How to protect a site from hacking by a hacker
With an insecure site, many troubles can happen: hacking by hackers, attacks, virus infection. Some of the most common attacks: XSS attack. The virus code is embedded in the data…

Continue reading →

Advanced CSS Hacks Collection
A hack is a method that allows CSS to be perceived only by a specific browser. Hacks can be used not only to fix bugs in the layout, but also…

Continue reading →

PC Recommendations
Now we will consider the question of choosing a personal computer (PC). Immediately it is worth noting that the examples below are taken from the price list of the DNS…

Continue reading →

minimum and

Apple Pay: what is it and how to use it

Apple Pay is a payment system that allows you to pay for goods in stores by attaching an Apple mobile device to the terminal. The system works according to the NFC protocol and only on terminals that accept contactless payments (they must have a PayPass or PayWave label). The system is compatible only with models older than the iPhone 6, including the iPhone SE, as well as with the Apple Watch. In the latter case, the system will be able to configure through the iPhone 5, 5s and 5c.

To pay, you need to bring the gadget to the terminal, select the card in the application and attach your finger to the Touch ID sensor. On Apple Watch, a payment is launched by double-clicking on the power button and does not require special authorization. Neither Apple Pay nor other payment services charge Continue reading

How hackers turn our printers, cameras and thermostats into sinister cyber army

In the fall, several large hacker attacks took place in which IoT devices were used. One of them is for Russian banks. The Daily Poster tells the story of other interesting hacks and explains how attackers harm people through light bulbs and refrigerators.
Internet of things attacks Russian banks
On Thursday, November 10, five large Russian banks were subjected to DDoS attacks – a large number of junk requests came to sites that loaded servers and made sites inaccessible. The attacks went to the Moscow Exchange, Alfa Bank, Sberbank, Otkritie Bank, VTB Bank and Rosbank. Almost all banks managed to cope with the load. Among the possible organizers of the attack was a hacker under the nickname vimproducts, whose customers were allegedly dissatisfied with Russia’s interference in the Continue reading

Linux operating systems

Linux is not an operating system, but just its kernel. Everything that you are accustomed to see and understand as an OS (buttons, windows and panels) – in fact, it is not. What you see is the GUI (Graphical user interface), that is, the graphical user interface, also called the graphical environment or graphical shell. GUI is a program designed to simplify the life of the user so that he does not suffer from the console. In fact, any OS looks like a console, that is, like the good old DOS.

The types of operating systems built on the Linux kernel vary widely both in providing a working environment and in the set of applications available in the OS. This is partly because some programs Continue reading

Processor
The central processing unit (CPU) is the core of the computer, so to speak its main brain, that component that performs the bulk of the computer’s work. They usually call…

...

Modernization of old PCs
Immediately, I note that the article is not one year old and it was left on the site for a change. It is clear that now on the market there…

...

Website translation and localization
In technical dictionaries and specialized literature, the term “localization” is often equated with “translation”. However, in practice, localization often goes beyond the scope of translation tasks. What is site localization…

...

Rules of work and behavior on the Internet
Every Internet user should be clearly aware that the Internet can not only benefit, but also cause considerable harm. To avoid trouble, strictly follow the recommendations and rules listed below.…

...