Comparison of virtual hosting and dedicated server
The Internet is a powerful platform for maintaining and promoting any business. In order to make the site’s presence on the network permanent, it is necessary to find and determine…

Continue reading →

7 "hard" examples of how in different countries they are trying to control the functioning of the Internet
Recently, politicians, businessmen and even “media” personalities are talking more and more about various aspects of the Internet and, increasingly, the words about it sound in a positive way. The…

Continue reading →

Electronic money as a means of payment on the Internet
At the moment, more and more services are provided on the Internet, and very often you need to pay for an interesting program, some kind of service or product. In…

Continue reading →

How to understand that someone is following our correspondence on the web and take all necessary measures

In recent years, there are more and more scandals associated with data leakage on the Web and spying on people – both for individuals and for companies or even states. In the light of all these events, each Internet user wants to secure his presence on the world wide web and to achieve for himself the realization of the right to privacy of correspondence.

1. Google
Today, Google is the most advanced developer of software and services, so there is nothing surprising that the security system (as well as the control system) is truly advanced for the company. You can check the security of your data in Google services with a few clicks.

To get started, go to your Google account, where we select the tab “Security and Login”, scroll down the page and select the item “Recently Used Devices” (View connected devices).

There we will see a list of all devices through which the entry was made over the last 28 days. If there is a suspicion that you didn’t come into your profile from any smartphone, you can close it with one click. After that, from this smartphone will have to enter a password to get into your account.

2. “Yandex”
The Yandex mail service also has a security and entry control system. To begin, go to the “Account Management”, where we find the item “History of inputs.” All devices and browsers through which the Yandex account was accessed will be displayed there (even there is a map with a connection point). If desired, you can change the password with one click.

In addition, there is a separate security system in the mail service itself. Push the characteristic gear, select the item “Security”, and then we find the item “Visitors Log”. There you can see all the entrances and actions carried out by you (or not only you) in the mailbox with the dates of these operations.

3. “VKontakte”
In the popular social network “VKontakte” with security is very simple. One page is dedicated to it. To check everything, you need to go to “Settings”, select “Security”, and then find the link “Show activity history”. It will show from where and from which operating system logged in to the account. If you wish, you can complete all the sessions in one click. After that, “VC” will again request to enter a password on all computers, except this one.

4. Facebook
After the scandal with the leakage of personal data, Facebook is literally obsessed with security. So, we go first to the “Settings”, then select the item “Security and Login” and see there a very detailed presentation of information about all current (and not only) sessions. If necessary, you can complete any suspicious one click. In general, the system resembles the one used in VK, only it provides more information.

5. Viber
Viber also has its own security monitoring systems. By tradition, select “Settings”, then “Account” and in it the item “Computers and Tablets.” All unfamiliar devices, as in “Vkontakte” or Facebook can be turned off. After that, with them at the new entrance you will need to enter a password.

Hosting and its types
Currently, every self-respecting company or private entrepreneur consider it a duty to have a personal website. In order to start a site you need to register a domain name yourself,…

...

An article on the subject of Internet "Interesting in the network" Your online office of the Micro oft
The Windows Live family brought together a variety of user services, designed for both ordinary Web users and professional communities of developers, scientists, and researchers. There is even a 3D…

...

"Half a Century in Space - The Epoch of Search"
On the eve of the atrium of the Novinsky Passage shopping center, Google held an exhibition “Half a Century in Space - Search Epoch”, timed to coincide with the 50th…

...

Warning network attacks.
An intrusion into a computer system usually begins with a preliminary assessment of the flaws in the protection of the network perimeter of your server connected to the network. In…

...