Offline browser
Today, the software arsenal of any more or less active user of the Global Network consists of a considerable number of various utilities. There are among them an email client,…

Continue reading →

From birch bark to hosting: How information storage has evolved with the development of humanity
Since ancient times, people have tried to keep information known to them - both for themselves and for posterity. At first, the methods of preserving information were the most primitive,…

Continue reading →

"Half a Century in Space - The Epoch of Search"
On the eve of the atrium of the Novinsky Passage shopping center, Google held an exhibition “Half a Century in Space - Search Epoch”, timed to coincide with the 50th…

Continue reading →

optionally

MySQL Query Browser

End users of web resources, as a rule, are deprived of the joy of direct communication with the MySQL database. But developers have it – more than enough. And here the key role is played by the tool for working with the database. You can, of course, use the console client, but in most cases its functionality is not enough. You can use web interfaces, such as phpMyAdmin, but working through the browser imposes certain restrictions on interactivity. Continue reading

We work on a & nb p; secure protocol

Imagine this situation. You have a website located on an external server. You, as an administrator, perform certain actions on it, connecting under a certain login and password. The second situation. You are a user of Web Money or similar.

To perform actions with your wallets you need to connect to the system. What can happen during such connections? Continue reading

Features of network monitoring system Nagio
Probably, any network administrator is familiar with the situation when tasks go one after another, and no other resources are allocated for their solution, except for those already available. And…

...

What features does a consumer loan online have?
The Internet is an environment of great opportunities for people. It allows you to pass the time for an interesting, colorful game or watching a film of the most different…

...

Web Services & nb p; 2.0: Flickr
Every day, Web 2.0 services are becoming more and more. There are even those who have achieved amazing results, and their value is expressed in millions of dollars. The leader…

...

Warning network attacks.
An intrusion into a computer system usually begins with a preliminary assessment of the flaws in the protection of the network perimeter of your server connected to the network. In…

...