Month: September 2008


How to check and stop if DDoS attack is going on.

Distributed denial-of-service attacks In a distributed attack, the attacking computers are often personal computers with broadband connections to the Internet that have been compromised by viruses or Trojan horse programs. These allow the perpetrator to


How can I repair corrupt MySQL tables?

How can I repair corrupt MySQL tables? Every so often, MySQL tables have a way of corrupting themselves. MySQL offers a quick and painless method of repairing those tables.

Google Chrome

Anyone not living under a rock this past week will know that Google have released an early beta of their own browser, Chrome. Now that they’ve improved the EULA, I’ve… More »