Month: September 2008

H

How to check and stop if DDoS attack is going on.

Distributed denial-of-service attacks In a distributed attack, the attacking computers are often personal computers with broadband connections to the Internet that have been compromised by viruses or Trojan horse programs. These allow the perpetrator to

H

How can I repair corrupt MySQL tables?

How can I repair corrupt MySQL tables? Every so often, MySQL tables have a way of corrupting themselves. MySQL offers a quick and painless method of repairing those tables.

Google Chrome

Anyone not living under a rock this past week will know that Google have released an early beta of their own browser, Chrome. Now that they’ve improved the EULA, I’ve… More »