Zaekranye Facetop: helping hand from otherworldly friend
Imagine that the texts, folders, and other objects on your monitor suddenly became translucent, and you saw that another person was sitting on that side of the glass and, pointing…

Continue reading →

7 "hard" examples of how in different countries they are trying to control the functioning of the Internet
Recently, politicians, businessmen and even “media” personalities are talking more and more about various aspects of the Internet and, increasingly, the words about it sound in a positive way. The…

Continue reading →

Svg as foreboding
Generally speaking, the hype around Scalable Vector Graphics (SVG) began almost immediately after the W3C assembled the SVG Working Group, led by Chris Lilley, and announced the standard. This happened…

Continue reading →

better coverage

“Half a Century in Space – The Epoch of Search”

On the eve of the atrium of the Novinsky Passage shopping center, Google held an exhibition “Half a Century in Space – Search Epoch”, timed to coincide with the 50th anniversary of the launch of the first artificial Earth satellite. The exposition, covering the period from the first satellite of the 50s to the first private spacecraft of the beginning of the XXI century, is composed of unique photo and video archives previously available only to specialists and rare exhibits of the era of space exploration. Continue reading

Fathers and Sons of the Digital Millennium: Another Brick in the Wall

The emergence of the Internet not only connected nations and continents in a globalized rush, but also inserted its small brick into the eternal wall separating fathers and children, as well as their teachers.

A few years ago, the author of these lines happened to study at a foreign university. In comparison with domestic institutions of this kind, that university was literally crammed with various kinds of high-tech means of facilitating student life. Continue reading

Hacking sites and CC

It’s no secret that there are quite a few hackers on the modern Internet. Some of them are really high-class specialists, well versed in many technologies. Others, on the contrary, have only superficial knowledge. Their tools are utilities written by other people and accompanied by detailed instructions on how to exploit the most common vulnerabilities. However, they both pose a threat to many sites. Continue reading

Features of network monitoring system Nagio
Probably, any network administrator is familiar with the situation when tasks go one after another, and no other resources are allocated for their solution, except for those already available. And…

...

Indices: first step on & nb p; paths to & nb p; speed
Databases are specialized repositories of information, and working with them, we operate with concepts of data sets and operations on these data, forgetting that there is real equipment behind them.…

...

How to increase blog traffic
At this stage of the development of the Internet, the blogosphere is of serious interest from the business. Thus, the value of one unit of the blogosphere, that is, the…

...

Domains with & nb p; exhibitions
Day of national unity for the whole day reduced the already short working week. Holidays, I must say, generally relax great - maybe that is why the flow of news…

...