Non-standard operating systems
Menuet OS is an operating system not similar to Windows or Unix because it is written not in C (C ++), but in pure assembler (therefore the code is very…

...

Make your CMS better
Recently, I did a little research using the site OpenSourceCMS.com, where you can test dozens of all kinds of open CMS (Content Management Systems, content management systems), and I was…

Continue reading →

Stealth viruses or stealth viruses
Stealth viruses (Stealth) or invisible viruses are a type of resident viruses (reside in RAM). Stealth-viruses falsify information read from the disk so that the program for which this information…

...

caching helps

New stage of development of the network with HTML5

With new modern requirements for the design and interactivity of websites, the possibilities of the HTML4 standard, on which the vast majority of projects are built, to say the least, are exhausted. The information-advanced Internet public places increasingly stringent and practical requirements for media content, both in the field of security and in terms of universality, speed and convenience when working with information flows. The problem of replacing the standard is long overdue and today four leading companies, web browser developers: Google, Mozilla, Opera and Apple, together with the W3C organization, which is engaged in the design and implementation of Internet standards, are actively working to modify the HTML language. What is new and tasty to cook in this kitchen. Continue reading

Can I turn off the entire Internet?

The global system consists of millions of computers, each of which invests in the information web space a piece of information located on it. It is known that the network of these devices is scattered around the world. Almost every country has a web server that provides its share of the development of the global information base. It is not a secret that special devices are officially allocated to provide control and “mapping” of access to these servers. The task of these particular machines is to manage the addressing of Internet resources. Continue reading

What is in the name?

When you use the web or send e’mail, you use the domain name to do this. For example, the Uniform Resource Locator or URL “http://www.kavkazchat.com” contains the domain name kavkazchat.com, as well as, for example, e’mail address admin@kavkazchat.com. Every time you use a domain name, you use the DNS server of the Internet to translate the easily readable domain name into a computer-readable IP address. Continue reading

Perfect web team
All good is always small and compact, and in my opinion the ideal web team should consist of 5 people. For starters, you need a person who will bring the…

...

Instructions for the customer: website design - what you should pay attention
Sooner or later every company needs a website. Suppose the leaders "ripen" to this thought. They immediately have a lot of questions. Who! When? How many? How? Let's try to…

Continue reading →

The most famous hackers
Hackers are the most gifted in the literal sense of the word circle of people involved in hacking various types of systems for fun, without causing appreciable harm to computers.…

...