VPN on L2TP technology
L2TP is a tunneling protocol used to create virtual networks. Its main advantage is the ability to create virtual networks not only over IP networks, but also in Frame Relay,…

Continue reading →

Present day viruses
There are a huge number of computer viruses in the world. To establish their exact number (along with all modifications and upgrades) no one is taken. Instead, it is customary…

Continue reading →

Internet cheating
money Surely everyone who is not the first day on the network, faced with various types of swindle. They ask to send money, download something or go to some link.…

Continue reading →

number of product

1 2 3 6

Is a blogger a profession?

Looking at the ranking of blogs, I saw an up arrow. During the day, went up thirty-three thousand positions ?! Wow, an intellectual sport! But it captivates. Pixelbliss, Shutterstock.com Today, it was hard to wait for the afternoon to take a look at the new numbers. Up by two seven hundred. Already not impressive, I want to jump over hundreds of thousands of users and get among the first. Should I study the experience of the masters for this? I look at blogs that are in the top hundred in popularity based on these ratings. I see a lot of photos and videos. The text is coherent, but rustic. Mention famous names. Commenting on events a moment after they become aware of them – with some arrogance of recognized authority, a proper attitude towards them is dictated. As if behind the backs of popular bloggers there is a Continue reading

Local Area Networks and the Internet

When a local area network is connected to the global Internet, one of the PCs, called a server, becomes a kind of conductor and connects to the Internet using a modem or other way, while other computers operate through it, they are also called workstations. Just like any of us has a mailing address where we receive mail letters, each computer is assigned an IP address for functioning in the Internet environment, but usually it has only a computer-explorer directly connected to the Internet.

If the computer is connected through a modem, it usually receives a dynamic address from the service Continue reading

Destination of proxies and NAT

A proxy server is designed to mediate between a workstation and a worldwide network.

The proxy computer passes user requests through itself and then returns the results received from Inetrnet. This is a kind of “trustee”, contributing to the simultaneous access of all machines on the local network to the Internet. At the same time, the administrator setting up the grid is relieved of the need to assign a separate IP address to each individual point, build a complex routing scheme, and contact the provider for an additional (usually paid) service.

In addition to unnecessary troubles and unjustified high cost with methods that, fortunately, are already a thing of the past, the level of data security in LAN is lost, making each computer a potential target for virus Continue reading

1 2 3 6
Online store and product search function
Today I decided to touch on the topic of the need and proper configuration of the function of searching for goods in the online store. According to statistics, every second…

...

What could the Internet become in the future?
In the world, it seems, there is not a single corner left without an Internet connection. He is in the jungle of the Amazon, in Antarctica, in the deserts of…

...

Assessment of the effectiveness of traffic from social networks
There are two important components to content marketing: your own content and its distribution channels. Not so long ago, e-commerce projects focused on only a few channels of traffic generation…

...

Book or internet?
Many are confident that in the near future the computer will completely supplant the book. And I am convinced that this will never happen. Computers and the Internet are crowding…

...