How to study SEO
If you go to any forum, one way or another in contact with the SEO theme, and ask a question like “how to learn SEO?”, Then in 90% of cases…

Continue reading →

One site & nb p; & mda h; two servers?
In most cases, the placement of the site is as follows. All information is hosted on the server. In the future, requests from the user's computer using the DNS system…

Continue reading →

Five myths and misconceptions about 5G networks and one fly in the ointment
Very soon, already in 2019, the first commercial 5G networks will appear in Russia. On the eve of this event, the first 5G-compatible smartphones will begin to appear in the…

Continue reading →

optionally

MySQL Query Browser

End users of web resources, as a rule, are deprived of the joy of direct communication with the MySQL database. But developers have it – more than enough. And here the key role is played by the tool for working with the database. You can, of course, use the console client, but in most cases its functionality is not enough. You can use web interfaces, such as phpMyAdmin, but working through the browser imposes certain restrictions on interactivity. Continue reading

We work on a & nb p; secure protocol

Imagine this situation. You have a website located on an external server. You, as an administrator, perform certain actions on it, connecting under a certain login and password. The second situation. You are a user of Web Money or similar.

To perform actions with your wallets you need to connect to the system. What can happen during such connections? Continue reading

Warning network attacks.
An intrusion into a computer system usually begins with a preliminary assessment of the flaws in the protection of the network perimeter of your server connected to the network. In…

...

Features of network monitoring system Nagio
Probably, any network administrator is familiar with the situation when tasks go one after another, and no other resources are allocated for their solution, except for those already available. And…

...

Hacking sites and CC
It's no secret that there are quite a few hackers on the modern Internet. Some of them are really high-class specialists, well versed in many technologies. Others, on the contrary,…

...

Offline browser
Today, the software arsenal of any more or less active user of the Global Network consists of a considerable number of various utilities. There are among them an email client,…

...