Your computer

5 fashionable ways to hide from face identification
Today, the face recognition algorithm is used everywhere. And not only in professional tracking systems or smart web services, but in various entertainment applications and basic functions like autofocus. Poster…

Continue reading →

Windows Maintenance Programs
Computer maintenance can be both physical (dust removal, etc.) and software. The second is more related to the operating system, since the software maintenance of the PC itself at home…

Continue reading →

Causes and methods for resolving error 0x0000007b
If a problem 0x0000007b occurs, a blue screen appears on the monitor. The PC stops responding to any action. In some cases, a reboot may help. Such a problem often…

Continue reading →

How to install WordPress on hosting

In order to install WordPress on hosting, you need to follow a few steps that we will do now. So, how to install WordPress on hosting.

Step # 1 – Creating Your Domain Directory
Log in to the control panel of your hosting (example on the IspManager 5 panel), create a domain that you should have already registered. If you have not registered a domain, it is best to do it here.

To create the root folder of a domain, click on the menu on the left “www” – “www-domains”. Then to “create”. After that, a window with the WWW-domain tab will open in front of you. Enter the following: Continue reading

Advanced CSS Hacks Collection

A hack is a method that allows CSS to be perceived only by a specific browser.
Hacks can be used not only to fix bugs in the layout, but also if certain browser features are used to speed up the rendering of a web page in it (for example, CSS3 properties)

ALL KNOWN CONDITIONAL COMMENTS IN IE
Despite their fame, there are many rarely used ones.
For example, a stylesheet that will be visible to all browsers except IE versions 5-8.
<! – [if! IE] -> <link href = “styles.css” rel = “stylesheet” media = “all” /> <! – [endif] -> Continue reading

CSS layouts: fixed, rubber, elastic. Pros and cons

What layout layout (using Cascading Style Sheets, CSS) can be considered the best? Each of them has its own hacks (quirks) and its own unique pros and cons. Will one of them be more user friendly than everyone else? How easy will it be? What problems do each of them have and how to get around them? Is one of them easier to compose than the rest? Is there any defective, completely unsuitable among them? Most likely, many will unequivocally answer these questions, but I will not be in such a hurry. I like each of these layouts, and each is applicable in one way or another, if you do it wisely and carefully check the ease of use and equal accessibility for all categories of users. All of them are part of the presentational layer for the website, so most accessibility issues arise from the correct use of semantics and general layout rules. Next, I Continue reading

Internet marketing

Internet marketing is an organization of marketing in the Internet environment. Internet marketing methods include:

design and development of Internet sites,
contextual advertising
banner advertising
search engine marketing
e-mail marketing,
Web 2.0 strategies.
Internet marketing provides unique opportunities by providing communication with target audiences, as Continue reading

IT consulting

IT consulting refers to the widest range of solutions designed to optimize existing IT resources for the needs of a particular business, its structure and features. Ultimately, its goal is to improve the operation of management systems and office equipment available at the enterprise for the benefit of the business. High-quality and versatile consulting includes:

IT audit
optimization of existing ones and development of a strategy for introducing new IT solutions;
audit of business processes with various penetration depths.
It is unlikely that anyone today will seriously deny the serious role of IT processes in running a business, especially a large one. At the same time, the larger the business, the more difficult IT solutions will be Continue reading

How hackers turn our printers, cameras and thermostats into sinister cyber army
In the fall, several large hacker attacks took place in which IoT devices were used. One of them is for Russian banks. The Daily Poster tells the story of other…

...

RAM
Random access memory - it is the RAM (RAM), it is also an opertivka. Serves for temporary storage of data with which the central processor works. Surely some are asking…

...

Rules of work and behavior on the Internet
Every Internet user should be clearly aware that the Internet can not only benefit, but also cause considerable harm. To avoid trouble, strictly follow the recommendations and rules listed below.…

...