How the Internet works
One of the most wonderful things about the internet is that nobody owns them. The Internet is simply a large set of computer networks, both large and small, located throughout…

...

Perfect web team
All good is always small and compact, and in my opinion the ideal web team should consist of 5 people. For starters, you need a person who will bring the…

Continue reading →

polyphage

Design and logic of the Internet portal

Information portal is one of the most popular Internet resources. What only interests, aspects of life, activities they do not cover! Portals on professional topics, news portals, portals on art, politics, sports, tourism, education, psychology, and hundreds of others offer us a wealth of information and facts. We used to call this mass information. But do portals inform us? Is it possible to call a hill of washed and chopped vegetables ready tasty salad, which is also well absorbed? Not. The same with modern portals. Continue reading

What is in the name?

When you use the web or send e’mail, you use the domain name to do this. For example, the Uniform Resource Locator or URL “http://www.kavkazchat.com” contains the domain name kavkazchat.com, as well as, for example, e’mail address admin@kavkazchat.com. Every time you use a domain name, you use the DNS server of the Internet to translate the easily readable domain name into a computer-readable IP address. Continue reading

Who to entrust the development of the site?
You have thought over everything, provided for everything and decided to create an Internet representation of your company in the network. Here you can go in two ways: hiring specialists…

...

Basics of web design. How to start developing a website?
The other day, the young lady employee came to me with a modest request - to teach her web-design. And, although my experience in this industry is calculated over the…

Continue reading →

Stealth viruses or stealth viruses
Stealth viruses (Stealth) or invisible viruses are a type of resident viruses (reside in RAM). Stealth-viruses falsify information read from the disk so that the program for which this information…

...