The most famous hackers
Hackers are the most gifted in the literal sense of the word circle of people involved in hacking various types of systems for fun, without causing appreciable harm to computers.…

...

Stealth viruses or stealth viruses
Stealth viruses (Stealth) or invisible viruses are a type of resident viruses (reside in RAM). Stealth-viruses falsify information read from the disk so that the program for which this information…

Continue reading →

How are sites created?
Recently it has become terribly fashionable to place commercial websites and representative web pages on the Web: each tiny company considers it its duty to leave its own mark on…

...

Internet works

Design and logic of the Internet portal

Information portal is one of the most popular Internet resources. What only interests, aspects of life, activities they do not cover! Portals on professional topics, news portals, portals on art, politics, sports, tourism, education, psychology, and hundreds of others offer us a wealth of information and facts. We used to call this mass information. But do portals inform us? Is it possible to call a hill of washed and chopped vegetables ready tasty salad, which is also well absorbed? Not. The same with modern portals. Continue reading

Internet security

According to the results of an international study conducted in the European Region, in the Middle East and Africa, it turned out that the index of the Russian Federation’s citizens on security in the Internet reached the European average. In this case, more than 11,000 people (including children and pensioners) from 27 countries were interviewed. Continue reading

Can I turn off the entire Internet?

The global system consists of millions of computers, each of which invests in the information web space a piece of information located on it. It is known that the network of these devices is scattered around the world. Almost every country has a web server that provides its share of the development of the global information base. It is not a secret that special devices are officially allocated to provide control and “mapping” of access to these servers. The task of these particular machines is to manage the addressing of Internet resources. Continue reading

What is in the name?
When you use the web or send e'mail, you use the domain name to do this. For example, the Uniform Resource Locator or URL "http://www.kavkazchat.com" contains the domain name kavkazchat.com,…

...

Blogging
Writing high-quality articles for the blog that you liked and would be quite understandable to the reader is very difficult. It depends on them how much you interest your audience…

Continue reading →

Recipe learning web design
Income-generating websiteWeb design and related disciplines are still relatively young and still under development. I am often asked the same question: "How to become a web designer?". The answer is…

...