Indices: first step on & nb p; paths to & nb p; speed
Databases are specialized repositories of information, and working with them, we operate with concepts of data sets and operations on these data, forgetting that there is real equipment behind them.…

Continue reading →

Hosting and its types
Currently, every self-respecting company or private entrepreneur consider it a duty to have a personal website. In order to start a site you need to register a domain name yourself,…

Continue reading →

Twilight CMS
The Content Manager System (CMS) site creation software class was created to facilitate the work of webmasters. These programs are distributed in different ways. As a rule, via the Internet,…

Continue reading →

this material

5 rules to help protect yourself from cybercriminals

Today, the problems of cyber defense have become more acute in society. The level of crimes related to the theft of personal data is growing from year to year in all countries of the world. Sometimes it seems that it is impossible to defend against hackers. But in reality this is far from the case. Here are five very simple but useful tips that will help add a couple of points to your level of security on the web. Continue reading

Telegram lock and deadline for memes: 5 of the loudest scandals of the IT industry lately

Last year was rich in various scandals in the world of information technology. What is it worth blocking Telegram Roskomnadzor messenger or data leakage of 87 million Facebook social network users. And these are only cases that have received wide publicity, but about everything in order.

1. Yandex v Google
The fourth of July last year, Google had a very unpleasant incident with online documents. Continue reading

From birch bark to hosting: How information storage has evolved with the development of humanity

Since ancient times, people have tried to keep information known to them – both for themselves and for posterity. At first, the methods of preserving information were the most primitive, but over time a letter appeared, new technologies and modern materials, and today you can save almost any amount of information with one click of a computer mouse. Continue reading

How to understand that someone is following our correspondence on the web and take all necessary measures
In recent years, there are more and more scandals associated with data leakage on the Web and spying on people - both for individuals and for companies or even states.…

...

Your online office of & nb p; Micro oft
The Windows Live family brought together a variety of user services, designed for both ordinary Web users and professional communities of developers, scientists, and researchers. There is even a 3D…

...

Secrets of profitable online shopping: 6 ways to properly save on the Internet
In online stores now you can find anything from toys to lawn mowers. Often they are cheaper than regular outlets. And the choice is more - in half an hour…

...

Telegram lock and deadline for memes: 5 of the loudest scandals of the IT industry lately
Last year was rich in various scandals in the world of information technology. What is it worth blocking Telegram Roskomnadzor messenger or data leakage of 87 million Facebook social network…

...