How to install WordPress on hosting
In order to install WordPress on hosting, you need to follow a few steps that we will do now. So, how to install WordPress on hosting. Step # 1 -…

Continue reading →

Advanced CSS Hacks Collection
A hack is a method that allows CSS to be perceived only by a specific browser. Hacks can be used not only to fix bugs in the layout, but also…

Continue reading →

CSS layouts: fixed, rubber, elastic. Pros and cons
What layout layout (using Cascading Style Sheets, CSS) can be considered the best? Each of them has its own hacks (quirks) and its own unique pros and cons. Will one…

Continue reading →

this hosting

How to hack a computer

A home computer is an excellent and at the same time the most vulnerable place to attack. Hacking someone else’s PC, you can not only view the information stored in his memory, but also find out the numbers of bank and virtual cards, and then withdraw all money from them. The resources of the computer itself – the space of the hard disk, the speed of the processor, as well as the speed of the Internet connection will help in attacking other computers that are on the same network as the potential victim. Before you commit a hacker attack, think that the case is illegal and criminally punishable. If this does not scare you, our article is for you.

Hacking a computer through Dark Comet
Dark Comet, or “Rat,” is one of the most popular means of remote computer control. Although the official Continue reading

How does antivirus work

Few people think about how antivirus software works. Often it is installed, periodically updated, but this is where the care for the program ends. The antivirus itself is a means of combating viruses, trojans, spyware, worms, backdoors and other garbage, which we scoop in large quantities from the Internet.

The lion’s share of such programs is aimed at Windows. Firstly, this operating system is the most common in the world. Secondly, it is vulnerable to attacks and hacking attempts due to its popularity. Thirdly, the audience using the OS does not shine with special knowledge of computer literacy. There is also spyware for Linux and MacOS, but it is completely useless from the word. Continue reading

How to protect a site from hacking by a hacker

With an insecure site, many troubles can happen: hacking by hackers, attacks, virus infection. Some of the most common attacks:

XSS attack. The virus code is embedded in the data sent by the user (in the unprotected fields of the registration form, subscription, order, call back, comment). A knowledgeable user can thus “break” the site, making it inoperative.
SQL injection. An action is added to the SQL query that was not originally there, without violating the structure of the previous query. This allows you to access databases, modify and download files from Continue reading

Choosing a Laptop
The first thing I want to say is not to confuse laptops with netbooks. Unfortunately, in the price lists they are all under the name of laptops, but it’s good…

...

Computer Upgrade
I'll start with the upgrade, as it can slightly influence the decision of what is right for you. Upgrade (Upgrade) - this word means updating or improving what is, in…

...

Apple Pay: what is it and how to use it
Apple Pay is a payment system that allows you to pay for goods in stores by attaching an Apple mobile device to the terminal. The system works according to the…

...