Telegram lock and deadline for memes: 5 of the loudest scandals of the IT industry lately
Last year was rich in various scandals in the world of information technology. What is it worth blocking Telegram Roskomnadzor messenger or data leakage of 87 million Facebook social network…

Continue reading →

Offline browser
Today, the software arsenal of any more or less active user of the Global Network consists of a considerable number of various utilities. There are among them an email client,…

Continue reading →

"Half a Century in Space - The Epoch of Search"
On the eve of the atrium of the Novinsky Passage shopping center, Google held an exhibition “Half a Century in Space - Search Epoch”, timed to coincide with the 50th…

Continue reading →

posing as those who

7 “hard” examples of how in different countries they are trying to control the functioning of the Internet

Recently, politicians, businessmen and even “media” personalities are talking more and more about various aspects of the Internet and, increasingly, the words about it sound in a positive way. The days when the Internet was poorly distributed and was rather a haven of “freaks” and geeks passed. Together with the mass character of the Network, numerous and really serious problems began to appear. And it is not surprising that entire states are thinking about regulating the Network not only on their territory. Continue reading

8 things that in no case can not be done on the Internet, so as not to lose personal data

With the spread of the Internet, the era of accessible content, fast exchange of information and rapid communication at any distance began. However, along with all this came the problems, in particular, cybernetic crime. Malefactors on the Web can be incredibly creative in their quest to gain access to the user’s financial information or any other personal data. Here are a few things that you definitely never do on the Web. Continue reading

5 rules to help protect yourself from cybercriminals

Today, the problems of cyber defense have become more acute in society. The level of crimes related to the theft of personal data is growing from year to year in all countries of the world. Sometimes it seems that it is impossible to defend against hackers. But in reality this is far from the case. Here are five very simple but useful tips that will help add a couple of points to your level of security on the web. Continue reading

SERM services: how to remove negative reviews at a low price
Reputation is important for every person. But it is no less important for companies engaged in production, sales or services, and for banks offering credit and financial assistance to the…

...

An article on the subject of Internet "Interesting in the network" Your online office of the Micro oft
The Windows Live family brought together a variety of user services, designed for both ordinary Web users and professional communities of developers, scientists, and researchers. There is even a 3D…

...

Your online office of & nb p; Micro oft
The Windows Live family brought together a variety of user services, designed for both ordinary Web users and professional communities of developers, scientists, and researchers. There is even a 3D…

...

Features of network monitoring system Nagio
Probably, any network administrator is familiar with the situation when tasks go one after another, and no other resources are allocated for their solution, except for those already available. And…

...