Global Internet Hosting

  1. H
  2. ?
  3. Special Offers
  4. free websites help
  5. hosting domains
  6. security
  7. FREE
  8. !!
  9. credits
  10. UPD

we are #1 in
S E C U R I T Y     S T A B I L I T Y    S E R V I C E


Why are Linux Severs the best?
click here for some CLOUDY details storm CLOUDS can bring unnatural disasters


available exclusively through authorized affiliates and resellers.

the original internet whois.. WHO.IS
your client environment info (your browser/system is sending)
HTTP ACCEPT LANGUAGE: en-us,en-gb,en;q=0.7,*;q=0.3
HTTP ACCEPT ENCODING: x-gzip, gzip, deflate
HTTP REFERER (you got here from a link):
check referer status of your browser. go to here

This is what your browser/system transmits to the internet web sites to enable proper communication. This information is NOT a security risk. Without it your requests cannot be tailored to differences in software/platform versions. This information is displayed here as an FYI.

our opinion.. has the easiset fastest and most effective domain name management interface in the world today.
It costs money to manage dns. No matter who you buy your domain name from, YOU WILL SAVE MONEY ONLY WHEN you get your domain name from NAME.COM because..
website design made simple
Q&A   4 STEP website decision   website components   website construction   Learn IT   Your-Website-Valuation   Useful Tools   HowToThis   Super Geek   enjoyable sites  
  • Yes you do. To have a business without a site means you don't really care so much about your customers. It's actually disrespectful not to have one. Word of mouth in the 21st century is mainly electronic. People will expect you to have a website - at least for contact information. If you do not have a website people will wonder "Why not?". Then if anything goes wrong, that "I don't have a website" thing suddenly adds fuel to the fire. Thus, not only is a website a great contact point, it's also good P.R.
  • Yes but only for 3 year contracts and in concert with other services.
  • No. But we do have contacts with a spectrum of designers.

  • Yes. programming, security coding, site and dns management.
  • MAYBE!It's easy enough to put up a simple website on your own and in your own language. But... if you are marketing to more than 1 country, you may need some translation. There is some difference within English languages also.
    But BE WARNED... if you are going to use a database and allow user input & storage in more than 1 language you would be wise to give this 'written-by-a-google-guy' publication a lookover and decide for yourself what your limitations are... CHARACTERSETS & COLLATION
4 STEP WEBSITE DECISION Before you embark on creating or choosing a website, you must first consider a few things. Take some time to read and answer the issues proposed here. This way you will be better able to discuss and decide what would suit you best.
  2. Will this be for personal, small business, or enterprise. Of course there is a range of possibilities within each of these classes but the distinctions are well know. For instance - in the enterprise class, you would have many persons accessing the site as well as probably a firewalled database, billing services, supplier vendor management and real user networking. Small business would generally have growth, marketing and access concerns, netcasting, download services, upload services...
  3. SCOPE
  4. Database needs, transaction point, customer reference & help, sales initiator, language and translation, viewer participation, content provisioning, adwords, affiliations, user input handling, hit logs, device readiness, trademarks and logos....
  6. Hosting itself is relatively inexpensive. You can get started for next to nothing. The nicest thing about the internet is that it is so scalable. BUT STAY AWAY FROM PROPRIETARY THINGS! ALWAYS GO WITH OPEN SOURCE!! Open Source software is out there, its very good, the best and brightest all over the world work with it. AND IT DOESNT CRASH!! With LINUX systems, you can upgrade WITHOUT REBOOTING! and you can use any system to connect to a LINUX server - ANY system. Remember to support your open source server-ware source when you can- its also good karma.
  8. By identifying the TYPES of changes you will make, you will be able to more easily determine what type of hosting platform will work best for you. Have this information ready.
    • frequent changes - means pictures and content on an hourly - monthly basis not to be confused with simply adding on
    • addons/accumulation - means that you will be adding content to your existing site as time goes
    • business growth - means you will not change anything except as your business expands and the changes will reflect that product changes are considered separately and such changes are handled by a product template and have otherwise no effect on your basic site that represents your company
Website Components Your site - other than display visual and text data - must have certain "features" to suit the needs for common practice on the internet. some may apply to you.
  • SECURITY Will you have user input?
  • PRIVACY POLICY How do you handle user input?
  • REFUND/RETURN POLICY Transaction processors/banks require this now. they do not like dealing with chargebacks and complaints.
  • SCALE If you are going to be adding to or predictably expanding your business size, this is usually not a problem given the flexible nature of internet services. but you should consider 1 thing.... throughput / bandwidth
  • TRAFFIC If your site is large and/or popular, you will need to estimate the cost of delivery.
  • Bandwidth is the number of traffic lanes to your site. Think 16 lane freeway. The importance of this aspect is .. how many hits can you take during a short time. if everyone comes to your site during say, holidays, or vacation time, are you offering so much at once that many visitors will get a "timed out".
    Throughput is the amount of data going out (going in is negligible unless people are uploading files to you). this is similar to the electric meter as in kwh. with regard to bandwidth and throughput, considerations are a hosting type choice;
    • shared hosting you are on a server with others and share the same network card (nic) and line, shared ip
    • dedicated hosting you are on a leased server, have your own nic, your own ip, server software generally included by the lessor.
    • server collocation you are on your own server. this is generally what you want if security and/or server software is an issue. you must provide all your upgrades etc.
Website Construction When having your website done, consider that simplicity is better. Consider that the advances in simplicity will be with "css". The future is css.
  • TABLES For simple not complex, many columns or many rows but not so many nested tables. Generally anyone can pick up where you leave off. If you are going over 4 tables a page, perhaps you should have taken a different route.
  • GRID Requires specific software, not expensive, easy to manage, doesnt scale well, the source file is required, software required
  • CSS Larger apps that change or allow customer fits; any professional can pick up; scalable only if created to scale, professionals can easily do this. scaling up can also be accomplished with a combination of tables and css for less cost
  • SPACER Good for advertising but other than that, very very confined, not scale well; source file is required, expensive
  • FLASH The graphical nature of this makes it more expensive as does the software. Not all clients will accept. *Issues with privacy* Flash is good for presentations but recently privacy concerns are a really big issue and we can no longer recommend this.
  • TEMPLATED This "instant" site type has big cost advantages and "up and going now" advantages. Some hosts with site wizards require a contract, some cost an extra price. But in either case, you need to check the host rates out real good in case you can't "take it with you" if you move.
excellent study materials for learning computer and internet 'stuff'

Sooner than later you are going to need to know how your website is performing. There are many such services and feedback programs available and you will need to know which ones will work for you IF you are intending to develop your readership, exposure, customer base using the built in aspects of the internet - as opposed to a "hands on personal contact system". Whatever you decide to use, you can go to THIS SITE for some RESULTS information. And finally, one thing you should be warned about... MANY COOKIE TRACKING AND SO-CALLED HELP SITES AND POPULAR SITES DO MORE TO ASSIST YOUR COMPETITION THAN HELP YOU - IN FACT THEY "HURT YOU". ie.. if you think you are getting EXPOSURE FOR FREE, you had best be aware that the provider company may very well be selling your hit and source information to a larger company. AVOID EXPOSURE DATA ENABLEMENT ON THE FACE OF "CORPORATE" SITES! Just figure that wallstreeted companies would sooner feed on you than help you.

Good security is simple.

GET TO KNOW DNS SECURITY DNSSEC: The Protocol, Deployment, and a Bit of Development

Fact is, if you want something to the same way and well all the time...


no ssh access to root
no external access to SQL
all user names include numbers
smtp relay closed
open base dir YES
all inputs screened with SSS
SSH requires key
all sessions managed with IP, TIME MANAGEMENT, AUTO VERIFY

Getting paid?
This server is immune to DOS attacks, SQL Injection, Brute Force Attacks, dictionary attacks, buffer overflows, DNS attacks, WEB APPLICATION WEAKNESSES!, teardrop, chargen, storm...

14 Feb 2014  
New Internet Explorer 10 zero-day exploit targets U.S. military   They done did it agin!
"Hackers are actively exploiting a newly discovered zero-day flaw within the browser Internet Explorer 10..." WAIT! THERE'S MORE! " to reproduce a successful infection on Windows 7, Internet Explorer 10 with the latest version of the Flash Player. As Segura notes, the security flaw is "a use-after-free bug that gives the attacker direct memory access at an arbitrary address using a corrupted Adobe Flash file. It then bypasses both Address Space Layout Randomization (ASLR) and Data Execution Prevention (DEP)." Why does that not surprise us? read the article!

Good security is both simple and inexpensive. One of the BEST ON THE MARKET today is VIPRE INTERNET SECURITY! IT WORKS.

1 Feb 2014  
Hackers hit Yahoo, company warns millions of users to change passwords   "Yahoo is telling many of its 273 million email users to reset their passwords after hackers stole their data. The hackers could use the information to get into bank and credit card accounts. John Blackstone reports."

tuesday dec 24 2013  
Target hackers stole encrypted bank pins   "The hackers who attacked Target Corp. and compromised up to 40 million credit cards and debit cards also managed to steal encrypted personal identification numbers (PINs), according to a senior payments executive familiar with the situation."

special comment from this host: There is absolutely no excuse for this. NONE. Unless this was a subcontractor for the nsa tracking credit card purchases running a con on the side (unlikely and only remotely possible - they do track credit card purchases and have for a long time), someone would have to be STORING PIN NUMBERS! If storing pin numbers is the case, then someone has violated the pin security protocol. The reason for pin numbers in the first place was as an antidote against the compromise of stored credit card numbers. This quote is your proof of that.

"During that time the customer's information flows through the network and is recorded, sometimes only briefly, on computers within the system controlled by payment processing companies. Retailers can store card numbers and expiration dates, but they are prohibited from storing more sensitive data such as the security code printed on the backs of cards or other personal identification numbers."

Dec 10 2013  
Microsoft Patch Tuesday   "quoteMicrosoft released eleven new security bulletins for the December Patch Tuesday, closing out 2013 with 106 security bulletins."

DEC 5 2013  
JPMorgan Chase admits network hack; 465,000 card users' data stolen   "It's not yet clear how hackers were able to breach the bank's network, or what information was specifically taken. But the concern is that though card data is encrypted, personal data may have been stored in plain text files."

December 4 2013 Violet Blue for Zero Day 
Two million stolen Facebook, Twitter, Yahoo, ADP passwords found on Pony Botnet server   "The ninth top domain from which passwords were stolen was Automatic Data Processing, Inc. (ADP), which is one of the largest providers of payroll services to most Fortune 500 businesses and at least 620,000 business organizations worldwide."

By Jose Pagliery @Jose_Pagliery 4 December 2013  
2 million Facebook, Gmail and Twitter passwords stolen in massive hack   "The massive data breach was a result of keylogging software maliciously installed on an untold number of computers around the world, researchers at cybersecurity firm Trustwave said. The virus was capturing log-in credentials for key websites over the past month and sending those usernames and passwords to a server controlled by the hackers."

Sun Oct 13 2013  
Adobe Breach Impacted At Least 38 Million Users   "In a breach first announced on this blog Oct. 3, 2013, Adobe said hackers had stolen nearly 3 million encrypted customer credit card records, as well as login data for an undetermined number of Adobe user accounts."

Fri July 11 2013  
U.K. Ministry of Defence hit by cyberattack, data stolen   "Government departments are also targeted via attacks on industry suppliers which may hold government information on their own systems," the report said.

Fri July 10 2013  
Microsoft admits Internet Explorer flaw 'targeted' by hackers  Microsoft admitted this week that hackers had launched "targeted attacks" against its customers. "An attacker who successfully exploited this vulnerability could take complete control of an affected system," the security bulletin noted.

Tue 12 March 2013  
CELEBRITY ACCOUNTS HACKED - no big deal!!  The latest news is not about internet security - it is about password malpractice. THE PROBLEM IS OBVIOUS! More than likely someone operated these accounts on behalf of the celebrity and did not use good passwords. THE SOLUTION IS SIMPLE!

  • use a password protector like Password Agent
  • do not do business with dumbies that do not employ captcha and/or login repeat+track+block+notify

Yes. It really is that simple and there is NO EXCUSE for having your account broke into.

Fri Feb 15 2013  
Facebook says it was a target of sophisticated hacking  With as many safeguards as are easily available. This sort of thing should never happen and would probably not have happened had responsible persons taken the simple right and reasonably priced precautions. One of the BEST ON THE MARKET today is VIPRE INTERNET SECURITY! IT WORKS.

Sat Feb 09 2013  
LIES, DECEPTIONS AND INSINUATIONS FROM HACKED CORPORATE MEDIA  In the last 4 months, major u.s. media has made questionable claims about security concerns. The reality is, they are incompetent about their systems. And they want to blame it on china. Yet the u.s. media has shown no clear and convincing evidence that this is true. The more likely truth is that u.s. media is lying and putting out false information to alarm a gullible public into giving up the freedom of speech the internet has to offer. This system has been targeted for years from china, u.s., eastern bloc, eastern med, and more and has never been hacked. The key to this success is the use of efficient security checkpoints and simplicity of coding and most of all, LINUX SYSTEMS.

Sunday Jan 29 2013  
SCOTUS SMACKED  For whatever reason, protesters have taken to make their presence felt and their voices heard the electronic way at the to let their voices be heard.

Sunday Jan 13 2013  
M.I.T. HACKJOB TRIBUTE TO AARON SCHWARTZ  Apparently legalistic professionals who lack sufficient talent to work for the good of freedom of the public domain and keep things simple have decided to make up for their lack of talent by threatening the lives of an emerging youth who would rather live in a fairer sharing world than their hording predecessors. So while wallstreet is able to swindle billions from employees and home-owners, their protectors seek to balance that corrupted scale by placing upon the economic victims the life-sentences that should otherwise have gone to wallstreet economic terrorist kingpins.

Sunday Jan 13 2013  
US DHS reports java security issue!   Javascript is NOT the same as JAVA. For the time being you need only disable the java plugin on your browser. This SHOULD NOT disable java script (for banking and other site enhancements including content). If it does also disable your javascript then get the update. As reported in the Oracle site "These vulnerabilities are not applicable to Java running on servers, standalone Java desktop applications or embedded Java applications. They also do not affect Oracle server-based software" and "Note: JDK and JRE 6, 5.0 and 1.4.2, and Java SE Embedded JRE releases are not affected.". Furthermore Oracle says "To be successfully exploited, an unsuspecting user running an affected release in a browser will need to visit a malicious web page that leverages these vulnerabilities.". Following your update, the label in your browser should read ...7 U11

Thursday June 23 2011   LULZSEC hits AZ Dept of Public Safety! After a string of unbelieveable hits against systems you would suppose couldn't be hacked into... VOILA! US? NEVER BEEN HACKED. We keep things simple."

Thursday June 16 2011   Citi Credit Card Hack Bigger Than Originally Disclosed!! Oh no! Say it isn't so! Once Again.. . WE HAVE NEVER BEEN HACKED. Reason? "We keep things simple."

Tuesday April 05 2011   MAJOR U.S. PERSONAL EMAIL HIJACKING /BE PREPARED TO BE FISHED/PHISHED (robbed again)!! Now the hijackers know where you have your accounts... Spam in the u.s. by major corporations made legal? major corporations dont like competition - so they outlaw spam but may be doing it themselves thanks to the help of "their" reps in congress. but now, the price is being paid again by to article

Friday December 03, 06:16PM   MICROSOFT FUMBLES YET AGAIN! " attacker can bypass Internet Explorer Protected Mode and gain elevated privileges once he's successfully exploited a bug on the system."link to article    full details

2010 INTERNET SECURITY GETS A BREAK! Security costs and measures exacerbated by many prevailing certificate authorities now face REAL COMPETENCE AND PRICE COMPETITION. read about Camellia

June 3 2010   Google Dumps Microsoft Windows Company-Wide -- Blames Windows For China Hacking Attack SuperSecurityScripter.php™ PREVENTS THIS SORT OF THING! WE USE IT!! AND SO DO OUR CUSTOMERS.

August 2 2009 Security experts find flaws in cloud computing. not to worry - if you need cloud computing, have plans detailed and checked out before implementing.

January 20 2009  4 hackers break into 3 large companies and collect data on 130,000,000 credit cards.  Hackers used SQL injection then a trojan.

January 11, 2009 continuing problems with "other" operating systems.. Storm worm cracked, but defenses may not fly.  no matter - windows not used here.

SPECIAL ALERT concerning multi-byte character encoding!

12/May/2014 from Threatstop - we're good. 12/May/2014 from SANS - we're green. GREAT SECURITY REFERENCES


Our opinion is that the above listed security organizations have the best interests of security in play.

Security can do four things; #1) scramble a message to prevent anyone between the sender and receiver from reading/understanding a message. #2) routing a message between sender and receiver to prevent anyone from intercepting a message. #3) encase a message so that only the person with the proper tool can open the box to get to the message. #4) verifying that the sender and receiver of a message are who they claim to be.

Unless you are a bank or a state secrets keeper, you have little worry. Security measures to keep you safe are a decade old and work just fine. You are not a good target. The only thing a thief may want from you is a credit card number and everything that goes with it just to grab a few bucks. Targeting individuals is expensive (time consuming). As far as (#1) and (#3) go, 1024 bit encryption works just fine. You have never heard of a case where someone has "cracked" an encrypted anything between yourself and someone else and then proceeded to rob banks accounts from this process. It is all "theoretical" and only theoretical. (#2) is the internet and even though banks and military and govt could run their own lines, they choose not to. They would prefer to claim dominance and ownership of the public internet so don't expect the greed to suddenly stop - which is why we have 1024 encryption. As far a identity verification goes (#4), this is all still complicated BS. DIRT CHEAP LOCAL CERTS WORK FINE! The certs are password protectable and if your device is lost you can quick enough put the brakes on before a good password is cracked.

The current standard for encryption for banking is 2048 bit but is overkill. Banks also use IP checking, IP re-check, username, password, secret Qs & interface pics to get it right - AND IT WORKS FINE! If they offer you anything more at cost, just say no. Also very resource intensive as it tends to really burn up the processor/battery. And the crazies are offering 4096 bit - unless you are cia,nsa, or weapons makers.

 "The bottom line is that PCI compliance does not give you any indemnification or protection; there's nothing in the process that says 'now you're safe. But that's never been something that stores expected, Kelley said. I think where its going to be interesting is to see how the lawsuits go, because a smart lawyer can now say, 'Look, my client was compliant with the industry standard best practice.' So that might impact their liability a little."

================================ 31-May-2011
Yet another media prompted security needless scare and the threat of war that really doesn't exist.

Media hypes on military contractors security issues have misled the public about network security and the real threat. We are NOT talking about internet security. We are talking about VPN,Tunneling type networking.*

The real threat is bad management, over-complexity, and incompetence.

Once again certain organizations and people who are supposedly well-versed in security have reported to media people- who are not at all informed or versed in security and who do not get 2nd opinions or counterveiling opinions - have made an attempt to scare the public into believing that device security is an issue. IT ISN'T. In fact, security is as easy as IP-LOCATION/NAME/KEY/PASSWORD/TIME. This nonsense you hear about with changing some variables every 60 seconds is just that.... NONSENSE. How so? Once a person has obtained authorization on a network to access a specific directory (NEVER PROVIDE ACCESS ON A PER FILE BASIS - for other reasons) a "SESSION FILE" is placed into a system directory. That "SESSION FILE" contains - at a minimum for security - the login time, login name, ip of login, last activity time, and max allowed time in system for the session. Upon every query thereafter made by the user, the system first checks the session file and compares the ip source, validates time period, applies new timestamp for access, and then permissions for service/directory.

Complicated. Convoluted. Misconceived. Utter nonsense.

Changing the aspects of the session every minute is a farce. This style of security is a joke because it pretends to validate a paranoia that somebody has HIJACKED a session. The truth is, there is a greater vulnerability making changes to ongoing changes than there is on leaving what works, work. That is, if you keep jumping a hot potato between hands, the odds of interception are much better. You see, it is the changing of aspects itself that is the vulnerability. Without this change nonsense you are good to go!


So how does a military contractor get hacked? Do not be fooled by what the media says. You cannot steal anything from anywhere unless you are on the inside. What you will hear from competent persons is simply that you have to watch/monitor what is going out. This is very easy to do. ZONEALARM from ZONELABS - an israeli firm - has been doing this very well for y-e-a-r-s. If you want to implement OVERSITE SECURITY you can do so with connection and file access monitoring much like is done with train switching. It really is very very easy and actually, relatively cheap.

This system has been attacked for years and has never been completely compromised.

It's not because we use elaborate complicated solutions.. it's because we use SIMPLE ONES. With regard to computers files systems security, *SIMPLICTY IS A PLUS*, COMPLEXITY IS A NEGATIVE.

The "who are you" something for the retail market is always a big target for the sell-you-by-scaring-you thing and you might be interested in reading a little more on this.

*note that this is for tcp/ip connections and not for socket connections.

security resource information updates


Countries: Malaysia, United Kingdom, Canada, United States, Afghanistan, Aland Islands, Albania, Algeria, American Samoa, Andorra, Angola, Anguilla, Antarctica, Antigua And Barbuda, Argentina, Armenia, Aruba, Asia (Unknown Country), Australia, Austria, Azerbaijan, Bahamas, Bahrain, Bangladesh, Barbados, Belarus, Belgium, Belize, Benin, Bermuda, Bhutan, Bolivia, Bosnia And Herzegowina, Botswana, Bouvet Island, Brazil, British Indian Ocean Territory, Brunei Darussalam, Bulgaria, Burkina Faso, Burundi, Cambodia, Cameroon, Cape Verde, Cayman Islands, Central African Republic, Chad, Chile, China, Christmas Island, Cocos (Keeling) Islands, Colombia, Comoros, Congo, Congo - The Democratic Rep Of, Cook Islands, Costa Rica, Cote D Ivoire, Croatia, Cuba, Cyprus, Czech Republic, Denmark, Djibouti, Dominica, Dominican Republic, Ecuador, Egypt, El Salvador, Equatorial Guinea, Eritrea, Estonia, Ethiopia, Europe (Unknown Country), Falkland Islands (Malvinas), Faroe Islands, Fiji, Finland, France, French Guiana, French Polynesia, French Southern Territories, Gabon, Gambia, Georgia, Germany, Ghana, Gibraltar, Greece, Greenland, Grenada, Guadeloupe, Guam, Guatemala, Guernsey, Guinea, Guinea-Bissau, Guyana, Haiti, Heard And Mc Donald Islands, Holy See (Vatican City State), Honduras, Hong Kong, Hungary, Iceland, India, Indonesia, International (Generic), Iran, Islamic Republic of, Iraq, Ireland, Isle Of Man, Israel, Italy, Jamaica, Japan, Jersey, Jordan, Kazakhstan, Kenya, Kiribati, Korea - North, Korea - South, Kuwait, Kyrgyzstan, Lao Peoples Democratic Republic, Latvia, Lebanon, Lesotho, Liberia, Libyan Arab Jamahiriya, Liechtenstein, Lithuania, Luxembourg, Macau, Macedonia - The Frm Yugoslav Rep Of, Madagascar, Malawi, Maldives, Mali, Malta, Marshall Islands, Martinique, Mauritania, Mauritius, Mayotte, Mexico, Micronesia - Federated States Of, Moldova - Republic Of, Monaco, Mongolia, Montenegro, Morocco, Mozambique, Myanmar, Namibia, Nauru, Nepal, Netherlands, Netherlands Antilles, New Caledonia, New Zealand, Nicaragua, Niger, Nigeria, Niue, Norfolk Island, Northern Mariana Islands, Norway, Oman, Pakistan, Palau, Palestinian Territories, Panama, Papua New Guinea, Paraguay, Peru, Philippines, Pitcairn, Poland, Portugal, Puerto Rico, Qatar, Reunion, Romania, Russian Federation, Rwanda, Saint Barthelemy, Saint Kitts And Nevis, Saint Lucia, Saint Martin, Saint Pierre Miquelon, Saint Vincent and the Grenadines, Samoa, San Marino, Sao Tome Principe, Saudi Arabia, Senegal, Serbia, Seychelles, Sierra Leone, Singapore, Slovakia, Slovenia, Solomon Islands, Somalia, South Africa, South Georgia / South Sandwich Isl, Spain, Sri Lanka, St. Helena, Sudan, Suriname, Svalbard And Jan Mayen Islands, Swaziland, Sweden, Switzerland, Syrian Arab Republic, Taiwan - Province Of China, Tajikistan, Tanzania, United Republic of, Thailand, Timor-Leste, Togo, Tokelau, Tonga, Trinidad And Tobago, Tunisia, Turkey, Turkmenistan, Turks and Caicos Islands, Tuvalu, Uganda, Ukraine, United Arab Emirates, Uruguay, Us Minor Outlying Islands, Uzbekistan, Vanuatu, Venezuela, Viet nam, Virgin Islands, British, Virgin Islands, U.S., Wallis and Futuna, Western Sahara, Yemen, Zambia, Zimbabwe

FREE TURING script (aka reCAPTCHA)

COOKIES MUST BE ALLOWED FOR THIS TO FUNCTION    click the refresh on your browser (or F5) to see the characters change.


ie. this email text item can be scavenged by web bots! (text can be selected)

this one cannot...
This site is designed with menu folding technology- ideal for new and small businesses, advertising, promoting, sales page, resumes, reviews.
FREE website framework. Coming soon.

we recommend!
competitive hardware pricing
complete network resource reference
10 best features of Ubuntu 13.10

interesting websites that you may not otherwise come across but which are worth a look.

Simple Gourmet Grilling

Setp By Step To Learn How To Do Many Of Handcrafts

Are the world's best photographers and painters in Russia?


historical reference to newspapers on the net

follow the money,literally

majestic landscapes

reflections on living and life

GLOBAL INTERNET recognizes the contributions and efforts of others for our success.
start here and quick references /
rounded box corners /
robots.txt files /
css text and image rendering /
css positioning /
document your progress and feed it back /
the consumate professionals resource /
Free Online Sitemap Generator /
get your xml sitemap here /
useful metatag information /
XML sitemap priority settings /
professional programming services / Abdul Rashid Gadhwalla, babuno5
This site runs on Open Source- L.A.M.P. for the world's best in performance, price, and security.


updates log for this site
  • *There was an attempt to commandeer this server beginning on or about 1 Oct 2014. This was discovered in December. We discovered filewrites to log and temp directories. These directories, being somewhat vulnerable for this, remained otherwise fully operational as executables in these directories are not allowed. As a result, public access to our proxy server is now restricted.
  • 2012 nov 1. adjust code to conform to new software. page resize+bgcolor. resize stripes. language typeface resize.
  • 2012 late entry. public access to our DNS is restricted.
  • 2011 may 31.add Yet another media prompted security needless scare and the threat of war that really doesn't exist. item; 31-May-2011
  • 2011 april 6.add .CO SALE SPECIAL
  • 2011 april 5.add SECURITY item of April 05 2011
  • 2011 april 3.add Learn IT
  • 2011 april 3.add [2011040301]


this is a plain text file which will read as html within the tags before the include and the tags within this file.
ie... BOLDitalicunderlined

this is "in the code" content. (avoid if possible! it's always possible) Explanation follows...

add the item NAME to the ACTIVATABLES menu structure
ie.. activatables('page', ['HOME','Q','SPECIALS',{'WEBSITES':['QA','STEP','WEBCO','WEBCON','LEARNIT','VALUATION','TOOLS','HowToThis','SuperGeek','enjoyablesites']},'SECURITY', 'HOSTING_DOMAINS', 'HACKING','FREE','OF_INTEREST','CREDITS','UPDATES']);

add the LINK to the menus list (this is ordinal) ie.. <a href=#page=HowToThis>HowToThis</a>  

add the content to the page where it will ORDINALLY appear so place the content (fetcher) here.
- prior content -
<div class="content" id="HowToThis">
<TABLE style="background-color:white; width: 756px; display: table;" cellspacing=0 cellpadding=0; class="whatever"><TR><TH>

this is "in the code" content. (avoid if possible! it's always possible) Explanation follows...

-following content-
NOTICE! if the id names do not match exactly, the folding will break.

Once in a while we run across some really cool tech stuff and when it is associated with really smart minds of really remarkably talented hard working dedicated people then we pass this plus to you with the hopes that you may discover where all the look and feel of computing originates. Most people dont know this but programming is an art. It is a lot like architecture or music - that everything you work with is pretty much invisible. You can see the results alright but the work to get it there 100% imagination. As much as people care just about the performance of programs, it is always good and interesting to learn or appreciate how it got there.

from a post at to Devik's Home Page

Latest Tech News

RPM repository for Enterprise Linux packages. ELRepo supports Red Hat Enterprise Linux (RHEL) and its derivatives (Scientific Linux, CentOS & others).

Upgrade PHP 5.1/5.2 to 5.3 on CentOS :: Chris Jean

The real masters of the universe are the ones who can see the relativity of the relationships of objects and events which illuminate that which you cannot otherwise see.

Once upon a time, when the internet was new, it was a place of adventure and exploring into a larger world of people with interests and hobbies who would put up a web page or site to be discovered and to share ideas, recipes, events and such things. This went on for many years until the turn of the century when corporate money decided they wanted the internet all for themselves. So they printed their bonds and money and made promises of returns and decided it was better to flood you with information so that you wouldn't have to bother looking about for it. This onslaught of webification has the consequence of obscuring what were once very creative and interesting pages from others who simply wanted to participate in the adventure of discovery and sharing.

From time to time people come across interesting sites and share them with us. We may place links to these sites with the hopes that you may also enjoy the visit.

Science of Cooking: Food Science, Recipes & Projects

Convert just about anything to anything else. Over 5,000 units, and 50,000 conversions.

dedicated to all musics, oldies for specialists and all the people who like music, from all over the world for collectors.

© 2004-2015 Global Internet Hosting™