The Internet. Network of things?
Have you heard anything about the Internet of things? I am sure that few people know about this concept. I also did not know until I accidentally heard a broadcast…

Continue reading →

Personal Data Security
What is personal information and why does the state develop entire laws designed to protect such data? Imagine that you are making an order online. In the process of forming…

Continue reading →

Have you already checked in? Mastering Foursquare Social Network
Today's leaders in the market of Internet idleness products are intertwined with each other very tightly, notifications and records are scattered across all social networks in a few minutes and…

Continue reading →

provides unique

Destination of proxies and NAT

A proxy server is designed to mediate between a workstation and a worldwide network.

The proxy computer passes user requests through itself and then returns the results received from Inetrnet. This is a kind of “trustee”, contributing to the simultaneous access of all machines on the local network to the Internet. At the same time, the administrator setting up the grid is relieved of the need to assign a separate IP address to each individual point, build a complex routing scheme, and contact the provider for an additional (usually paid) service.

In addition to unnecessary troubles and unjustified high cost with methods that, fortunately, are already a thing of the past, the level of data security in LAN is lost, making each computer a potential target for virus Continue reading

File encryption

Encryption is the most common and essentially the simplest way to protect any information. After all, it seems that it could be simpler to take the text, take some algorithm known to you and your friends and using the algorithm to make gibberish from the text that no one except you and your friends will parse. Simple and pretty angry. To date, the solution remains the most reasonable.

However, many may argue, “then what is the effectiveness and complexity of encryption?” But it is in the selection of the algorithm. At the moment, there are a huge number of encryption systems and ciphers. Continue reading

Overview of modern antiviruses

Of all the threats to the security of user information, viruses stand apart. These small malicious programs, if not handled carefully, can steal or destroy any data. But it turns out to be the easiest to defend against them. The Internet is teeming with dozens of different antivirus programs that offer us a quick and easy solution to the problem. But how good are these programs? How to make a specific choice?

Laboratory Research – Clean Water Cheating
Very often you can find on the Internet studies of various laboratories or some scientists there, which talk Continue reading

What is a mobile site useful for?
“Take away [the youth] the Internet - you will get a revolution,” - so recently said the popular Polish actor and director Jerzy Stuhr. According to the observations of Jerzy,…

...

In 15 years there will be no Internet sites?
Will the Internet retain its position in 15 years? What will be its functions? How will sites change? To answer this question, let's first look at a very recent past…

...

Internet audience. Pros and cons
In this article I will try to tell you what fundamental differences can be between an ordinary audience and an online audience, and how this can affect conversion in its…

...

SMM and SMO - looking for differences
Any more or less advanced Internet user has repeatedly come across terms such as SMO and SMM. The initiates can easily operate them, but most people have a somewhat vague…

...