Advanced CSS Hacks Collection
A hack is a method that allows CSS to be perceived only by a specific browser. Hacks can be used not only to fix bugs in the layout, but also…

Continue reading →

Causes and methods for resolving error 0x0000007b
If a problem 0x0000007b occurs, a blue screen appears on the monitor. The PC stops responding to any action. In some cases, a reboot may help. Such a problem often…

Continue reading →

Bat files, examples
You can execute all the examples published below not only by creating and running a BAT file containing these commands, but by copying them directly to the command line. To…

Continue reading →

Rules of work and behavior on the Internet

Every Internet user should be clearly aware that the Internet can not only benefit, but also cause considerable harm. To avoid trouble, strictly follow the recommendations and rules listed below.

• To use the Internet safely, you must have a good antivirus program. At the same time, it is necessary that the installed antivirus can work in monitoring mode – this will allow you to identify a danger immediately when it occurs.

• Use extreme caution when visiting unknown resources on the Internet. Currently, viruses and malicious programs have spread, for infection with which it is enough just to visit a specific web page.

• If you are connected to the Internet through a telephone line, the modem speaker must be turned on. This will allow you to timely detect attempts by network attackers to connect this computer to a particular resource by dialing a given phone number (often it is practiced by distributors of pornographic sites and services of a similar nature). If during the process you hear that the modem began to randomly dial a number without user intervention, you must immediately disconnect from the Network by disconnecting the network cable. After that, you need to check the computer with a special program of the Antispyware category – most likely, a spy module for automatic dialing is implemented in the computer.

• After downloading files, archives, etc. from the Internet you must immediately check them with an antivirus program, and only after that run them for execution, unpack them, etc. Many viruses and malware can be an executable file or archive.

• Mail letters received from unknown and doubtful senders must be checked with a good anti-virus program (with updated anti-virus databases) before opening. If this is not done, then you can quickly turn your computer into a breeding ground for viruses.

• Never reply to letters containing a request to send confidential data (username, password, etc.) to the specified address. With the help of such a simple trick, attackers seize other people’s logins and passwords.

• It is also strongly discouraged to reply to emails that are spam – otherwise the spammer will know that your mailbox is functioning (and this is important information for any spammer). As a result, the amount of spam received will increase many times.

• If you need to leave some information about yourself when visiting various resources on the Internet (forums, portals, sites, etc.), then such information should be minimal (for example, it is completely optional to provide your passport data, home address, various passwords, etc. .P.). Despite the fact that many Internet resources guarantee complete confidentiality, you should not be naive – if someone needs to get this information, he will receive it. Moreover, the options for information leakage can be very different. Who can get confidential information?

♦ Hacker. It simply hacks into the system of protecting the site or portal (or does something similar).

♦ Blackmailer. If someone makes various frivolous acquaintances on the Internet, indicating at the same time as a means of communication a phone number or the address of the main mailbox, then according to these data it is easy to collect incriminating evidence. This is achieved due to the wide capabilities of modern powerful search engines.

♦ A person (or group of persons) collecting individual information about people (for example, the same passport data). In this case, the portal employee who has access to this data will be interested (most often – bribed). As a result, after some time, a careless user learns (as a rule, from law enforcement agencies) that, for example, an offshore (or some other) company is opened on his passport data, through which a dozen or two million dollars are laundered every day. It is easy to guess that the responsibility for all this will rest precisely with the user who frivolously entrusted his personal data to the administration of the Internet resource.

♦ Representative of well-known law enforcement agencies. He will simply contact the site (portal) administration and politely ask to provide him with all the information about users who have registered on the site (and, of course, will receive it as soon as possible).

• When you are finished browsing the Internet, always disconnect the network cable from the telephone line or from the local network.

In general, one of the main rules of work on the Internet is constant vigilance. Remember: what you see on the monitor screen is just the tip of the iceberg, and a huge number of ongoing processes are hidden from your eyes, many of which are openly destructive.

Why everyone hated Apple and why they were wrong
Apple's latest technical solutions have made a lot of noise. In the iPhone 7, the jack slot disappeared, in the new MacBook the usual connectors are replaced with USB Type-C…

...

The difference between Windows and Linux
A small digression about Windows and Linux. Here you understand what’s the matter: Windows is a combination of the core of the system, as well as utility programs and scripts…

...

Website translation and localization
In technical dictionaries and specialized literature, the term “localization” is often equated with “translation”. However, in practice, localization often goes beyond the scope of translation tasks. What is site localization…

...