How to understand that someone is following our correspondence on the web and take all necessary measures
In recent years, there are more and more scandals associated with data leakage on the Web and spying on people - both for individuals and for companies or even states.…

Continue reading →

The first beta version of Firefox 3
The main event of the past week, apparently, should be considered the release of the first beta version of the Mozilla Firefox 3 browser. Among the innovations, developers note additional…

Continue reading →

Offline browser
Today, the software arsenal of any more or less active user of the Global Network consists of a considerable number of various utilities. There are among them an email client,…

Continue reading →

received unauthorized

Hosting and its types

Currently, every self-respecting company or private entrepreneur consider it a duty to have a personal website. In order to start a site you need to register a domain name yourself, impose and arrange the pages of the site. But in order that any Internet user at any time could get acquainted with the content of your site, this is not enough. The site must still be put somewhere. Continue reading

7 “hard” examples of how in different countries they are trying to control the functioning of the Internet

Recently, politicians, businessmen and even “media” personalities are talking more and more about various aspects of the Internet and, increasingly, the words about it sound in a positive way. The days when the Internet was poorly distributed and was rather a haven of “freaks” and geeks passed. Together with the mass character of the Network, numerous and really serious problems began to appear. And it is not surprising that entire states are thinking about regulating the Network not only on their territory. Continue reading

8 things that in no case can not be done on the Internet, so as not to lose personal data

With the spread of the Internet, the era of accessible content, fast exchange of information and rapid communication at any distance began. However, along with all this came the problems, in particular, cybernetic crime. Malefactors on the Web can be incredibly creative in their quest to gain access to the user’s financial information or any other personal data. Here are a few things that you definitely never do on the Web. Continue reading

VPS & nb; & mda h; what it is
Solutions for sharing computer resources into mutually independent virtual machines were developed more than forty years ago, back in the era of mainframes. IBM has developed a special operating system…

...

Spammers began to unite in online clubs
Spammers also know the parable of the broom twigs, which are easy to break individually, but together it is almost impossible. And these bad people, which most normal people hate…

...

MySQL Query Browser
End users of web resources, as a rule, are deprived of the joy of direct communication with the MySQL database. But developers have it - more than enough. And here…

...

Viral marketing on the Internet
Marketing is the path to success Internet marketing has many different tools for increasing sales of products or services. Some of them are legal, others are not. And there are…

...