Stealth viruses or stealth viruses
Stealth viruses (Stealth) or invisible viruses are a type of resident viruses (reside in RAM). Stealth-viruses falsify information read from the disk so that the program for which this information…

...

Who to entrust the development of the site?
You have thought over everything, provided for everything and decided to create an Internet representation of your company in the network. Here you can go in two ways: hiring specialists…

Continue reading →

Theory of Web Specializations
The article is based on the personal observations of the author. Therefore, no one takes away from the reader the right to consider it subjective. Essence of the theory (lines…

...

caching helps

New stage of development of the network with HTML5

With new modern requirements for the design and interactivity of websites, the possibilities of the HTML4 standard, on which the vast majority of projects are built, to say the least, are exhausted. The information-advanced Internet public places increasingly stringent and practical requirements for media content, both in the field of security and in terms of universality, speed and convenience when working with information flows. The problem of replacing the standard is long overdue and today four leading companies, web browser developers: Google, Mozilla, Opera and Apple, together with the W3C organization, which is engaged in the design and implementation of Internet standards, are actively working to modify the HTML language. What is new and tasty to cook in this kitchen. Continue reading

Can I turn off the entire Internet?

The global system consists of millions of computers, each of which invests in the information web space a piece of information located on it. It is known that the network of these devices is scattered around the world. Almost every country has a web server that provides its share of the development of the global information base. It is not a secret that special devices are officially allocated to provide control and “mapping” of access to these servers. The task of these particular machines is to manage the addressing of Internet resources. Continue reading

What is in the name?

When you use the web or send e’mail, you use the domain name to do this. For example, the Uniform Resource Locator or URL “http://www.kavkazchat.com” contains the domain name kavkazchat.com, as well as, for example, e’mail address admin@kavkazchat.com. Every time you use a domain name, you use the DNS server of the Internet to translate the easily readable domain name into a computer-readable IP address. Continue reading

Perfect web team
All good is always small and compact, and in my opinion the ideal web team should consist of 5 people. For starters, you need a person who will bring the…

...

Why e-books? Pros, cons, facts ...
Yes, actually, why? It’s very simple, there were times when people kept information on clay tablets, papyrus, other information carriers. But time does not stand still, paper came to return,…

Continue reading →

Vector Ulan-Ude - a reliable satellite in the city
If you possess the necessary information for you, then you will be able to correctly apply them and emerge as the winner of any situation. Today, a new project has…

...