Fathers and Sons of the Digital Millennium: Another Brick in the Wall
The emergence of the Internet not only connected nations and continents in a globalized rush, but also inserted its small brick into the eternal wall separating fathers and children, as…

Continue reading →

Ordering a SERM service: the principles of online reputation management and the price of a question
It is quite difficult to earn a good reputation in the market of any company, including financial, and sometimes it takes more than one year. But often the company's brilliant…

Continue reading →

Ordering a SERM service: the principles of online reputation management and the price of a question
It is quite difficult to earn a good reputation in the market of any company, including financial, and sometimes it takes more than one year. But often the company's brilliant…

Continue reading →

this material

5 rules to help protect yourself from cybercriminals

Today, the problems of cyber defense have become more acute in society. The level of crimes related to the theft of personal data is growing from year to year in all countries of the world. Sometimes it seems that it is impossible to defend against hackers. But in reality this is far from the case. Here are five very simple but useful tips that will help add a couple of points to your level of security on the web. Continue reading

Telegram lock and deadline for memes: 5 of the loudest scandals of the IT industry lately

Last year was rich in various scandals in the world of information technology. What is it worth blocking Telegram Roskomnadzor messenger or data leakage of 87 million Facebook social network users. And these are only cases that have received wide publicity, but about everything in order.

1. Yandex v Google
The fourth of July last year, Google had a very unpleasant incident with online documents. Continue reading

From birch bark to hosting: How information storage has evolved with the development of humanity

Since ancient times, people have tried to keep information known to them – both for themselves and for posterity. At first, the methods of preserving information were the most primitive, but over time a letter appeared, new technologies and modern materials, and today you can save almost any amount of information with one click of a computer mouse. Continue reading

7 ways to make sure that the Internet knows everything about everyone
Modern technology really knows no boundaries. With the development of the Internet, information has become worth its weight in gold. Confidentiality has become another important value in our world. And…

...

One site & nb p; & mda h; two servers?
In most cases, the placement of the site is as follows. All information is hosted on the server. In the future, requests from the user's computer using the DNS system…

...

Offline browser
Today, the software arsenal of any more or less active user of the Global Network consists of a considerable number of various utilities. There are among them an email client,…

...

Warning network attacks.
An intrusion into a computer system usually begins with a preliminary assessment of the flaws in the protection of the network perimeter of your server connected to the network. In…

...