Mailto - HTML
In order to somehow dilute the design theme, let's look at another layout lesson today - a lot of time has passed since the previous post about CSS hover effects.…

Continue reading →

Mailto - HTML
In order to somehow dilute the design theme, let's look at another layout lesson today - a lot of time has passed since the previous post about CSS hover effects.…

Continue reading →

Interesting features of UI design in different countries
When you create an interface design for applications / sites operating in different countries, you should take into account the peculiarities of national cultures and traditions of the corresponding target…

Continue reading →

All the information about you is … on the Internet

The fact that computers have long and reliably entered the lives of almost every person no longer surprises anyone. This “iron” makes us capable of many things: it allows us to expand our horizons, improve our skills, and receive various kinds of information without much effort.

But the more we use a computer, the more acute the problem of computer security becomes. Indeed, a computer that is not connected to the network itself can hardly be at risk of data hacking or virus infection. Is it that an inept user will forget to check for a “contagion” flash drive or other removable storage medium. That is, the main threat to computer security outside the network is viruses of all types and stripes.

Your “footprints” on the net
But with the first Internet connection, there are many more threats than ordinary viruses. You think that registration on all kinds of sites is a waste of time and does not threaten anything, that your surfing on various web resources cannot be tracked, and no one knows which pages you regularly visit. However, each registration on the forum, in chat or in the “contact”, the entrance to the online store or viewing blogs leaves its “mark” in the network space.

The browser of any user “cordially” informs you, upon request, of your IP address, type of operating system, provider and location of the user, and Cookies, Java and Javascript on any site will collect the information that the browser has not yet “reported”. Of course, if you are not an agent of special services located on a secret mission in another country, then the probability of breaking into your personal data is not so great. But during any at least minimally serious activity, the best solution is to protect yourself from unauthorized collection of information about you.

How to avoid unauthorized collection of information?
To do this, you can use special anonymizers or VPNs (virtual private networks), which either completely encrypt or confuse people who want to receive information about you. For example, going to your own vKontakte page through an anonymizer site, it is convenient to bypass local network bans, since the user will receive data not from the name of the “contact”, but from the anonymizer server. But this approach is good if you just want to get around the ban, and not increase the confidentiality of using the network. After all, such a site becomes an additional means of storing “compromising material”.

To ensure the confidentiality of surfing the network or to protect corporate data from viruses and competitors, VPN connections are more suitable, which, using special software, connect to the network and create a separate encrypted channel. Through this channel, even the provider will be unable to find out what resources you visited on the Internet, what you downloaded. In addition, some private networks provide compression of traffic and thereby reduce Internet costs. Thus, in secret, you can keep everything that you do not want to disclose to anyone.

How is the editor different from a beta reader, and vice versa
Each writer is waiting for feedback on his works. And it’s wonderful if the responses appear. And if not? If the readers either weren’t found, or they were silent, but…

...

Effective B2B website designs for 2019
If you are producing a product / service that is in demand in a particular field and trying to create a suitable website that fully reflects your attitude to work,…

...

File encryption
Encryption is the most common and essentially the simplest way to protect any information. After all, it seems that it could be simpler to take the text, take some algorithm…

...

Present day viruses
There are a huge number of computer viruses in the world. To establish their exact number (along with all modifications and upgrades) no one is taken. Instead, it is customary…

...