinkMe
   LinkMe is a bracelet that will automatically translate and display the messages and alerts from your phone. You can use LinkMe  to display messages from a preferred list of contacts and decide how you would like to be alerted. It links wirelessly with your smartphone through Bluetooth and the Link Me bracelet
If you like computers,come back to get more useful information to enlighten you life and get more information on computer technology.