"Half a Century in Space - The Epoch of Search"
On the eve of the atrium of the Novinsky Passage shopping center, Google held an exhibition “Half a Century in Space - Search Epoch”, timed to coincide with the 50th…

Continue reading →

Twilight CMS
The Content Manager System (CMS) site creation software class was created to facilitate the work of webmasters. These programs are distributed in different ways. As a rule, via the Internet,…

Continue reading →

One site & nb p; & mda h; two servers?
In most cases, the placement of the site is as follows. All information is hosted on the server. In the future, requests from the user's computer using the DNS system…

Continue reading →

nothing surprising

Secrets of profitable online shopping: 6 ways to properly save on the Internet

In online stores now you can find anything from toys to lawn mowers. Often they are cheaper than regular outlets. And the choice is more – in half an hour you can “visit” a dozen stores without leaving your home. In short, it’s time to gradually switch to online shopping. But for this, it is not enough to learn how to arrange, pay for orders and choose the best delivery options – you need to understand how you can safely and correctly save your money without giving away too much. Continue reading

7 ways to make sure that the Internet knows everything about everyone

Modern technology really knows no boundaries. With the development of the Internet, information has become worth its weight in gold. Confidentiality has become another important value in our world. And if a person really believes that being in a comfortable house, at a computer, he is completely alone and is not needed by anyone, then this person is in the deepest of delusions. Continue reading

8 things that in no case can not be done on the Internet, so as not to lose personal data

With the spread of the Internet, the era of accessible content, fast exchange of information and rapid communication at any distance began. However, along with all this came the problems, in particular, cybernetic crime. Malefactors on the Web can be incredibly creative in their quest to gain access to the user’s financial information or any other personal data. Here are a few things that you definitely never do on the Web. Continue reading

One site & nb p; & mda h; two servers?
In most cases, the placement of the site is as follows. All information is hosted on the server. In the future, requests from the user's computer using the DNS system…

...

Five myths and misconceptions about 5G networks and one fly in the ointment
Very soon, already in 2019, the first commercial 5G networks will appear in Russia. On the eve of this event, the first 5G-compatible smartphones will begin to appear in the…

...

Installing Gentoo Linux on & nb p; remote server
Installing Linux on a local machine in most cases is not difficult - in the pursuit of an audience, developers supply distributions with sufficiently high-quality installers. When your server is…

...

Domains with & nb p; exhibitions
Day of national unity for the whole day reduced the already short working week. Holidays, I must say, generally relax great - maybe that is why the flow of news…

...