"Half a Century in Space - The Epoch of Search"
On the eve of the atrium of the Novinsky Passage shopping center, Google held an exhibition “Half a Century in Space - Search Epoch”, timed to coincide with the 50th…

Continue reading →

Watch epic game Tetris99 for free!
Hosting and its types
Currently, every self-respecting company or private entrepreneur consider it a duty to have a personal website. In order to start a site you need to register a domain name yourself,…

Continue reading →

5 rules to help protect yourself from cybercriminals
Today, the problems of cyber defense have become more acute in society. The level of crimes related to the theft of personal data is growing from year to year in…

Continue reading →

computer network

1 2 3 5

Installing Gentoo Linux on & nb p; remote server

Installing Linux on a local machine in most cases is not difficult – in the pursuit of an audience, developers supply distributions with sufficiently high-quality installers. When your server is at best behind the wall, and at worst in another state, the installation of the operating system is usually assigned to data center employees. This greatly limits the choice of possible distributions. It is impossible to judge whether it is good or bad, but if you still have the task of installing Gentoo Linux on a remote machine, then this is quite possible. Continue reading

Warning network attacks.

An intrusion into a computer system usually begins with a preliminary assessment of the flaws in the protection of the network perimeter of your server connected to the network. In the course of such a “shoot-in,” the hacker first needs to know the list of open ports and evaluate the identity of your computer’s operating system. The previous article described the scanlogd program, which allows analyzing attempts to scan your server. Continue reading

What is contextual advertising

It’s no secret that search engines provide the highest quality traffic on the modern Internet. And indeed, people who find a website for search queries, in most cases, know exactly what they need, and are sure that they will find it on this server. However, to make such a way of promoting a web project really effective is very, very difficult. To do this, your link takes one of the top lines in the search results for some keywords. There are even companies on the Internet that specialize in website optimization. Continue reading

1 2 3 5
From birch bark to hosting: How information storage has evolved with the development of humanity
Since ancient times, people have tried to keep information known to them - both for themselves and for posterity. At first, the methods of preserving information were the most primitive,…

...

Telegram lock and deadline for memes: 5 of the loudest scandals of the IT industry lately
Last year was rich in various scandals in the world of information technology. What is it worth blocking Telegram Roskomnadzor messenger or data leakage of 87 million Facebook social network…

...

7 ways to make sure that the Internet knows everything about everyone
Modern technology really knows no boundaries. With the development of the Internet, information has become worth its weight in gold. Confidentiality has become another important value in our world. And…

...

Zaekranye Facetop: helping hand from otherworldly friend
Imagine that the texts, folders, and other objects on your monitor suddenly became translucent, and you saw that another person was sitting on that side of the glass and, pointing…

...