We work on a & nb p; secure protocol
Imagine this situation. You have a website located on an external server. You, as an administrator, perform certain actions on it, connecting under a certain login and password. The second…

Continue reading →

Fathers and Sons of the Digital Millennium: Another Brick in the Wall
The emergence of the Internet not only connected nations and continents in a globalized rush, but also inserted its small brick into the eternal wall separating fathers and children, as…

Continue reading →

How to understand that someone is following our correspondence on the web and take all necessary measures
In recent years, there are more and more scandals associated with data leakage on the Web and spying on people - both for individuals and for companies or even states.…

Continue reading →

but also among

“Half a Century in Space – The Epoch of Search”

On the eve of the atrium of the Novinsky Passage shopping center, Google held an exhibition “Half a Century in Space – Search Epoch”, timed to coincide with the 50th anniversary of the launch of the first artificial Earth satellite. The exposition, covering the period from the first satellite of the 50s to the first private spacecraft of the beginning of the XXI century, is composed of unique photo and video archives previously available only to specialists and rare exhibits of the era of space exploration. Continue reading

How to understand that someone is following our correspondence on the web and take all necessary measures
In recent years, there are more and more scandals associated with data leakage on the Web and spying on people - both for individuals and for companies or even states.…

...

Five myths and misconceptions about 5G networks and one fly in the ointment
Very soon, already in 2019, the first commercial 5G networks will appear in Russia. On the eve of this event, the first 5G-compatible smartphones will begin to appear in the…

...

Warning network attacks.
An intrusion into a computer system usually begins with a preliminary assessment of the flaws in the protection of the network perimeter of your server connected to the network. In…

...

Indices: first step on & nb p; paths to & nb p; speed
Databases are specialized repositories of information, and working with them, we operate with concepts of data sets and operations on these data, forgetting that there is real equipment behind them.…

...