To help the site customer and future users: Why do I need a website?
Imagine that you recently opened your company. You have qualified staff, great potential and excellent opportunities for the implementation of its activities. Now it's up to the customers. So you…

...

The most famous hackers
Hackers are the most gifted in the literal sense of the word circle of people involved in hacking various types of systems for fun, without causing appreciable harm to computers.…

Continue reading →

To help the site customer and future users: Why do I need a website?
Imagine that you recently opened your company. You have qualified staff, great potential and excellent opportunities for the implementation of its activities. Now it's up to the customers. So you…

...

caching helps

New stage of development of the network with HTML5

With new modern requirements for the design and interactivity of websites, the possibilities of the HTML4 standard, on which the vast majority of projects are built, to say the least, are exhausted. The information-advanced Internet public places increasingly stringent and practical requirements for media content, both in the field of security and in terms of universality, speed and convenience when working with information flows. The problem of replacing the standard is long overdue and today four leading companies, web browser developers: Google, Mozilla, Opera and Apple, together with the W3C organization, which is engaged in the design and implementation of Internet standards, are actively working to modify the HTML language. What is new and tasty to cook in this kitchen. Continue reading

Can I turn off the entire Internet?

The global system consists of millions of computers, each of which invests in the information web space a piece of information located on it. It is known that the network of these devices is scattered around the world. Almost every country has a web server that provides its share of the development of the global information base. It is not a secret that special devices are officially allocated to provide control and “mapping” of access to these servers. The task of these particular machines is to manage the addressing of Internet resources. Continue reading

What is in the name?

When you use the web or send e’mail, you use the domain name to do this. For example, the Uniform Resource Locator or URL “http://www.kavkazchat.com” contains the domain name kavkazchat.com, as well as, for example, e’mail address admin@kavkazchat.com. Every time you use a domain name, you use the DNS server of the Internet to translate the easily readable domain name into a computer-readable IP address. Continue reading

Types of sites
There are numerous types of websites based on the purposes they serve. Today, when there are more than 300 million functioning websites on the Internet, it becomes a bit difficult…

...

Internet security
According to the results of an international study conducted in the European Region, in the Middle East and Africa, it turned out that the index of the Russian Federation’s citizens…

Continue reading →

Stealth viruses or stealth viruses
Stealth viruses (Stealth) or invisible viruses are a type of resident viruses (reside in RAM). Stealth-viruses falsify information read from the disk so that the program for which this information…

...