Warning network attacks.
An intrusion into a computer system usually begins with a preliminary assessment of the flaws in the protection of the network perimeter of your server connected to the network. In…

Continue reading →

Features of network monitoring system Nagio
Probably, any network administrator is familiar with the situation when tasks go one after another, and no other resources are allocated for their solution, except for those already available. And…

Continue reading →

Features of network monitoring system Nagio
Probably, any network administrator is familiar with the situation when tasks go one after another, and no other resources are allocated for their solution, except for those already available. And…

Continue reading →

How to understand that someone is following our correspondence on the web and take all necessary measures

In recent years, there are more and more scandals associated with data leakage on the Web and spying on people – both for individuals and for companies or even states. In the light of all these events, each Internet user wants to secure his presence on the world wide web and to achieve for himself the realization of the right to privacy of correspondence.

1. Google
Today, Google is the most advanced developer of software and services, so there is nothing surprising that the security system (as well as the control system) is truly advanced for the company. You can check the security of your data in Google services with a few clicks.

To get started, go to your Google account, where we select the tab “Security and Login”, scroll down the page and select the item “Recently Used Devices” (View connected devices).

There we will see a list of all devices through which the entry was made over the last 28 days. If there is a suspicion that you didn’t come into your profile from any smartphone, you can close it with one click. After that, from this smartphone will have to enter a password to get into your account.

2. “Yandex”
The Yandex mail service also has a security and entry control system. To begin, go to the “Account Management”, where we find the item “History of inputs.” All devices and browsers through which the Yandex account was accessed will be displayed there (even there is a map with a connection point). If desired, you can change the password with one click.

In addition, there is a separate security system in the mail service itself. Push the characteristic gear, select the item “Security”, and then we find the item “Visitors Log”. There you can see all the entrances and actions carried out by you (or not only you) in the mailbox with the dates of these operations.

3. “VKontakte”
In the popular social network “VKontakte” with security is very simple. One page is dedicated to it. To check everything, you need to go to “Settings”, select “Security”, and then find the link “Show activity history”. It will show from where and from which operating system logged in to the account. If you wish, you can complete all the sessions in one click. After that, “VC” will again request to enter a password on all computers, except this one.

4. Facebook
After the scandal with the leakage of personal data, Facebook is literally obsessed with security. So, we go first to the “Settings”, then select the item “Security and Login” and see there a very detailed presentation of information about all current (and not only) sessions. If necessary, you can complete any suspicious one click. In general, the system resembles the one used in VK, only it provides more information.

5. Viber
Viber also has its own security monitoring systems. By tradition, select “Settings”, then “Account” and in it the item “Computers and Tablets.” All unfamiliar devices, as in “Vkontakte” or Facebook can be turned off. After that, with them at the new entrance you will need to enter a password.

Viral marketing on the Internet
Marketing is the path to success Internet marketing has many different tools for increasing sales of products or services. Some of them are legal, others are not. And there are…

...

Web Services & nb p; 2.0: Flickr
Every day, Web 2.0 services are becoming more and more. There are even those who have achieved amazing results, and their value is expressed in millions of dollars. The leader…

...

Svg as foreboding
Generally speaking, the hype around Scalable Vector Graphics (SVG) began almost immediately after the W3C assembled the SVG Working Group, led by Chris Lilley, and announced the standard. This happened…

...

Fathers and Sons of the Digital Millennium: Another Brick in the Wall
The emergence of the Internet not only connected nations and continents in a globalized rush, but also inserted its small brick into the eternal wall separating fathers and children, as…

...