Photo gallery Html /Javascripts

Looking for free JavaScript & CSS photo gallery, Lightweight Photo Grid Gallery With Lightbox – grid-gallery, Pure JavaScript / CSS Powered Photo Gallery Popup – zoomwall.js, Responsive Justified Photo Gallery In JavaScript – flow-gallery, Responsive Photo Gallery & Lightbox – FG-Gallery, Versatile Mobile-friendly Photo Gallery – Natural Gallery JS, Responsive Polaroid Gallery With Lightbox Integration – Vintalight.js, Create Thumbnail Grid with Expanding Image Preview Using Gallerly.js, Pure CSS Photo Gallery with Image Lightbox Support to use for your HTML website.…

Protecting your WordPress Site from Hackers

A lot of website owners don’t think about keeping their WordPress sites secure until it’s too late. The best time to do something about a hack is before one takes place. Luckily, there are a variety of things you can do to your WordPress site to elevate your levels of security. Taking a proactive approach to website security is one of the best things you can do for your website and your sanity. No one wants to wake up in…

How to find your Google Map ID

Find google map ID

Are you looking for the place ID of a specific place? Use the place ID finder below to search for a place and get its ID: You might be in middle of configuring some widget or functionality that requires you to enter your google location ID. How about if u use this Google place id finder, U just put your place and find your ID  as simple as that. Examples of Place IDS A place ID is a textual identifier…

The Uganda Computer Misuse Act law 2011

SUPPLEMENT No. 2 14th Febuary, 2011. ACTS SUPPLEMENT to The Uganda Gazette No. 10 Volume CIV dated 14th February, 2011. Printed by UPPC, Entebbe, by Order of the Government. Act 2                               Computer Misuse Act 2011 THE COMPUTER MISUSE ACT, 2011. ARRANGEMENT OF SECTIONS. PART I—PRELIMINARY.   SCHEDULE. Currency point. THE COMPUTER MISUSE ACT, 2011 An Act to make provision for the safety and security of electronic transactions and information systems; to prevent unlawful access, abuse or misuse of information…