Warning network attacks.
An intrusion into a computer system usually begins with a preliminary assessment of the flaws in the protection of the network perimeter of your server connected to the network. In…

Continue reading →

The first beta version of Firefox 3
The main event of the past week, apparently, should be considered the release of the first beta version of the Mozilla Firefox 3 browser. Among the innovations, developers note additional…

Continue reading →

Popular Copywriting Exchange
The copywriting profession is becoming increasingly popular among novice freelancers. Accordingly, the number of sites providing them with a field for activity, that is, exchanges, is growing. Experienced copywriters know…

Continue reading →

optionally

MySQL Query Browser

End users of web resources, as a rule, are deprived of the joy of direct communication with the MySQL database. But developers have it – more than enough. And here the key role is played by the tool for working with the database. You can, of course, use the console client, but in most cases its functionality is not enough. You can use web interfaces, such as phpMyAdmin, but working through the browser imposes certain restrictions on interactivity. Continue reading

We work on a & nb p; secure protocol

Imagine this situation. You have a website located on an external server. You, as an administrator, perform certain actions on it, connecting under a certain login and password. The second situation. You are a user of Web Money or similar.

To perform actions with your wallets you need to connect to the system. What can happen during such connections? Continue reading

Fathers and Sons of the Digital Millennium: Another Brick in the Wall
The emergence of the Internet not only connected nations and continents in a globalized rush, but also inserted its small brick into the eternal wall separating fathers and children, as…

...

Viral marketing on the Internet
Marketing is the path to success Internet marketing has many different tools for increasing sales of products or services. Some of them are legal, others are not. And there are…

...

Features of network monitoring system Nagio
Probably, any network administrator is familiar with the situation when tasks go one after another, and no other resources are allocated for their solution, except for those already available. And…

...

The first beta version of Firefox 3
The main event of the past week, apparently, should be considered the release of the first beta version of the Mozilla Firefox 3 browser. Among the innovations, developers note additional…

...