Hacking sites and CC
It's no secret that there are quite a few hackers on the modern Internet. Some of them are really high-class specialists, well versed in many technologies. Others, on the contrary,…

Continue reading →

Twilight CMS
The Content Manager System (CMS) site creation software class was created to facilitate the work of webmasters. These programs are distributed in different ways. As a rule, via the Internet,…

Continue reading →

One site & nb p; & mda h; two servers?
In most cases, the placement of the site is as follows. All information is hosted on the server. In the future, requests from the user's computer using the DNS system…

Continue reading →

7 “hard” examples of how in different countries they are trying to control the functioning of the Internet

Recently, politicians, businessmen and even “media” personalities are talking more and more about various aspects of the Internet and, increasingly, the words about it sound in a positive way. The days when the Internet was poorly distributed and was rather a haven of “freaks” and geeks passed. Together with the mass character of the Network, numerous and really serious problems began to appear. And it is not surprising that entire states are thinking about regulating the Network not only on their territory.

1. Germany
To date, Germany has one of the richest experiences in controlling communication on the Web. For example, the country’s parliament passed a law that obliges large resources to promptly remove any offensive records. Otherwise, such resources will be fined for a tidy sum. Even the mastodons of the Internet business, like Facebook and Youtube, have been repeatedly hit by the “distribution”. To clean the “dirty linen” in Germany give exactly 24 hours.

2. Canada
Canada’s Supreme Court is far more concerned with fraudsters on the Web, that hurt someone’s feelings. The country has passed a law that allows Internet resources that have been found to be deceiving their customers or business partners, and block access to search engines. Also, search engines should make maximum efforts to combat fake sites of enterprises.

3. Italy
But in Italy, the Network seeks not so much to control, as to endow it with new “powers”. Not so long ago, the country was allowed to officially dismiss employees of companies and enterprises through the popular WhatsApp messenger. An amazing example of loyalty to the Internet! However, here it was taken several laws on authorization on Internet sites and insults on the Internet.

4. United States
After a series of espionage scandals around the CIA (not without the help of Edward Snowden), it is already difficult today to surprise someone by how “unclearly” the Internet is enslaved in the United States. Not so long ago, local lawmakers decided that the crusade against the Network should bring the blockchain technology to its knees. For the sake of justice, it’s worth replacing that, despite the hype raised, the blockchain hasn’t found widespread use over the years.

5. Netherlands
In the Netherlands, they are not very worried about tolerance on the Net, blockchain and layoffs. But much attention is paid to copyright infringement. A special Internet organization BREIN has appeared in the country, which has already achieved the closure of more than 200 major sellers who dared to distribute content illegally.

6. Australia
While in various countries, the security services are trying to keep the Internet out, in Australia, state security agents simply do not reckon with anyone’s opinion and are not ashamed of this fact. The local “spies” openly declared that they were decrypting all user traffic that would interest them. On the secret of correspondence and other “high matter” all “suddenly” turned out to spit. Explained all this to citizens more than trivial – the fight against terrorist threats.

7. European Union
To impose a hand on the Internet try not only individual countries, but also entire political entities. For example, the EU fines monopolists of the market with enviable regularity for being (here is a surprise!) The dominant companies in the segment.

One site & nb p; & mda h; two servers?
In most cases, the placement of the site is as follows. All information is hosted on the server. In the future, requests from the user's computer using the DNS system…

...

Features of network monitoring system Nagio
Probably, any network administrator is familiar with the situation when tasks go one after another, and no other resources are allocated for their solution, except for those already available. And…

...

Fathers and Sons of the Digital Millennium: Another Brick in the Wall
The emergence of the Internet not only connected nations and continents in a globalized rush, but also inserted its small brick into the eternal wall separating fathers and children, as…

...

Warning network attacks.
An intrusion into a computer system usually begins with a preliminary assessment of the flaws in the protection of the network perimeter of your server connected to the network. In…

...