8 things that in no case can not be done on the Internet, so as not to lose personal data
With the spread of the Internet, the era of accessible content, fast exchange of information and rapid communication at any distance began. However, along with all this came the problems,…

Continue reading →

Your online office of & nb p; Micro oft
The Windows Live family brought together a variety of user services, designed for both ordinary Web users and professional communities of developers, scientists, and researchers. There is even a 3D…

Continue reading →

Your online office of & nb p; Micro oft
The Windows Live family brought together a variety of user services, designed for both ordinary Web users and professional communities of developers, scientists, and researchers. There is even a 3D…

Continue reading →

How to understand that someone is following our correspondence on the web and take all necessary measures

In recent years, there are more and more scandals associated with data leakage on the Web and spying on people – both for individuals and for companies or even states. In the light of all these events, each Internet user wants to secure his presence on the world wide web and to achieve for himself the realization of the right to privacy of correspondence.

1. Google
Today, Google is the most advanced developer of software and services, so there is nothing surprising that the security system (as well as the control system) is truly advanced for the company. You can check the security of your data in Google services with a few clicks.

To get started, go to your Google account, where we select the tab “Security and Login”, scroll down the page and select the item “Recently Used Devices” (View connected devices).

There we will see a list of all devices through which the entry was made over the last 28 days. If there is a suspicion that you didn’t come into your profile from any smartphone, you can close it with one click. After that, from this smartphone will have to enter a password to get into your account.

2. “Yandex”
The Yandex mail service also has a security and entry control system. To begin, go to the “Account Management”, where we find the item “History of inputs.” All devices and browsers through which the Yandex account was accessed will be displayed there (even there is a map with a connection point). If desired, you can change the password with one click.

In addition, there is a separate security system in the mail service itself. Push the characteristic gear, select the item “Security”, and then we find the item “Visitors Log”. There you can see all the entrances and actions carried out by you (or not only you) in the mailbox with the dates of these operations.

3. “VKontakte”
In the popular social network “VKontakte” with security is very simple. One page is dedicated to it. To check everything, you need to go to “Settings”, select “Security”, and then find the link “Show activity history”. It will show from where and from which operating system logged in to the account. If you wish, you can complete all the sessions in one click. After that, “VC” will again request to enter a password on all computers, except this one.

4. Facebook
After the scandal with the leakage of personal data, Facebook is literally obsessed with security. So, we go first to the “Settings”, then select the item “Security and Login” and see there a very detailed presentation of information about all current (and not only) sessions. If necessary, you can complete any suspicious one click. In general, the system resembles the one used in VK, only it provides more information.

5. Viber
Viber also has its own security monitoring systems. By tradition, select “Settings”, then “Account” and in it the item “Computers and Tablets.” All unfamiliar devices, as in “Vkontakte” or Facebook can be turned off. After that, with them at the new entrance you will need to enter a password.

Twilight CMS
The Content Manager System (CMS) site creation software class was created to facilitate the work of webmasters. These programs are distributed in different ways. As a rule, via the Internet,…

...

Web Services & nb p; 2.0: Flickr
Every day, Web 2.0 services are becoming more and more. There are even those who have achieved amazing results, and their value is expressed in millions of dollars. The leader…

...

8 things that in no case can not be done on the Internet, so as not to lose personal data
With the spread of the Internet, the era of accessible content, fast exchange of information and rapid communication at any distance began. However, along with all this came the problems,…

...

Ordering a SERM service: the principles of online reputation management and the price of a question
It is quite difficult to earn a good reputation in the market of any company, including financial, and sometimes it takes more than one year. But often the company's brilliant…

...