Telegram lock and deadline for memes: 5 of the loudest scandals of the IT industry lately
Last year was rich in various scandals in the world of information technology. What is it worth blocking Telegram Roskomnadzor messenger or data leakage of 87 million Facebook social network…

Continue reading →

5 rules to help protect yourself from cybercriminals
Today, the problems of cyber defense have become more acute in society. The level of crimes related to the theft of personal data is growing from year to year in…

Continue reading →

The first beta version of Firefox 3
The main event of the past week, apparently, should be considered the release of the first beta version of the Mozilla Firefox 3 browser. Among the innovations, developers note additional…

Continue reading →

buy goods in this network

1 2 3 5

Setting up equipment for Stream

The article by Peter Didenko “Connecting and saving”, published on the pages of our publication, told about how to save money when connecting to the Stream channel. In today’s article we will talk about what types of equipment are used for various connection options to Stream, and also consider in detail exactly how this equipment should be configured. Continue reading

Offline browser

Today, the software arsenal of any more or less active user of the Global Network consists of a considerable number of various utilities. There are among them an email client, an FTP client, a program for dialing up to the provider, a file download manager, etc. But, of course, browsers take the main place among these programs. Continue reading

Honest spam

Everyone knows that recently the Internet has become used, on the one hand, much simpler and more convenient – a lot of different services have appeared, the interfaces of sites are becoming more convenient and smarter, connections to the Network are faster and more reliable, and on the other – much more dangerous and more complicated the number of all kinds of worms, trojans, scanners and spam rolls over all imaginable limits. Continue reading

1 2 3 5
Comparison of virtual hosting and dedicated server
The Internet is a powerful platform for maintaining and promoting any business. In order to make the site’s presence on the network permanent, it is necessary to find and determine…

...

One site & nb p; & mda h; two servers?
In most cases, the placement of the site is as follows. All information is hosted on the server. In the future, requests from the user's computer using the DNS system…

...

Five myths and misconceptions about 5G networks and one fly in the ointment
Very soon, already in 2019, the first commercial 5G networks will appear in Russia. On the eve of this event, the first 5G-compatible smartphones will begin to appear in the…

...

Telegram lock and deadline for memes: 5 of the loudest scandals of the IT industry lately
Last year was rich in various scandals in the world of information technology. What is it worth blocking Telegram Roskomnadzor messenger or data leakage of 87 million Facebook social network…

...