Internet marketing
Internet marketing is an organization of marketing in the Internet environment. Internet marketing methods include: design and development of Internet sites, contextual advertising banner advertising search engine marketing e-mail marketing,…

Continue reading →

D-Link DIR-300 Setup
The DIR-300 router has been discontinued today, and its more modern version, DIR-300NRU, can be seen on sale. The difference between them is small: slightly different interfaces (NRU cannot be…

Continue reading →

Rules of work and behavior on the Internet
Every Internet user should be clearly aware that the Internet can not only benefit, but also cause considerable harm. To avoid trouble, strictly follow the recommendations and rules listed below.…

Continue reading →

devices rarely

Advanced CSS Hacks Collection

A hack is a method that allows CSS to be perceived only by a specific browser.
Hacks can be used not only to fix bugs in the layout, but also if certain browser features are used to speed up the rendering of a web page in it (for example, CSS3 properties)

ALL KNOWN CONDITIONAL COMMENTS IN IE
Despite their fame, there are many rarely used ones.
For example, a stylesheet that will be visible to all browsers except IE versions 5-8.
<! – [if! IE] -> <link href = “styles.css” rel = “stylesheet” media = “all” /> <! – [endif] -> Continue reading

How hackers turn our printers, cameras and thermostats into sinister cyber army

In the fall, several large hacker attacks took place in which IoT devices were used. One of them is for Russian banks. The Daily Poster tells the story of other interesting hacks and explains how attackers harm people through light bulbs and refrigerators.
Internet of things attacks Russian banks
On Thursday, November 10, five large Russian banks were subjected to DDoS attacks – a large number of junk requests came to sites that loaded servers and made sites inaccessible. The attacks went to the Moscow Exchange, Alfa Bank, Sberbank, Otkritie Bank, VTB Bank and Rosbank. Almost all banks managed to cope with the load. Among the possible organizers of the attack was a hacker under the nickname vimproducts, whose customers were allegedly dissatisfied with Russia’s interference in the Continue reading

RAM
Random access memory - it is the RAM (RAM), it is also an opertivka. Serves for temporary storage of data with which the central processor works. Surely some are asking…

...

Netbook Choice
Netbook, actually you could hear, or if you saw, decide that this is a laptop, just a small one. Actually, many stores throw them in one pile, but the netbook…

...

Bat files, examples
You can execute all the examples published below not only by creating and running a BAT file containing these commands, but by copying them directly to the command line. To…

...