Menu
Menu
DaniWeb
Log In
Sign Up
Read
Contribute
Meet
Search
Search
About 1,000 results for
security
- Page 1
Image Analysis Using Llama 3.2 Vision Instruct Model
Programming
Computer Science
3 Weeks Ago
by usmanmalik57
… [Hugging Face access token](https://huggingface.co/docs/hub/en/
security
-tokens) to the `InferenceClient` class constructor. Next, call the `chat_completion…
Re: Important web design and development techniques?
Digital Media
1 Week Ago
by adwinafram
Responsive design, intuitive navigation, fast loading speeds, mobile optimization, SEO best practices, user-friendly interfaces, and
security
integration.
Re: What is the best possible way to protect my website?
Hardware and Software
Information Security
2 Months Ago
by Pelorus_1
Ensure the
security
of your website by implementing SSL/TLS for secure data …, make sure to establish strong password policies and conduct regular
security
audits to identify and address potential risks.
Re: What is the best possible way to protect my website?
Hardware and Software
Information Security
2 Months Ago
by Dec0mpiled
… codebase up to date and your dependenices minimal. Have the
security
managed by a professional because people online only rarely know…
Re: What is the best possible way to protect my website?
Hardware and Software
Information Security
2 Months Ago
by sgtamilan
Fantastic advice on safeguarding your website! Your tips are invaluable for ensuring top-notch
security
and protection. Thanks for sharing such expert insights to keep our online presence secure!
“WHEN WILL I GET MY ROBOT?!”
Community Center
2 Months Ago
by Johannes C.
… and regulations, before mass production becomes a reality. Practically speaking,
security
concerns and legal restrictions are perhaps the biggest potential barrier…
Re: What is the best possible way to protect my website?
Hardware and Software
Information Security
1 Month Ago
by MarcoMon
I wanted to ask the same question too. The practices i make (SSL,
Security
Headers, XSS Protection, and sanitation of inputs). And yet there's still a lot of things to cover.
Qwen vs Llama - Who is winning the Open Source LLM Race
Programming
Computer Science
1 Month Ago
by usmanmalik57
… Face User Access tokens](https://huggingface.co/docs/hub/en/
security
-tokens). Next, create a client object for the corresponding model…
Re: What is the best possible way to protect my website?
Hardware and Software
Information Security
1 Month Ago
by adwinafram
The best way to protect your website is by using SSL certificates, regular updates, strong passwords, and robust
security
plugins.
RAG with LangChain and Hugging Face Serverless Inference API
Programming
Computer Science
1 Month Ago
by usmanmalik57
… token from Hugging Face](https://huggingface.co/docs/hub/en/
security
-tokens). **Note:** The codes in this article are run with…
Re: What problems might a business owner face during mobile app development?
Programming
Mobile Development
1 Month Ago
by meyerrluanna
… catch bugs and issues early on. Don’t forget about
security
either. With the rising concerns around data privacy, ensuring the… required regulations (think GDPR for instance) is a must. A
security
breach can hurt not only your app but your brand…
Re: Important web design and development techniques?
Digital Media
1 Month Ago
by afnanshaikh1223
Important web design techniques include responsive and mobile-first design, user-centered UX, fast loading, SEO optimization, and strong
security
practices for a seamless user experience.
Re: What problems might a business owner face during mobile app development?
Programming
Mobile Development
1 Month Ago
by adwinafram
A business owner may face different challenges while creating a mobile app - - User experience design - Platform compatibility - Budget constraints -
Security
concerns Thanks
Re: Googlebot and CORS?
Digital Media
Digital Marketing
Search Engine Strategies
1 Month Ago
by Ashik_6
… IP range is inadvertently being blocked by hotlink protection or
security
settings. Additionally, clearing the CDN cache might help resolve any…
Re: Database Design - Timestamps
Programming
Databases
1 Month Ago
by cored0mp
… of a CPU register these days, **even accounting for a
security
bit and a virtualization bit** Thanks! You've made it…
Re: What is the best possible way to protect my website?
Hardware and Software
Information Security
2 Months Ago
by suwaidi
This encrypts the data transmitted between your website and users, protecting sensitive information like login credentials and payment details.
Re: Cybersecurity path
Hardware and Software
Networking
2 Months Ago
by trueframe
Embark on a cybersecurity path and protect the digital world! Master the skills, defend against cyber threats, and unlock endless opportunities in a high demand, future proof career.
Re: What is the best possible way to protect my website?
Hardware and Software
Information Security
2 Months Ago
by m2host
SSL, Firewall and DDoS protection must be in your web hosting plan. Additonaly you can use 2FA (2 Factor Authentication).
Re: “WHEN WILL I GET MY ROBOT?!”
Community Center
2 Months Ago
by Reverend Jim
Never mind the robots. They've been promising me flying cars since 1950. Where is my flying car? ![Flying_Cars.jpg](https://static.daniweb.com/attachments/3/6e2832c60bf9dbca44507231ce074d07.jpg)
Re: What is the best possible way to protect my website?
Hardware and Software
Information Security
2 Months Ago
by DEEPAK_84
Hide login URL and password protection.
Re: What is the best possible way to protect my website?
Hardware and Software
Information Security
2 Months Ago
by Dani
Hiding the login URL does not really do very much of anything.
Re: Qwen vs Llama - Who is winning the Open Source LLM Race
Programming
Computer Science
1 Month Ago
by Brandon_38
The competition between Qwen and Llama in the open-source LLM race is fascinating to follow! Both models bring unique strengths to the table, making it exciting to see which will emerge as the leader. I appreciate the ongoing innovation in this space, as it pushes the boundaries of what's possible with language models. It will be interesting to …
Re: Can you get a software job right out of college without an internship?
Community Center
1 Month Ago
by Phozellpay
yes they can expect you to have the knowledge. But "internship" means you have the basics but will learn on the job and grow into the work.
Re: Can you get a software job right out of college without an internship?
Community Center
1 Month Ago
by WendyDolan
your proactive approach is great! Working in IT will help you gain experience, and research projects are a good addition to your resume. More projects, even older ones, can still be relevant.
Re: What is the best possible way to protect my website?
Hardware and Software
Information Security
1 Month Ago
by scope_2
Install an SSL certificate to encrypt data exchanged between your website and its visitors. You will be able to protect sensitive information and improve your user's trust at the same time.
Security Camera PCI Express Card
Hardware and Software
Hardware
10 Years Ago
by ColeTechInc
*
Security
Camera PCI Express Card* Any one know where i can find a
Security
Camera PCI Card with 4 Inputs and Audio Input as well that has network capability so i can view it from a IOS or Android App?
Security Alert: Spyware found
Hardware and Software
Information Security
16 Years Ago
by Trinexus
Security
Alert: Spyware found Your computer is infected with last version …
"Security Tools has harmful software" message
Hardware and Software
Information Security
14 Years Ago
by ronnie2123
security
tools has been appeared everytime and i can function right all program they say i must click to it and immeadiately remove it but when i got to click it it appear to be a form of credit tregistry what should i do to fix it
Re: "Security Tools has harmful software" message
Hardware and Software
Information Security
14 Years Ago
by ronnie2123
security
tools has deteced harmful software that can lean to my pc crash
• security - propose an algorithm using IA or Machine Learning for an intru
Hardware and Software
Networking
11 Years Ago
by emeritusbrians
•
security
- propose an algorithm using IA or Machine Learning for an intruder on a network I need a solution this as my thesis
1
2
3
17
Next
Last
Search
Search
Forum Categories
Hardware/Software
Recommended Topics
Programming
Recommended Topics
Digital Media
Recommended Topics
Community Center
Recommended Topics
Latest Content
Newest Topics
Latest Topics
Latest Posts
Latest Comments
Top Tags
Topics Feed
Social
Forums
Top Members
Meet People
Community Functions
DaniWeb Premium
Newsletter Archive
Markdown Syntax
Community Rules
Developer APIs
Connect API
Forum API Docs
Tools
SEO Backlink Checker
Legal
Terms of Service
Privacy Policy
FAQ
About Us
Advertise
Contact Us
© 2024 DaniWeb® LLC