Apple iPhone OS
Preamble: Recently, all sorts of mobile and, especially fashionable, cloud technologies have captured the attention of mankind. Desktops and laptops faded into the background, giving way to more compact and…

Continue reading →

Rules of work and behavior on the Internet
Every Internet user should be clearly aware that the Internet can not only benefit, but also cause considerable harm. To avoid trouble, strictly follow the recommendations and rules listed below.…

Continue reading →

Silent installation of applications (silent install)
Silent installation is such a process in which you sit quietly and look at the screen where the software installation process takes place without your participation, provided that it is…

Continue reading →

provide him with

How does antivirus work

Few people think about how antivirus software works. Often it is installed, periodically updated, but this is where the care for the program ends. The antivirus itself is a means of combating viruses, trojans, spyware, worms, backdoors and other garbage, which we scoop in large quantities from the Internet.

The lion’s share of such programs is aimed at Windows. Firstly, this operating system is the most common in the world. Secondly, it is vulnerable to attacks and hacking attempts due to its popularity. Thirdly, the audience using the OS does not shine with special knowledge of computer literacy. There is also spyware for Linux and MacOS, but it is completely useless from the word. Continue reading

How to protect a site from hacking by a hacker

With an insecure site, many troubles can happen: hacking by hackers, attacks, virus infection. Some of the most common attacks:

XSS attack. The virus code is embedded in the data sent by the user (in the unprotected fields of the registration form, subscription, order, call back, comment). A knowledgeable user can thus “break” the site, making it inoperative.
SQL injection. An action is added to the SQL query that was not originally there, without violating the structure of the previous query. This allows you to access databases, modify and download files from Continue reading

Rules of work and behavior on the Internet

Every Internet user should be clearly aware that the Internet can not only benefit, but also cause considerable harm. To avoid trouble, strictly follow the recommendations and rules listed below.

• To use the Internet safely, you must have a good antivirus program. At the same time, it is necessary that the installed antivirus can work in monitoring mode – this will allow you to identify a danger immediately when it occurs.

• Use extreme caution when visiting unknown resources on the Internet. Currently, viruses and malicious programs have spread, for infection with which it is enough just to visit a specific web page.

• If you are connected to the Internet through a telephone line, the modem speaker must be turned on. This will Continue reading

CSS layouts: fixed, rubber, elastic. Pros and cons
What layout layout (using Cascading Style Sheets, CSS) can be considered the best? Each of them has its own hacks (quirks) and its own unique pros and cons. Will one…

...

Internet marketing
Internet marketing is an organization of marketing in the Internet environment. Internet marketing methods include: design and development of Internet sites, contextual advertising banner advertising search engine marketing e-mail marketing,…

...

How to protect a site from hacking by a hacker
With an insecure site, many troubles can happen: hacking by hackers, attacks, virus infection. Some of the most common attacks: XSS attack. The virus code is embedded in the data…

...

Capacitor Replacement
In the element base of the computer (and not only) there is one bottleneck - electrolytic capacitors. They contain electrolyte, electrolyte is a liquid. Therefore, heating such a capacitor leads…

...