Where to start creating your own website
Where do any construction work begin? Can I hammer a nail without a hammer? Maybe yes. But is such work convenient and practical? And will it be effective? The questions…

Continue reading →

How to install WordPress on hosting
In order to install WordPress on hosting, you need to follow a few steps that we will do now. So, how to install WordPress on hosting. Step # 1 -…

Continue reading →

How to protect a site from hacking by a hacker
With an insecure site, many troubles can happen: hacking by hackers, attacks, virus infection. Some of the most common attacks: XSS attack. The virus code is embedded in the data…

Continue reading →

Rules of work and behavior on the Internet

Every Internet user should be clearly aware that the Internet can not only benefit, but also cause considerable harm. To avoid trouble, strictly follow the recommendations and rules listed below.

• To use the Internet safely, you must have a good antivirus program. At the same time, it is necessary that the installed antivirus can work in monitoring mode – this will allow you to identify a danger immediately when it occurs.

• Use extreme caution when visiting unknown resources on the Internet. Currently, viruses and malicious programs have spread, for infection with which it is enough just to visit a specific web page.

• If you are connected to the Internet through a telephone line, the modem speaker must be turned on. This will allow you to timely detect attempts by network attackers to connect this computer to a particular resource by dialing a given phone number (often it is practiced by distributors of pornographic sites and services of a similar nature). If during the process you hear that the modem began to randomly dial a number without user intervention, you must immediately disconnect from the Network by disconnecting the network cable. After that, you need to check the computer with a special program of the Antispyware category – most likely, a spy module for automatic dialing is implemented in the computer.

• After downloading files, archives, etc. from the Internet you must immediately check them with an antivirus program, and only after that run them for execution, unpack them, etc. Many viruses and malware can be an executable file or archive.

• Mail letters received from unknown and doubtful senders must be checked with a good anti-virus program (with updated anti-virus databases) before opening. If this is not done, then you can quickly turn your computer into a breeding ground for viruses.

• Never reply to letters containing a request to send confidential data (username, password, etc.) to the specified address. With the help of such a simple trick, attackers seize other people’s logins and passwords.

• It is also strongly discouraged to reply to emails that are spam – otherwise the spammer will know that your mailbox is functioning (and this is important information for any spammer). As a result, the amount of spam received will increase many times.

• If you need to leave some information about yourself when visiting various resources on the Internet (forums, portals, sites, etc.), then such information should be minimal (for example, it is completely optional to provide your passport data, home address, various passwords, etc. .P.). Despite the fact that many Internet resources guarantee complete confidentiality, you should not be naive – if someone needs to get this information, he will receive it. Moreover, the options for information leakage can be very different. Who can get confidential information?

♦ Hacker. It simply hacks into the system of protecting the site or portal (or does something similar).

♦ Blackmailer. If someone makes various frivolous acquaintances on the Internet, indicating at the same time as a means of communication a phone number or the address of the main mailbox, then according to these data it is easy to collect incriminating evidence. This is achieved due to the wide capabilities of modern powerful search engines.

♦ A person (or group of persons) collecting individual information about people (for example, the same passport data). In this case, the portal employee who has access to this data will be interested (most often – bribed). As a result, after some time, a careless user learns (as a rule, from law enforcement agencies) that, for example, an offshore (or some other) company is opened on his passport data, through which a dozen or two million dollars are laundered every day. It is easy to guess that the responsibility for all this will rest precisely with the user who frivolously entrusted his personal data to the administration of the Internet resource.

♦ Representative of well-known law enforcement agencies. He will simply contact the site (portal) administration and politely ask to provide him with all the information about users who have registered on the site (and, of course, will receive it as soon as possible).

• When you are finished browsing the Internet, always disconnect the network cable from the telephone line or from the local network.

In general, one of the main rules of work on the Internet is constant vigilance. Remember: what you see on the monitor screen is just the tip of the iceberg, and a huge number of ongoing processes are hidden from your eyes, many of which are openly destructive.

Where to start creating your own website
Where do any construction work begin? Can I hammer a nail without a hammer? Maybe yes. But is such work convenient and practical? And will it be effective? The questions…

...

Computer and vision
This article will discuss the effects of computers on vision. Initially, the article was focused on CRT-monitors (tube), which could seriously impair vision with regular work on the computer. More…

...

5 fashionable ways to hide from face identification
Today, the face recognition algorithm is used everywhere. And not only in professional tracking systems or smart web services, but in various entertainment applications and basic functions like autofocus. Poster…

...

Apple Pay: what is it and how to use it
Apple Pay is a payment system that allows you to pay for goods in stores by attaching an Apple mobile device to the terminal. The system works according to the…

...