We build a browser-independent site
The last point requires further explanation. Why is displaying information in a text browser so important? I will answer in monosyllables - if your website is an educational institution or…

Continue reading →

Internet times of Khrushchev: why in the Soviet Union did not create their own computer network
It is known that the Internet in its current form is the development of the computer network ARPANET, developed in the USA in 1969. However, few people know that in…

Continue reading →

Your online office of & nb p; Micro oft
The Windows Live family brought together a variety of user services, designed for both ordinary Web users and professional communities of developers, scientists, and researchers. There is even a 3D…

Continue reading →

altered or tampered with

Honest spam

Everyone knows that recently the Internet has become used, on the one hand, much simpler and more convenient – a lot of different services have appeared, the interfaces of sites are becoming more convenient and smarter, connections to the Network are faster and more reliable, and on the other – much more dangerous and more complicated the number of all kinds of worms, trojans, scanners and spam rolls over all imaginable limits. Continue reading

An article on the subject of Internet “Interesting in the network” Your online office of the Micro oft

The Windows Live family brought together a variety of user services, designed for both ordinary Web users and professional communities of developers, scientists, and researchers. There is even a 3D map service. One of the new popular types of services is Live Office, which we will explore in detail in this article. It is a set of tools for creating your own e-commerce solution. Just do not be afraid that you have to retrain as a designer and webmaster in one person. Continue reading

Hacking sites and CC

It’s no secret that there are quite a few hackers on the modern Internet. Some of them are really high-class specialists, well versed in many technologies. Others, on the contrary, have only superficial knowledge. Their tools are utilities written by other people and accompanied by detailed instructions on how to exploit the most common vulnerabilities. However, they both pose a threat to many sites. Continue reading

Warning network attacks.
An intrusion into a computer system usually begins with a preliminary assessment of the flaws in the protection of the network perimeter of your server connected to the network. In…

...

"Half a Century in Space - The Epoch of Search"
On the eve of the atrium of the Novinsky Passage shopping center, Google held an exhibition “Half a Century in Space - Search Epoch”, timed to coincide with the 50th…

...

Zaekranye Facetop: helping hand from otherworldly friend
Imagine that the texts, folders, and other objects on your monitor suddenly became translucent, and you saw that another person was sitting on that side of the glass and, pointing…

...

Installing Gentoo Linux on & nb p; remote server
Installing Linux on a local machine in most cases is not difficult - in the pursuit of an audience, developers supply distributions with sufficiently high-quality installers. When your server is…

...