blog will suffice
Every day, Web 2.0 services are becoming more and more. There are even those who have achieved amazing results, and their value is expressed in millions of dollars. The leader among the encyclopedias is Wikipedia. If bookmarked, then delicious. The blog posting service is Blogger.
If a social network, then MySpace. If the service for working with photos, then, of course, Flickr.
We haven’t written much about Web 2.0 services. Continue reading
Databases are specialized repositories of information, and working with them, we operate with concepts of data sets and operations on these data, forgetting that there is real equipment behind them. Creating a SQL query, we mean that all actions on the tables are carried out simultaneously, because the concept of time in the commands of the SQL language is absent. When our database is small, we may not notice that the database server needs time to process the table we specified, to search for the required row, to retrieve the necessary records. Continue reading
An intrusion into a computer system usually begins with a preliminary assessment of the flaws in the protection of the network perimeter of your server connected to the network. In the course of such a “shoot-in,” the hacker first needs to know the list of open ports and evaluate the identity of your computer’s operating system. The previous article described the scanlogd program, which allows analyzing attempts to scan your server. Continue reading