Andrew Sebrant: the Internet of personal communication is not completely replaced by
Andrey Sebrant is one of the most professional and experienced Internet managers. The legend of the Russian Network, a man who is considered to be one of the founding fathers…

Continue reading →

The first beta version of Firefox 3
The main event of the past week, apparently, should be considered the release of the first beta version of the Mozilla Firefox 3 browser. Among the innovations, developers note additional…

Continue reading →

Twilight CMS
The Content Manager System (CMS) site creation software class was created to facilitate the work of webmasters. These programs are distributed in different ways. As a rule, via the Internet,…

Continue reading →

blog will suffice

Web Services & nb p; 2.0: Flickr

Every day, Web 2.0 services are becoming more and more. There are even those who have achieved amazing results, and their value is expressed in millions of dollars. The leader among the encyclopedias is Wikipedia. If bookmarked, then delicious. The blog posting service is Blogger.
If a social network, then MySpace. If the service for working with photos, then, of course, Flickr.
We haven’t written much about Web 2.0 services. Continue reading

Indices: first step on & nb p; paths to & nb p; speed

Databases are specialized repositories of information, and working with them, we operate with concepts of data sets and operations on these data, forgetting that there is real equipment behind them. Creating a SQL query, we mean that all actions on the tables are carried out simultaneously, because the concept of time in the commands of the SQL language is absent. When our database is small, we may not notice that the database server needs time to process the table we specified, to search for the required row, to retrieve the necessary records. Continue reading

Warning network attacks.

An intrusion into a computer system usually begins with a preliminary assessment of the flaws in the protection of the network perimeter of your server connected to the network. In the course of such a “shoot-in,” the hacker first needs to know the list of open ports and evaluate the identity of your computer’s operating system. The previous article described the scanlogd program, which allows analyzing attempts to scan your server. Continue reading

Fathers and Sons of the Digital Millennium: Another Brick in the Wall
The emergence of the Internet not only connected nations and continents in a globalized rush, but also inserted its small brick into the eternal wall separating fathers and children, as…

...

Indices: first step on & nb p; paths to & nb p; speed
Databases are specialized repositories of information, and working with them, we operate with concepts of data sets and operations on these data, forgetting that there is real equipment behind them.…

...

"Half a Century in Space - The Epoch of Search"
On the eve of the atrium of the Novinsky Passage shopping center, Google held an exhibition “Half a Century in Space - Search Epoch”, timed to coincide with the 50th…

...

Hacking sites and CC
It's no secret that there are quite a few hackers on the modern Internet. Some of them are really high-class specialists, well versed in many technologies. Others, on the contrary,…

...