8 things that in no case can not be done on the Internet, so as not to lose personal data
With the spread of the Internet, the era of accessible content, fast exchange of information and rapid communication at any distance began. However, along with all this came the problems,…

Continue reading →

Twilight CMS
The Content Manager System (CMS) site creation software class was created to facilitate the work of webmasters. These programs are distributed in different ways. As a rule, via the Internet,…

Continue reading →

Installing Gentoo Linux on & nb p; remote server
Installing Linux on a local machine in most cases is not difficult - in the pursuit of an audience, developers supply distributions with sufficiently high-quality installers. When your server is…

Continue reading →

altered or tampered with

Honest spam

Everyone knows that recently the Internet has become used, on the one hand, much simpler and more convenient – a lot of different services have appeared, the interfaces of sites are becoming more convenient and smarter, connections to the Network are faster and more reliable, and on the other – much more dangerous and more complicated the number of all kinds of worms, trojans, scanners and spam rolls over all imaginable limits. Continue reading

An article on the subject of Internet “Interesting in the network” Your online office of the Micro oft

The Windows Live family brought together a variety of user services, designed for both ordinary Web users and professional communities of developers, scientists, and researchers. There is even a 3D map service. One of the new popular types of services is Live Office, which we will explore in detail in this article. It is a set of tools for creating your own e-commerce solution. Just do not be afraid that you have to retrain as a designer and webmaster in one person. Continue reading

Hacking sites and CC

It’s no secret that there are quite a few hackers on the modern Internet. Some of them are really high-class specialists, well versed in many technologies. Others, on the contrary, have only superficial knowledge. Their tools are utilities written by other people and accompanied by detailed instructions on how to exploit the most common vulnerabilities. However, they both pose a threat to many sites. Continue reading

From birch bark to hosting: How information storage has evolved with the development of humanity
Since ancient times, people have tried to keep information known to them - both for themselves and for posterity. At first, the methods of preserving information were the most primitive,…

...

What is contextual advertising
It's no secret that search engines provide the highest quality traffic on the modern Internet. And indeed, people who find a website for search queries, in most cases, know exactly…

...

Hacking sites and CC
It's no secret that there are quite a few hackers on the modern Internet. Some of them are really high-class specialists, well versed in many technologies. Others, on the contrary,…

...

MySQL Query Browser
End users of web resources, as a rule, are deprived of the joy of direct communication with the MySQL database. But developers have it - more than enough. And here…

...