What is a firewall and why is it needed?
We will not go into little things like translating words, occupying them some part of the article. Just point out that a firewall (from the English - fire wall), or…

Continue reading →

What is conversion and how to correctly calculate it?
Conversion is an important concept in marketing. It gives an assessment of the effectiveness of the advertising campaign, displays the number of visitors who completed the targeted action on the…

Continue reading →

But what if the DropBox features are lacking?
DropBox is one of the most famous and popular services for creating your own data warehouse in the Internet space. It is very convenient to have such an “online flash…

Continue reading →

organizing work

If you blocked the site at work

So a person is arranged that the productivity of his activity is directly related to how often he rests, how much time he devotes to relaxation.

Any office employee during the working day gets tired more morally than physically, because conflict situations, decision making, creative manifestations and even just continuous monotonous work, you see, are unlikely to have a positive impact on labor efficiency. We all like these or those sites where we strive to look at a free time, someone prefers forums, and someone likes to chat in a chat.

All this applies to stress relievers, relaxation, stress relievers, helps to be distracted for a short time, so Continue reading

Destination of proxies and NAT

A proxy server is designed to mediate between a workstation and a worldwide network.

The proxy computer passes user requests through itself and then returns the results received from Inetrnet. This is a kind of “trustee”, contributing to the simultaneous access of all machines on the local network to the Internet. At the same time, the administrator setting up the grid is relieved of the need to assign a separate IP address to each individual point, build a complex routing scheme, and contact the provider for an additional (usually paid) service.

In addition to unnecessary troubles and unjustified high cost with methods that, fortunately, are already a thing of the past, the level of data security in LAN is lost, making each computer a potential target for virus Continue reading

SEO. How to put your site in search engines before others?
Tell me, what is the first thing you do when you need to find any information on the Internet? Right. Usually you open your favorite search engine (Google, Yandex, Rambler…

...

VPN on L2TP technology
L2TP is a tunneling protocol used to create virtual networks. Its main advantage is the ability to create virtual networks not only over IP networks, but also in Frame Relay,…

...

VPN on L2TP technology
L2TP is a tunneling protocol used to create virtual networks. Its main advantage is the ability to create virtual networks not only over IP networks, but also in Frame Relay,…

...

In 15 years there will be no Internet sites?
Will the Internet retain its position in 15 years? What will be its functions? How will sites change? To answer this question, let's first look at a very recent past…

...