Your computer

Disabling Unnecessary Windows Services
This article provides specific recommendations about which services in Windows can be safely turned off with one caveat: if you are dealing with your personal computer that is not included…

Continue reading →

Apple Pay: what is it and how to use it
Apple Pay is a payment system that allows you to pay for goods in stores by attaching an Apple mobile device to the terminal. The system works according to the…

Continue reading →

Modernization of old PCs
Immediately, I note that the article is not one year old and it was left on the site for a change. It is clear that now on the market there…

Continue reading →

How to install WordPress on hosting

In order to install WordPress on hosting, you need to follow a few steps that we will do now. So, how to install WordPress on hosting.

Step # 1 – Creating Your Domain Directory
Log in to the control panel of your hosting (example on the IspManager 5 panel), create a domain that you should have already registered. If you have not registered a domain, it is best to do it here.

To create the root folder of a domain, click on the menu on the left “www” – “www-domains”. Then to “create”. After that, a window with the WWW-domain tab will open in front of you. Enter the following: Continue reading

Advanced CSS Hacks Collection

A hack is a method that allows CSS to be perceived only by a specific browser.
Hacks can be used not only to fix bugs in the layout, but also if certain browser features are used to speed up the rendering of a web page in it (for example, CSS3 properties)

ALL KNOWN CONDITIONAL COMMENTS IN IE
Despite their fame, there are many rarely used ones.
For example, a stylesheet that will be visible to all browsers except IE versions 5-8.
<! – [if! IE] -> <link href = “styles.css” rel = “stylesheet” media = “all” /> <! – [endif] -> Continue reading

CSS layouts: fixed, rubber, elastic. Pros and cons

What layout layout (using Cascading Style Sheets, CSS) can be considered the best? Each of them has its own hacks (quirks) and its own unique pros and cons. Will one of them be more user friendly than everyone else? How easy will it be? What problems do each of them have and how to get around them? Is one of them easier to compose than the rest? Is there any defective, completely unsuitable among them? Most likely, many will unequivocally answer these questions, but I will not be in such a hurry. I like each of these layouts, and each is applicable in one way or another, if you do it wisely and carefully check the ease of use and equal accessibility for all categories of users. All of them are part of the presentational layer for the website, so most accessibility issues arise from the correct use of semantics and general layout rules. Next, I Continue reading

Internet marketing

Internet marketing is an organization of marketing in the Internet environment. Internet marketing methods include:

design and development of Internet sites,
contextual advertising
banner advertising
search engine marketing
e-mail marketing,
Web 2.0 strategies.
Internet marketing provides unique opportunities by providing communication with target audiences, as Continue reading

IT consulting

IT consulting refers to the widest range of solutions designed to optimize existing IT resources for the needs of a particular business, its structure and features. Ultimately, its goal is to improve the operation of management systems and office equipment available at the enterprise for the benefit of the business. High-quality and versatile consulting includes:

IT audit
optimization of existing ones and development of a strategy for introducing new IT solutions;
audit of business processes with various penetration depths.
It is unlikely that anyone today will seriously deny the serious role of IT processes in running a business, especially a large one. At the same time, the larger the business, the more difficult IT solutions will be Continue reading

How hackers turn our printers, cameras and thermostats into sinister cyber army
In the fall, several large hacker attacks took place in which IoT devices were used. One of them is for Russian banks. The Daily Poster tells the story of other…

...

Work on the Windows command line
The most common startup recommendations are: Start, Run, cmd. There is a Run item in the start menu. He runs a program that allows you to transfer single commands to…

...

Disabling Unnecessary Windows Services
This article provides specific recommendations about which services in Windows can be safely turned off with one caveat: if you are dealing with your personal computer that is not included…

...

CSS layouts: fixed, rubber, elastic. Pros and cons
What layout layout (using Cascading Style Sheets, CSS) can be considered the best? Each of them has its own hacks (quirks) and its own unique pros and cons. Will one…

...