One site & nb p; & mda h; two servers?
In most cases, the placement of the site is as follows. All information is hosted on the server. In the future, requests from the user's computer using the DNS system…

Continue reading →

An article on the subject of Internet "Interesting in the network" Your online office of the Micro oft
The Windows Live family brought together a variety of user services, designed for both ordinary Web users and professional communities of developers, scientists, and researchers. There is even a 3D…

Continue reading →

Telegram lock and deadline for memes: 5 of the loudest scandals of the IT industry lately
Last year was rich in various scandals in the world of information technology. What is it worth blocking Telegram Roskomnadzor messenger or data leakage of 87 million Facebook social network…

Continue reading →

computer network

1 2 3 5

Installing Gentoo Linux on & nb p; remote server

Installing Linux on a local machine in most cases is not difficult – in the pursuit of an audience, developers supply distributions with sufficiently high-quality installers. When your server is at best behind the wall, and at worst in another state, the installation of the operating system is usually assigned to data center employees. This greatly limits the choice of possible distributions. It is impossible to judge whether it is good or bad, but if you still have the task of installing Gentoo Linux on a remote machine, then this is quite possible. Continue reading

Warning network attacks.

An intrusion into a computer system usually begins with a preliminary assessment of the flaws in the protection of the network perimeter of your server connected to the network. In the course of such a “shoot-in,” the hacker first needs to know the list of open ports and evaluate the identity of your computer’s operating system. The previous article described the scanlogd program, which allows analyzing attempts to scan your server. Continue reading

What is contextual advertising

It’s no secret that search engines provide the highest quality traffic on the modern Internet. And indeed, people who find a website for search queries, in most cases, know exactly what they need, and are sure that they will find it on this server. However, to make such a way of promoting a web project really effective is very, very difficult. To do this, your link takes one of the top lines in the search results for some keywords. There are even companies on the Internet that specialize in website optimization. Continue reading

1 2 3 5
Warning network attacks.
An intrusion into a computer system usually begins with a preliminary assessment of the flaws in the protection of the network perimeter of your server connected to the network. In…

...

Warning network attacks.
An intrusion into a computer system usually begins with a preliminary assessment of the flaws in the protection of the network perimeter of your server connected to the network. In…

...

7 "hard" examples of how in different countries they are trying to control the functioning of the Internet
Recently, politicians, businessmen and even “media” personalities are talking more and more about various aspects of the Internet and, increasingly, the words about it sound in a positive way. The…

...

MySQL Query Browser
End users of web resources, as a rule, are deprived of the joy of direct communication with the MySQL database. But developers have it - more than enough. And here…

...