Blog

New, update and tricks!


As basic introduction on how to integrate CSS into your HTML page CSS.

Continue reading...

In this sixth tutorial we will get a deeper understanding of the CSS selector and introduce the ids and class. We will also take a quick look at two new HTML tags, the div and span tag.

Continue reading...

In this fourth course we will take a look at ordered list and unordered list.

Continue reading...

In this course we will created a page layout with a header, footer and two columns, one for content and the other one for a menu.

Continue reading...

Cette semaine, nous comparons le poids d’un appel téléphonique contre celui d’un courriel. Quand devrions-nous utiliser les courriels et comment les appels téléphoniques peuvent-ils aider au développement de votre entreprise.Let’s compare the weight of a phone call versus an email. When should we use email, and how can a phone call help your business.

Continue reading...

Effective on July 1st 2014, a new law comes into effect. This law aims to combat spams, phishing and reduce the transmission of junk mail. This new law C-28 will result in many changes to achieve your mass mailings. In this article we provide you some tips that will help you comply with the new law.

Continue reading...

Most businesses hang on to too much data for too long. And it’s often data that they don’t need. Or worse, didn’t realize they even had. So do a spring-cleaning. Do an inventory of all your data and everywhere you keep it.

Continue reading...

So what is the dreaded DDoS? A Distributed Denial of Service attack usually starts with hackers infecting thousands or even millions of unprotected servers and personal computers and turning them into zombies or bots. All these botted computers combine to create a massive network or botnet of compromised computers that will do whatever the hacker, sometimes called a bot herder, asks them to.

Continue reading...

Note that Astral Internet customers can rest easy when it comes to the latest SSL vulnerability: our customers will be happy to learn that they are already protected from POODLE, as all of our shared cloud hosting clients (and clients with service included) are patched to protect against the POODLE security flaw.

Continue reading...

Ever wondered what is Cloud computing… In this blog we’ll explain briefly what is the in and out of Cloud computing and which technology involve behind the scene to make it work.

Continue reading...