Spammers began to unite in online clubs
Spammers also know the parable of the broom twigs, which are easy to break individually, but together it is almost impossible. And these bad people, which most normal people hate…

Continue reading →

Hacking sites and CC
It's no secret that there are quite a few hackers on the modern Internet. Some of them are really high-class specialists, well versed in many technologies. Others, on the contrary,…

Continue reading →

Your online office of & nb p; Micro oft
The Windows Live family brought together a variety of user services, designed for both ordinary Web users and professional communities of developers, scientists, and researchers. There is even a 3D…

Continue reading →

this material

5 rules to help protect yourself from cybercriminals

Today, the problems of cyber defense have become more acute in society. The level of crimes related to the theft of personal data is growing from year to year in all countries of the world. Sometimes it seems that it is impossible to defend against hackers. But in reality this is far from the case. Here are five very simple but useful tips that will help add a couple of points to your level of security on the web. Continue reading

Telegram lock and deadline for memes: 5 of the loudest scandals of the IT industry lately

Last year was rich in various scandals in the world of information technology. What is it worth blocking Telegram Roskomnadzor messenger or data leakage of 87 million Facebook social network users. And these are only cases that have received wide publicity, but about everything in order.

1. Yandex v Google
The fourth of July last year, Google had a very unpleasant incident with online documents. Continue reading

From birch bark to hosting: How information storage has evolved with the development of humanity

Since ancient times, people have tried to keep information known to them – both for themselves and for posterity. At first, the methods of preserving information were the most primitive, but over time a letter appeared, new technologies and modern materials, and today you can save almost any amount of information with one click of a computer mouse. Continue reading

One site & nb p; & mda h; two servers?
In most cases, the placement of the site is as follows. All information is hosted on the server. In the future, requests from the user's computer using the DNS system…

...

Installing Gentoo Linux on & nb p; remote server
Installing Linux on a local machine in most cases is not difficult - in the pursuit of an audience, developers supply distributions with sufficiently high-quality installers. When your server is…

...

Web Services & nb p; 2.0: Flickr
Every day, Web 2.0 services are becoming more and more. There are even those who have achieved amazing results, and their value is expressed in millions of dollars. The leader…

...

Warning network attacks.
An intrusion into a computer system usually begins with a preliminary assessment of the flaws in the protection of the network perimeter of your server connected to the network. In…

...