All the information about you is ... on the Internet
The fact that computers have long and reliably entered the lives of almost every person…

Continue reading →

Present day viruses
There are a huge number of computer viruses in the world. To establish their exact…

Continue reading →

VPN Basic Concepts and Classification
The term VPN (Eng. "Virtual Private Network") refers to a group of technologies that provide…

Continue reading →

Monthly Archives: October 2019

1 5 6 7 8 9 17

Overview of modern antiviruses

Of all the threats to the security of user information, viruses stand apart. These small malicious programs, if not handled carefully, can steal or destroy any data. But it turns out to be easiest to defend against them. The Internet is teeming with dozens of different antivirus programs that offer us a quick and easy solution to the problem. But how good are these programs? How to make a specific choice?

Laboratory Research – Clean Water Cheating
Very often you can find on the Internet studies of various laboratories or some scientists there, which talk about the advantages of various antiviruses over others. Do not pay attention to this bluff, all antiviruses have disadvantages and advantages, and there is no better. In addition, often these laboratories are subsidiary laboratories that develop certain antivirus programs. You yourself can guess how objective their judgments are.
No matter what. Continue reading

File encryption

Encryption is the most common and essentially the simplest way to protect any information. After all, it seems that it could be simpler to take the text, take some algorithm known to you and your friends and use the algorithm to make gibberish from the text that no one else can parse from you and your friends. Simple and pretty angry. To date, the solution remains the most reasonable.

However, many may argue, “then what is the effectiveness and complexity of encryption?” But it is in the selection of the algorithm. At the moment, there are a huge number of encryption systems and ciphers. And each of them is unusually effective and complex to a certain extent. However, they are all classified into two main categories: symmetric and asymmetric ciphers. Further we will focus on them. And already examining an example, we will show what data encryption is. Continue reading

How is the editor different from a beta reader, and vice versa

Each writer is waiting for feedback on his works. And it’s wonderful if the responses appear. And if not?

If the readers either weren’t found, or they were silent, but would you like to know if the book is good and how good it is? Then there is only one way – to give up to the beta reader or editor. It is these personalities that can give a detailed, thoughtful and reasoned response to your novel or story, fairy tale or collection of poems.

But how to decide who exactly to go to? In general, is there any difference who to choose? The question, as practice has shown, is relevant: in letters I was repeatedly asked how the literary editor, beta reader and beta tester differ from each other.

Let’s get it right.

Differences between Editor and Beta Reader Continue reading

1 5 6 7 8 9 17
Improving the registration form on the site
On the Internet, the registration procedure is found to us as often as the form…

...

E-wallet protection
When comparing the degree of protection of client programs of Yandex.Money and Webmoney payment systems,…

...

Website promotion: how to get real results
After the work on SEO-optimization, the sales department was “cut off” by inappropriate calls. The…

...