Windows undocumented features
In this article I want to talk about some of the undocumented and hidden features of Windows. And also some windows secrets, windows descriptions and windows tricks. 1.) To warm…

Continue reading →

The Internet. Network of things?
Have you heard anything about the Internet of things? I am sure that few people know about this concept. I also did not know until I accidentally heard a broadcast…

Continue reading →

How to make life easier for IT geeks?
The world of modern electronics consists not only of desktop computers, laptops and tablets. This is also a whole bunch of useful little things that seriously simplify the life of…

Continue reading →

significant role

Destination of proxies and NAT

A proxy server is designed to mediate between a workstation and a worldwide network.

The proxy computer passes user requests through itself and then returns the results received from Inetrnet. This is a kind of “trustee”, contributing to the simultaneous access of all machines on the local network to the Internet. At the same time, the administrator setting up the grid is relieved of the need to assign a separate IP address to each individual point, build a complex routing scheme, and contact the provider for an additional (usually paid) service.

In addition to unnecessary troubles and unjustified high cost with methods that, fortunately, are already a thing of the past, the level of data security in LAN is lost, making each computer a potential target for virus Continue reading

How to protect your password from hacking

Today, passwords play a significant role in human life. Everywhere on the Internet, on every site, each account must have its own password in order for the user to gain access to its data. Losing or breaking a password can often result in a big problem and headache.

This article will focus on passwords, hacking methods and creating passwords.

How do passwords break?
There are always at least two ways to crack a password. This is a banal selection (which takes a huge amount of resources and time, but with proper luck, or rather, with due naivety of the user, it will not Continue reading

How to open an online store for your grandmother?
Remember how a couple of years ago, the ability to make money on the Internet seemed to be the highest skill? Then the children patiently explained to their parents how…

...

VPN on L2TP technology
L2TP is a tunneling protocol used to create virtual networks. Its main advantage is the ability to create virtual networks not only over IP networks, but also in Frame Relay,…

...

What is a mobile site useful for?
“Take away [the youth] the Internet - you will get a revolution,” - so recently said the popular Polish actor and director Jerzy Stuhr. According to the observations of Jerzy,…

...

Windows undocumented features
In this article I want to talk about some of the undocumented and hidden features of Windows. And also some windows secrets, windows descriptions and windows tricks. 1.) To warm…

...