Blog

New, update and tricks!


In this blog we will learn how to use the anchor tag in order to navigate around your site and throughout the web.

Continue reading...

Ours days, it’s hard to find a web site that doesn’t have any images. Adding image to your site will add a little wow effect, and it’s quite easy to do. In order to star placing image on screen, we’ll need to use a new tag; the “img” tag. In this course, we will be using four different attribute in the img tag to set the height, width, alternate text and finally the image itself.

Continue reading...

As basic introduction on how to integrate CSS into your HTML page CSS.

Continue reading...

In this sixth tutorial we will get a deeper understanding of the CSS selector and introduce the ids and class. We will also take a quick look at two new HTML tags, the div and span tag.

Continue reading...

In this fourth course we will take a look at ordered list and unordered list.

Continue reading...

In this course we will created a page layout with a header, footer and two columns, one for content and the other one for a menu.

Continue reading...

Cette semaine, nous comparons le poids d’un appel téléphonique contre celui d’un courriel. Quand devrions-nous utiliser les courriels et comment les appels téléphoniques peuvent-ils aider au développement de votre entreprise.Let’s compare the weight of a phone call versus an email. When should we use email, and how can a phone call help your business.

Continue reading...

Effective on July 1st 2014, a new law comes into effect. This law aims to combat spams, phishing and reduce the transmission of junk mail. This new law C-28 will result in many changes to achieve your mass mailings. In this article we provide you some tips that will help you comply with the new law.

Continue reading...

Most businesses hang on to too much data for too long. And it’s often data that they don’t need. Or worse, didn’t realize they even had. So do a spring-cleaning. Do an inventory of all your data and everywhere you keep it.

Continue reading...

So what is the dreaded DDoS? A Distributed Denial of Service attack usually starts with hackers infecting thousands or even millions of unprotected servers and personal computers and turning them into zombies or bots. All these botted computers combine to create a massive network or botnet of compromised computers that will do whatever the hacker, sometimes called a bot herder, asks them to.

Continue reading...