IT consulting
IT consulting refers to the widest range of solutions designed to optimize existing IT resources for the needs of a particular business, its structure and features. Ultimately, its goal is…

Continue reading →

Modernization of old PCs
Immediately, I note that the article is not one year old and it was left on the site for a change. It is clear that now on the market there…

Continue reading →

Video card
A video card is also a graphics accelerator, a computer component responsible for outputting images and generating graphics, for example, in games. The video card is necessary for the computer…

Continue reading →

tanya

How to protect a site from hacking by a hacker

With an insecure site, many troubles can happen: hacking by hackers, attacks, virus infection. Some of the most common attacks:

XSS attack. The virus code is embedded in the data sent by the user (in the unprotected fields of the registration form, subscription, order, call back, comment). A knowledgeable user can thus “break” the site, making it inoperative.
SQL injection. An action is added to the SQL query that was not originally there, without violating the structure of the previous query. This allows you to access databases, modify and download files from Continue reading

Rules of work and behavior on the Internet

Every Internet user should be clearly aware that the Internet can not only benefit, but also cause considerable harm. To avoid trouble, strictly follow the recommendations and rules listed below.

• To use the Internet safely, you must have a good antivirus program. At the same time, it is necessary that the installed antivirus can work in monitoring mode – this will allow you to identify a danger immediately when it occurs.

• Use extreme caution when visiting unknown resources on the Internet. Currently, viruses and malicious programs have spread, for infection with which it is enough just to visit a specific web page.

• If you are connected to the Internet through a telephone line, the modem speaker must be turned on. This will Continue reading

How to install WordPress on hosting
In order to install WordPress on hosting, you need to follow a few steps that we will do now. So, how to install WordPress on hosting. Step # 1 -…

...

Nettop Choice
Nettop, like the netbook, was introduced by Intel at the release of the Atom processor. That is, in essence, it is the same as a netbook only in the form…

...

How to hack a computer
A home computer is an excellent and at the same time the most vulnerable place to attack. Hacking someone else’s PC, you can not only view the information stored in…

...