Hacking sites and CC
It's no secret that there are quite a few hackers on the modern Internet. Some of them are really high-class specialists, well versed in many technologies. Others, on the contrary,…

Continue reading →

Manage tabs "fire fox"
If you often search for information you need on the Web, sooner or later you will have to use some mechanism that simplifies working with open browser windows. Most modern…

Continue reading →

Zaekranye Facetop: helping hand from otherworldly friend
Imagine that the texts, folders, and other objects on your monitor suddenly became translucent, and you saw that another person was sitting on that side of the glass and, pointing…

Continue reading →

field declared

Web Services & nb p; 2.0: Flickr

Every day, Web 2.0 services are becoming more and more. There are even those who have achieved amazing results, and their value is expressed in millions of dollars. The leader among the encyclopedias is Wikipedia. If bookmarked, then delicious. The blog posting service is Blogger.
If a social network, then MySpace. If the service for working with photos, then, of course, Flickr.
We haven’t written much about Web 2.0 services. Continue reading

Indices: first step on & nb p; paths to & nb p; speed

Databases are specialized repositories of information, and working with them, we operate with concepts of data sets and operations on these data, forgetting that there is real equipment behind them. Creating a SQL query, we mean that all actions on the tables are carried out simultaneously, because the concept of time in the commands of the SQL language is absent. When our database is small, we may not notice that the database server needs time to process the table we specified, to search for the required row, to retrieve the necessary records. Continue reading

Internet times of Khrushchev: why in the Soviet Union did not create their own computer network
It is known that the Internet in its current form is the development of the computer network ARPANET, developed in the USA in 1969. However, few people know that in…

...

How to understand that someone is following our correspondence on the web and take all necessary measures
In recent years, there are more and more scandals associated with data leakage on the Web and spying on people - both for individuals and for companies or even states.…

...

8 things that in no case can not be done on the Internet, so as not to lose personal data
With the spread of the Internet, the era of accessible content, fast exchange of information and rapid communication at any distance began. However, along with all this came the problems,…

...

Warning network attacks.
An intrusion into a computer system usually begins with a preliminary assessment of the flaws in the protection of the network perimeter of your server connected to the network. In…

...