Twilight CMS
The Content Manager System (CMS) site creation software class was created to facilitate the work of webmasters. These programs are distributed in different ways. As a rule, via the Internet,…

Continue reading →

How to understand that someone is following our correspondence on the web and take all necessary measures
In recent years, there are more and more scandals associated with data leakage on the Web and spying on people - both for individuals and for companies or even states.…

Continue reading →

7 ways to make sure that the Internet knows everything about everyone
Modern technology really knows no boundaries. With the development of the Internet, information has become worth its weight in gold. Confidentiality has become another important value in our world. And…

Continue reading →

received unauthorized

Hosting and its types

Currently, every self-respecting company or private entrepreneur consider it a duty to have a personal website. In order to start a site you need to register a domain name yourself, impose and arrange the pages of the site. But in order that any Internet user at any time could get acquainted with the content of your site, this is not enough. The site must still be put somewhere. Continue reading

7 “hard” examples of how in different countries they are trying to control the functioning of the Internet

Recently, politicians, businessmen and even “media” personalities are talking more and more about various aspects of the Internet and, increasingly, the words about it sound in a positive way. The days when the Internet was poorly distributed and was rather a haven of “freaks” and geeks passed. Together with the mass character of the Network, numerous and really serious problems began to appear. And it is not surprising that entire states are thinking about regulating the Network not only on their territory. Continue reading

8 things that in no case can not be done on the Internet, so as not to lose personal data

With the spread of the Internet, the era of accessible content, fast exchange of information and rapid communication at any distance began. However, along with all this came the problems, in particular, cybernetic crime. Malefactors on the Web can be incredibly creative in their quest to gain access to the user’s financial information or any other personal data. Here are a few things that you definitely never do on the Web. Continue reading

Fathers and Sons of the Digital Millennium: Another Brick in the Wall
The emergence of the Internet not only connected nations and continents in a globalized rush, but also inserted its small brick into the eternal wall separating fathers and children, as…

...

MySQL Query Browser
End users of web resources, as a rule, are deprived of the joy of direct communication with the MySQL database. But developers have it - more than enough. And here…

...

We work on a & nb p; secure protocol
Imagine this situation. You have a website located on an external server. You, as an administrator, perform certain actions on it, connecting under a certain login and password. The second…

...

The first beta version of Firefox 3
The main event of the past week, apparently, should be considered the release of the first beta version of the Mozilla Firefox 3 browser. Among the innovations, developers note additional…

...