"Half a Century in Space - The Epoch of Search"
On the eve of the atrium of the Novinsky Passage shopping center, Google held an exhibition “Half a Century in Space - Search Epoch”, timed to coincide with the 50th…

Continue reading →

agen bandarq
We work on a & nb p; secure protocol
Imagine this situation. You have a website located on an external server. You, as an administrator, perform certain actions on it, connecting under a certain login and password. The second…

Continue reading →

Svg as foreboding
Generally speaking, the hype around Scalable Vector Graphics (SVG) began almost immediately after the W3C assembled the SVG Working Group, led by Chris Lilley, and announced the standard. This happened…

Continue reading →

l devices – practically everything

VPS & nb; & mda h; what it is

Solutions for sharing computer resources into mutually independent virtual machines were developed more than forty years ago, back in the era of mainframes. IBM has developed a special operating system OS VM / 370 (later there were other versions, such as VM / ESA).

In this operating system, the user had at his disposal a full-featured virtual computer on which he could install his own version of the operating system and install his own application software, and launch his tasks for execution. Continue reading

Manage tabs "fire fox"
If you often search for information you need on the Web, sooner or later you will have to use some mechanism that simplifies working with open browser windows. Most modern…

...

Installing Gentoo Linux on & nb p; remote server
Installing Linux on a local machine in most cases is not difficult - in the pursuit of an audience, developers supply distributions with sufficiently high-quality installers. When your server is…

...

8 things that in no case can not be done on the Internet, so as not to lose personal data
With the spread of the Internet, the era of accessible content, fast exchange of information and rapid communication at any distance began. However, along with all this came the problems,…

...

Warning network attacks.
An intrusion into a computer system usually begins with a preliminary assessment of the flaws in the protection of the network perimeter of your server connected to the network. In…

...