User friendly interface
When planning the structure of the navigation menu - consider well-known statistics, which states that the average user must find the final document in a maximum (!) Of three steps…

...

Stealth viruses or stealth viruses
Stealth viruses (Stealth) or invisible viruses are a type of resident viruses (reside in RAM). Stealth-viruses falsify information read from the disk so that the program for which this information…

Continue reading →

User friendly interface
When planning the structure of the navigation menu - consider well-known statistics, which states that the average user must find the final document in a maximum (!) Of three steps…

...

electronic publications

Why does the internet go down? Reasons and recommendations

“The Internet periodically disappears”, “Yesterday I used the Internet, and today the connection was lost”, “The program does not want to connect to the Internet” – these and many other similar complaints can be heard from users who, for one reason or another, faced the problem of lack of communication with the global network. Continue reading

How are sites created?

Recently it has become terribly fashionable to place commercial websites and representative web pages on the Web: each tiny company considers it its duty to leave its own mark on the endless virtual spaces of the World Intellectual Garbage. No, the craze itself, as a social phenomenon, first manifested itself in the ninety-seventh year, and only then it gradually acquired the features of mass psychosis, but in the era of the formation of Runet, business leaders and other responsible people still tried to trust the development of their own Internet representations at least to people who own the basics of HTML and know how to handle Photoshop. Continue reading

Basics of web design. How to start developing a website?
The other day, the young lady employee came to me with a modest request - to teach her web-design. And, although my experience in this industry is calculated over the…

...

What is in the name?
When you use the web or send e'mail, you use the domain name to do this. For example, the Uniform Resource Locator or URL "http://www.kavkazchat.com" contains the domain name kavkazchat.com,…

Continue reading →

The most famous hackers
Hackers are the most gifted in the literal sense of the word circle of people involved in hacking various types of systems for fun, without causing appreciable harm to computers.…

...