Warning network attacks.
An intrusion into a computer system usually begins with a preliminary assessment of the flaws in the protection of the network perimeter of your server connected to the network. In…

Continue reading →

The first beta version of Firefox 3
The main event of the past week, apparently, should be considered the release of the first beta version of the Mozilla Firefox 3 browser. Among the innovations, developers note additional…

Continue reading →

Indices: first step on & nb p; paths to & nb p; speed
Databases are specialized repositories of information, and working with them, we operate with concepts of data sets and operations on these data, forgetting that there is real equipment behind them.…

Continue reading →

altered or tampered with

Honest spam

Everyone knows that recently the Internet has become used, on the one hand, much simpler and more convenient – a lot of different services have appeared, the interfaces of sites are becoming more convenient and smarter, connections to the Network are faster and more reliable, and on the other – much more dangerous and more complicated the number of all kinds of worms, trojans, scanners and spam rolls over all imaginable limits. Continue reading

An article on the subject of Internet “Interesting in the network” Your online office of the Micro oft

The Windows Live family brought together a variety of user services, designed for both ordinary Web users and professional communities of developers, scientists, and researchers. There is even a 3D map service. One of the new popular types of services is Live Office, which we will explore in detail in this article. It is a set of tools for creating your own e-commerce solution. Just do not be afraid that you have to retrain as a designer and webmaster in one person. Continue reading

Hacking sites and CC

It’s no secret that there are quite a few hackers on the modern Internet. Some of them are really high-class specialists, well versed in many technologies. Others, on the contrary, have only superficial knowledge. Their tools are utilities written by other people and accompanied by detailed instructions on how to exploit the most common vulnerabilities. However, they both pose a threat to many sites. Continue reading

10 effective ways to "squeeze" the maximum out of your Wi-Fi router
What could be worse in the daily life of a person of the 21st century than a slow Internet? The fall in Internet speed leads to the destruction of nerve…

...

MySQL Query Browser
End users of web resources, as a rule, are deprived of the joy of direct communication with the MySQL database. But developers have it - more than enough. And here…

...

The first beta version of Firefox 3
The main event of the past week, apparently, should be considered the release of the first beta version of the Mozilla Firefox 3 browser. Among the innovations, developers note additional…

...

Internet times of Khrushchev: why in the Soviet Union did not create their own computer network
It is known that the Internet in its current form is the development of the computer network ARPANET, developed in the USA in 1969. However, few people know that in…

...