MySQL Query Browser
End users of web resources, as a rule, are deprived of the joy of direct communication with the MySQL database. But developers have it - more than enough. And here…

Continue reading →

MySQL Query Browser
End users of web resources, as a rule, are deprived of the joy of direct communication with the MySQL database. But developers have it - more than enough. And here…

Continue reading →

Honest spam
Everyone knows that recently the Internet has become used, on the one hand, much simpler and more convenient - a lot of different services have appeared, the interfaces of sites…

Continue reading →

settings window

Electronic money as a means of payment on the Internet

At the moment, more and more services are provided on the Internet, and very often you need to pay for an interesting program, some kind of service or product. In most cases, the amount is small, and you pay it, it seems like, do not mind at all. But this is where the difficulties begin, because it is not always known how to pay quickly and without much hassle. In this article we will try to consider the main methods of electronic payments that currently exist in RuNet. Continue reading

Manage tabs “fire fox”

If you often search for information you need on the Web, sooner or later you will have to use some mechanism that simplifies working with open browser windows. Most modern “walkers” have a built-in ability to open new tabs within the main application window. In order to somehow solve the problem with the complexity of navigating through multiple windows, special extensions were developed for the Mozilla flagship browser. Continue reading

Offline browser
Today, the software arsenal of any more or less active user of the Global Network consists of a considerable number of various utilities. There are among them an email client,…

...

Hacking sites and CC
It's no secret that there are quite a few hackers on the modern Internet. Some of them are really high-class specialists, well versed in many technologies. Others, on the contrary,…

...

8 things that in no case can not be done on the Internet, so as not to lose personal data
With the spread of the Internet, the era of accessible content, fast exchange of information and rapid communication at any distance began. However, along with all this came the problems,…

...

Warning network attacks.
An intrusion into a computer system usually begins with a preliminary assessment of the flaws in the protection of the network perimeter of your server connected to the network. In…

...