Vertical text direction in web design - good use cases
Home »Web Design» Typography »Vertical Text Direction in Web Design - Good Use Cases Vertical text direction in web design - good use cases Ordinary standard and template web projects…

Continue reading →

What is a firewall and why is it needed?
We will not go into little things like translating words, occupying them some part of the article. Just point out that a firewall (from the English - fire wall), or…

Continue reading →

Destination of proxies and NAT
A proxy server is designed to mediate between a workstation and a worldwide network. The proxy computer passes user requests through itself and then returns the results received from Inetrnet.…

Continue reading →

him frankly idiotic

How to protect your password from hacking

Today, passwords play a significant role in human life. Everywhere on the Internet, on every site, each account must have its own password in order for the user to gain access to its data. Losing or breaking a password can often result in a big problem and headache.

This article will focus on passwords, hacking methods and creating passwords.

How do passwords break?
There are always at least two ways to crack a password. This is a banal selection (which takes a huge amount of resources and time, but with proper luck, or rather, with due naivety of the user, it will not take an hour) and no less banal “attack of pets”.
Password guessing
Recognize after all somewhere, at least once you set the banal and well-known qwerty password. This is certainly good if it is not in your mailbox through which you can crack almost all your existing passwords. Password guessing is a set of random numbers in the password field and it implies the need to know the account itself. On some sites this is obvious, on others it’s hidden. Continue reading

Present day viruses
There are a huge number of computer viruses in the world. To establish their exact number (along with all modifications and upgrades) no one is taken. Instead, it is customary…

...

E-wallet protection
When comparing the degree of protection of client programs of Yandex.Money and Webmoney payment systems, it turned out that the latter offers more reliable means of protecting client data. However,…

...

How to choose an internet provider?
If you are reading this article, then most likely you cannot imagine life without the Internet. Perhaps the Internet is already connected to you, but the quality of the service…

...