Blog

FeedMerger

FeedMerger

Nezařazené
At Celdy technology, we are proud to have developed a new platform, FeedMerger.cz, for our client, Idewin. This platform represents a significant advancement in processing data feeds from various suppliers for the e-commerce platform CS-Cart Multivendor. FeedMerger.cz is designed to address a range of issues faced by the traditional CS-Cart Multivendor marketplace. Beyond its capability to import data from various feed types - including Google Merchant, Heureka.cz, WooCommerce, and Pohoda - the platform streamlines the data downloading and management processes. The system not only assigns unique product codes but also adeptly handles the merging of identical products, price comparison, linking supplier categories and parameters with the marketplace, performing currency conversions and rounding, and unifying product brands. These features enable Idewin to offer their customers a smoother and more efficient shopping…
Read More
DentalMall

DentalMall

Nezařazené
After one year of hard work we started marketplace for dentists www.dentalmall.cz. It was a challenge to create a system that could be compared with established systems such as amazon.com. The goal was to create a B2B marketplace that would enable dental professionals to obtain offers from individual sellers in one place, save them time choosing products and allow them to share experiences with both products and suppliers.
Read More
Day Counter Widget

Day Counter Widget

Nezařazené
We have created a simple Android Widget for you that is free. It calculates the differences between the current date and the entered date. You can view the result in days, weeks, months or years. You can display weeks, months and years to 2 decimal places. Use the widget to keep track of when an event occurs, how long something takes or when something happened. You can keep track of your children's ages, track the week of your pregnancy or count down the days before a planned wedding. You can install the widget from Google Play.
Read More

Emoticons quickly and everywhere😃👍

Computer tips
It is easy how to make your titles awesome. Just put in them emoticons. How to do it?🤔 If you write text on Microsoft Windows you can put in your text different emoji by keyboard shortcut Win + . (dot). You will get a new window where you can choose emoticons and insert them into your text. It works thanks to Unicode. Unicode is with use since 1991 and is evolving and enriching. In 2020 there was published already version 13. Unicode was designed to allow computer users use other than English characters and to ensure that character written in one system (for example Linux) will show up on other system as the same character. Unicode is expanded through the new version with new characters, symbols and languages. For each…
Read More

Vishing

Security
Vishing is a new important word which is good to know. It’s not important to know the word but it is important to know what is behind this word. The word vishing was made by combination of the words voice and phishing. You probably heard about phishing and you probably even had some phishing emails in your mailbox. The fake emails that want you to enter your bank account credentials are only small part of the phishing. Phishing together with social engineering can make devastating damages – stole money from your bank account, stole sensitive data from your computer or hack whole company network. Phishing can convince you to install harmful application. If you are lucky the application would only use your computer for mining cryptocurrency or sending spam. But…
Read More

Email revolution

Nezařazené
Securing of the email communication can’t go through evolution and there has to be a revolution. Phishing and spam is one a rise. There are attempts how to mitigate spam and phishing by better antispam filters and by technologies like SPF, DKIM and DMARC. Unfortunately these technologies are still only an option and they are not mandatory. When Google claimed that all websites on HTTP protocol will be marked as unsecure and only websites with HTTPS protocol will be shown in "normal way" it started a revolution. All the websites started using secure protocol and even it was possible to obtain a certificate for free. There wasn’t such revolution with emails and it should be. I understand that mandatory validation by SPF and DKIM doesn’t solve all problems. For example…
Read More

What can computer security experts gain from pilots?

Computer tips
At the first sight computer systems and flying are completely different areas. Even though computer security experts can learn something from pilots. Computer security is quite young if you compare it with flying and therefore it is a normal state that government is in state of establishing institutions for fighting the cybercrime. The primary target is to secure government and other state institutions such as healthcare. It is not like in flying that investigation of the accident will help all other pilots to avoid such circumstances. It is partly understandable because the results from investigation can reveal the hole to other hackers but in my opinion there must be in future stronger role of the government in fighting the hackers and helping outside of the government. The second inspiring area…
Read More

Synology Snapshot Replication

Nezařazené
Network Attached Storages (NAS) from Synology have function Snapshot Replication. This service allows you synchronize your data in set-up time interval across several NASes. This function is suitable if you need to have local copy of your data at several locations no meter if it is because of the quick access to files or it is way of backup at several locations. Detailed information for this service is in help but I would like to share my solution when the synchronization didn’t work. We synchronize several areas in five tasks which are started during night. It was interesting that some of the tasks were completed but some of them were finished with error. In the of the Snapshot Replicaiton service was unclear statement „shared folder replication error: ShareReplica 1054„. When…
Read More

Virus alert – img files

Nezařazené
If you get file with img extension, don't open them. You may have in your computer viruses which are not active and then they are harmless. The virus is usually hiden in the software code and is activated by running the program. There are more methods how to do it but the most popular these days are emails with infected files. The file contain the virus or redirects you to a webpage where you download virus and it is activated automaticaly or you must click on the downloaded file. The danger of img files is in good psychological targeting. You get email where is written that you are getting image which contains invoice or whatever. So you see in the email file with img extension and logicaly assume that it may be an image.…
Read More

Network attackers

Computer tips
As you know there are some attackers that may try to break into your network. Although they might use for their attack infected computers from over the world (and it is the most often strategy) sometimes you may encounter attack from multiple computers in one network. I collect the IP address of these attackers and I would like to share the top eleven networks, where there were at least 8 attacks from different computers. I’m just curious if these are broken networks or these networks are owned by some hackers. 185.222.209.X (Netherlands) 21 attacking computers 91.200.12.X (Ukraine) 21 attacking computers 37.49.224.X (Netherlands) 20 attacking computers 141.98.80.X (Belgium) 12 attacking computers 222.52.118.X (China) 12 attacking computers 157.122.148.X (China) 11 attacking computers 185.234.217.X (Ireland) 11 attacking computers 37.49.226.X (Germany) 10 attacking computers…
Read More