The first beta version of Firefox 3
The main event of the past week, apparently, should be considered the release of the first beta version of the Mozilla Firefox 3 browser. Among the innovations, developers note additional…

Continue reading →

What is contextual advertising
It's no secret that search engines provide the highest quality traffic on the modern Internet. And indeed, people who find a website for search queries, in most cases, know exactly…

Continue reading →

Setting up equipment for Stream
The article by Peter Didenko “Connecting and saving”, published on the pages of our publication, told about how to save money when connecting to the Stream channel. In today's article…

Continue reading →

text in bold will highlight

Installing Gentoo Linux on & nb p; remote server

Installing Linux on a local machine in most cases is not difficult – in the pursuit of an audience, developers supply distributions with sufficiently high-quality installers. When your server is at best behind the wall, and at worst in another state, the installation of the operating system is usually assigned to data center employees. This greatly limits the choice of possible distributions. It is impossible to judge whether it is good or bad, but if you still have the task of installing Gentoo Linux on a remote machine, then this is quite possible. Continue reading

Andrew Sebrant: the Internet of personal communication is not completely replaced by
Andrey Sebrant is one of the most professional and experienced Internet managers. The legend of the Russian Network, a man who is considered to be one of the founding fathers…

...

What is contextual advertising
It's no secret that search engines provide the highest quality traffic on the modern Internet. And indeed, people who find a website for search queries, in most cases, know exactly…

...

Comparison of virtual hosting and dedicated server
The Internet is a powerful platform for maintaining and promoting any business. In order to make the site’s presence on the network permanent, it is necessary to find and determine…

...

Warning network attacks.
An intrusion into a computer system usually begins with a preliminary assessment of the flaws in the protection of the network perimeter of your server connected to the network. In…

...