Internet time

7 ways to make sure that the Internet knows everything about everyone
Modern technology really knows no boundaries. With the development of the Internet, information has become worth its weight in gold. Confidentiality has become another important value in our world. And…

Continue reading →

Manage tabs "fire fox"
If you often search for information you need on the Web, sooner or later you will have to use some mechanism that simplifies working with open browser windows. Most modern…

Continue reading →

We work on a & nb p; secure protocol
Imagine this situation. You have a website located on an external server. You, as an administrator, perform certain actions on it, connecting under a certain login and password. The second…

Continue reading →

Your online office of & nb p; Micro oft

The Windows Live family brought together a variety of user services, designed for both ordinary Web users and professional communities of developers, scientists, and researchers. There is even a 3D map service. One of the new popular types of services is Live Office, which we will explore in detail in this article. It is a set of tools for creating your own e-commerce solution. Just do not be afraid that you have to retrain as a designer and webmaster in one person. Continue reading

Adobe for web developers

Adobe has no need for a special presentation – it is very well known among almost all users who have ever dealt with graphics processing. Of course, we are talking about the program Adobe Photoshop, which is used both for the preparation of professional images for printing, and for working with images for web pages. Continue reading

Spammers began to unite in online clubs

Spammers also know the parable of the broom twigs, which are easy to break individually, but together it is almost impossible. And these bad people, which most normal people hate and despise, are united in the Internet community. They share their experience there, raise their morale and learn to resist those who struggle with them. Continue reading

One site & nb p; & mda h; two servers?

In most cases, the placement of the site is as follows. All information is hosted on the server. In the future, requests from the user’s computer using the DNS system are sent to this server, which responds with all the necessary data. However, in some cases this scheme is very complicated. To do this, a copy of the site is placed on one or more servers, and a special module (load balancer) sends requests from users’ computers to the least loaded one. Continue reading

Warning network attacks.
An intrusion into a computer system usually begins with a preliminary assessment of the flaws in the protection of the network perimeter of your server connected to the network. In…

...

Offline browser
Today, the software arsenal of any more or less active user of the Global Network consists of a considerable number of various utilities. There are among them an email client,…

...

Adobe for web developers
Adobe has no need for a special presentation - it is very well known among almost all users who have ever dealt with graphics processing. Of course, we are talking…

...

Telegram lock and deadline for memes: 5 of the loudest scandals of the IT industry lately
Last year was rich in various scandals in the world of information technology. What is it worth blocking Telegram Roskomnadzor messenger or data leakage of 87 million Facebook social network…

...