From birch bark to hosting: How information storage has evolved with the development of humanity
Since ancient times, people have tried to keep information known to them - both for themselves and for posterity. At first, the methods of preserving information were the most primitive,…

Continue reading →

Warning network attacks.
An intrusion into a computer system usually begins with a preliminary assessment of the flaws in the protection of the network perimeter of your server connected to the network. In…

Continue reading →

Svg as foreboding
Generally speaking, the hype around Scalable Vector Graphics (SVG) began almost immediately after the W3C assembled the SVG Working Group, led by Chris Lilley, and announced the standard. This happened…

Continue reading →

computer network

1 2 3 5

Installing Gentoo Linux on & nb p; remote server

Installing Linux on a local machine in most cases is not difficult – in the pursuit of an audience, developers supply distributions with sufficiently high-quality installers. When your server is at best behind the wall, and at worst in another state, the installation of the operating system is usually assigned to data center employees. This greatly limits the choice of possible distributions. It is impossible to judge whether it is good or bad, but if you still have the task of installing Gentoo Linux on a remote machine, then this is quite possible. Continue reading

Warning network attacks.

An intrusion into a computer system usually begins with a preliminary assessment of the flaws in the protection of the network perimeter of your server connected to the network. In the course of such a “shoot-in,” the hacker first needs to know the list of open ports and evaluate the identity of your computer’s operating system. The previous article described the scanlogd program, which allows analyzing attempts to scan your server. Continue reading

What is contextual advertising

It’s no secret that search engines provide the highest quality traffic on the modern Internet. And indeed, people who find a website for search queries, in most cases, know exactly what they need, and are sure that they will find it on this server. However, to make such a way of promoting a web project really effective is very, very difficult. To do this, your link takes one of the top lines in the search results for some keywords. There are even companies on the Internet that specialize in website optimization. Continue reading

1 2 3 5
7 "hard" examples of how in different countries they are trying to control the functioning of the Internet
Recently, politicians, businessmen and even “media” personalities are talking more and more about various aspects of the Internet and, increasingly, the words about it sound in a positive way. The…

...

10 effective ways to "squeeze" the maximum out of your Wi-Fi router
What could be worse in the daily life of a person of the 21st century than a slow Internet? The fall in Internet speed leads to the destruction of nerve…

...

Fathers and Sons of the Digital Millennium: Another Brick in the Wall
The emergence of the Internet not only connected nations and continents in a globalized rush, but also inserted its small brick into the eternal wall separating fathers and children, as…

...

How to study SEO
If you go to any forum, one way or another in contact with the SEO theme, and ask a question like “how to learn SEO?”, Then in 90% of cases…

...