Setting up equipment for Stream
The article by Peter Didenko “Connecting and saving”, published on the pages of our publication, told about how to save money when connecting to the Stream channel. In today's article…

Continue reading →

Zaekranye Facetop: helping hand from otherworldly friend
Imagine that the texts, folders, and other objects on your monitor suddenly became translucent, and you saw that another person was sitting on that side of the glass and, pointing…

Continue reading →

MySQL Query Browser
End users of web resources, as a rule, are deprived of the joy of direct communication with the MySQL database. But developers have it - more than enough. And here…

Continue reading →

very works arises

One site & nb p; & mda h; two servers?

In most cases, the placement of the site is as follows. All information is hosted on the server. In the future, requests from the user’s computer using the DNS system are sent to this server, which responds with all the necessary data. However, in some cases this scheme is very complicated. To do this, a copy of the site is placed on one or more servers, and a special module (load balancer) sends requests from users’ computers to the least loaded one. Continue reading

Warning network attacks.
An intrusion into a computer system usually begins with a preliminary assessment of the flaws in the protection of the network perimeter of your server connected to the network. In…

...

Popular Copywriting Exchange
The copywriting profession is becoming increasingly popular among novice freelancers. Accordingly, the number of sites providing them with a field for activity, that is, exchanges, is growing. Experienced copywriters know…

...

Secrets of profitable online shopping: 6 ways to properly save on the Internet
In online stores now you can find anything from toys to lawn mowers. Often they are cheaper than regular outlets. And the choice is more - in half an hour…

...

Warning network attacks.
An intrusion into a computer system usually begins with a preliminary assessment of the flaws in the protection of the network perimeter of your server connected to the network. In…

...