Internet time

Warning network attacks.
An intrusion into a computer system usually begins with a preliminary assessment of the flaws in the protection of the network perimeter of your server connected to the network. In…

Continue reading →

Hacking sites and CC
It's no secret that there are quite a few hackers on the modern Internet. Some of them are really high-class specialists, well versed in many technologies. Others, on the contrary,…

Continue reading →

Svg as foreboding
Generally speaking, the hype around Scalable Vector Graphics (SVG) began almost immediately after the W3C assembled the SVG Working Group, led by Chris Lilley, and announced the standard. This happened…

Continue reading →

How to study SEO

If you go to any forum, one way or another in contact with the SEO theme, and ask a question like “how to learn SEO?”, Then in 90% of cases the answer will be: “you need to study the forum materials”. I agree 100% that this answer is correct and that, indeed, studying SEO forums you can gather a lot of useful information, but in my opinion, this is not enough for a full SEO study, not to mention integrated Internet marketing. Continue reading

We build a browser-independent site

The last point requires further explanation. Why is displaying information in a text browser so important? I will answer in monosyllables – if your website is an educational institution or a public organization – this is simply necessary for the simple reason that a blind user can be at the computer. In addition, some servers running UNIX do not require a graphical environment, and sometimes you even have to search for information on the Internet from the server console. On the other hand, displaying information in a text browser indicates consistency of information and design. Continue reading

Zaekranye Facetop: helping hand from otherworldly friend

Imagine that the texts, folders, and other objects on your monitor suddenly became translucent, and you saw that another person was sitting on that side of the glass and, pointing at your screen with a finger, rudely controlled your applications. Carroll through the looking glass? Without this, there were some. Continue reading

Setting up equipment for Stream

The article by Peter Didenko “Connecting and saving”, published on the pages of our publication, told about how to save money when connecting to the Stream channel. In today’s article we will talk about what types of equipment are used for various connection options to Stream, and also consider in detail exactly how this equipment should be configured. Continue reading

Offline browser

Today, the software arsenal of any more or less active user of the Global Network consists of a considerable number of various utilities. There are among them an email client, an FTP client, a program for dialing up to the provider, a file download manager, etc. But, of course, browsers take the main place among these programs. Continue reading

1 2 3 10
VPS & nb; & mda h; what it is
Solutions for sharing computer resources into mutually independent virtual machines were developed more than forty years ago, back in the era of mainframes. IBM has developed a special operating system…

...

Spammers began to unite in online clubs
Spammers also know the parable of the broom twigs, which are easy to break individually, but together it is almost impossible. And these bad people, which most normal people hate…

...

Warning network attacks.
An intrusion into a computer system usually begins with a preliminary assessment of the flaws in the protection of the network perimeter of your server connected to the network. In…

...

8 things that in no case can not be done on the Internet, so as not to lose personal data
With the spread of the Internet, the era of accessible content, fast exchange of information and rapid communication at any distance began. However, along with all this came the problems,…

...