Features of network monitoring system Nagio
Probably, any network administrator is familiar with the situation when tasks go one after another, and no other resources are allocated for their solution, except for those already available. And…

Continue reading →

7 ways to make sure that the Internet knows everything about everyone
Modern technology really knows no boundaries. With the development of the Internet, information has become worth its weight in gold. Confidentiality has become another important value in our world. And…

Continue reading →

The first beta version of Firefox 3
The main event of the past week, apparently, should be considered the release of the first beta version of the Mozilla Firefox 3 browser. Among the innovations, developers note additional…

Continue reading →

contextual advertising

The whole truth about the & nb p; Network

In no country in the world is a well-known software maker reconciled with the emergence of domains, including its name or trademarks belonging to it. This was the case with the domain microsoftindia.net.

Based on the UDRP rules, Microsoft filed a complaint with the Arbitration and Mediation Center of the World Intellectual Property Organization (WIPO). Lawyers of the corporation were able to prove all the reasons for the transfer of the domain: firstly, the domain name is similar to the plaintiff’s trademark, secondly, the domain owner does not have legal rights to this domain name and, thirdly, the domain is registered and is used in bad faith. Continue reading

What is contextual advertising

It’s no secret that search engines provide the highest quality traffic on the modern Internet. And indeed, people who find a website for search queries, in most cases, know exactly what they need, and are sure that they will find it on this server. However, to make such a way of promoting a web project really effective is very, very difficult. To do this, your link takes one of the top lines in the search results for some keywords. There are even companies on the Internet that specialize in website optimization. Continue reading

"Half a Century in Space - The Epoch of Search"
On the eve of the atrium of the Novinsky Passage shopping center, Google held an exhibition “Half a Century in Space - Search Epoch”, timed to coincide with the 50th…

...

Warning network attacks.
An intrusion into a computer system usually begins with a preliminary assessment of the flaws in the protection of the network perimeter of your server connected to the network. In…

...

We work on a & nb p; secure protocol
Imagine this situation. You have a website located on an external server. You, as an administrator, perform certain actions on it, connecting under a certain login and password. The second…

...

We build a browser-independent site
The last point requires further explanation. Why is displaying information in a text browser so important? I will answer in monosyllables - if your website is an educational institution or…

...