Manage tabs "fire fox"
If you often search for information you need on the Web, sooner or later you will have to use some mechanism that simplifies working with open browser windows. Most modern…

Continue reading →

Read . The Link
7 "hard" examples of how in different countries they are trying to control the functioning of the Internet
Recently, politicians, businessmen and even “media” personalities are talking more and more about various aspects of the Internet and, increasingly, the words about it sound in a positive way. The…

Continue reading →

VPS & nb; & mda h; what it is
Solutions for sharing computer resources into mutually independent virtual machines were developed more than forty years ago, back in the era of mainframes. IBM has developed a special operating system…

Continue reading →

Yandex completely turned

8 things that in no case can not be done on the Internet, so as not to lose personal data

With the spread of the Internet, the era of accessible content, fast exchange of information and rapid communication at any distance began. However, along with all this came the problems, in particular, cybernetic crime. Malefactors on the Web can be incredibly creative in their quest to gain access to the user’s financial information or any other personal data. Here are a few things that you definitely never do on the Web. Continue reading

Telegram lock and deadline for memes: 5 of the loudest scandals of the IT industry lately

Last year was rich in various scandals in the world of information technology. What is it worth blocking Telegram Roskomnadzor messenger or data leakage of 87 million Facebook social network users. And these are only cases that have received wide publicity, but about everything in order.

1. Yandex v Google
The fourth of July last year, Google had a very unpleasant incident with online documents. Continue reading

MySQL Query Browser
End users of web resources, as a rule, are deprived of the joy of direct communication with the MySQL database. But developers have it - more than enough. And here…

...

The first beta version of Firefox 3
The main event of the past week, apparently, should be considered the release of the first beta version of the Mozilla Firefox 3 browser. Among the innovations, developers note additional…

...

Warning network attacks.
An intrusion into a computer system usually begins with a preliminary assessment of the flaws in the protection of the network perimeter of your server connected to the network. In…

...

An article on the subject of Internet "Interesting in the network" Your online office of the Micro oft
The Windows Live family brought together a variety of user services, designed for both ordinary Web users and professional communities of developers, scientists, and researchers. There is even a 3D…

...