Landing Myths
Creating a high conversion landing page is a whole deal, right? And to want the landing page to look beautiful and cling to visitors is an understandable desire. But you…

Continue reading →

Top Web Design Articles, Downloads, and Inspiration
We continue the annual tradition and publish the most interesting notes for the "last season". Earlier in Design Mania, you could already see a similar article for 2017 and a…

Continue reading →

Interesting features of UI design in different countries
When you create an interface design for applications / sites operating in different countries, you should take into account the peculiarities of national cultures and traditions of the corresponding target…

Continue reading →

allows using a visually

1 2 3 10

IP address in plain language

Currently, more and more computer owners in the world are becoming users of local networks or the World Wide Web. At the same time, each PC is assigned its own name, the so-called IP address (formed from the English Internet Protocol Address).

An IP address is a number of four numbers separated by dots from 0 to 255, for example 172.148.0.1. It should be said that it is not the computer that receives the IP address, but its network card or modem.

So why do we need an IP address?
In fact, there is nothing complicated. People, for comfortable communication among themselves, use names, for search – addresses, phone numbers, etc. A similar situation occurs on the Internet. The World Wide Web is needed to receive information that is sent from the server to the user on the computer. This is where the IP address is needed, since it is a determinant for “communication” between computers.
Using IP, the host computer, the so-called server, will know where to download the information requested by the user. Also by IP, you can determine the location of the geographic location of the computer. This is due to getting an address on the Internet. Continue reading

Local Area Networks and the Internet

When a local area network is connected to the global Internet, one of the PCs, called a server, becomes a kind of conductor and connects to the Internet using a modem or in some other way, while other computers operate through it, they are also called workstations. Just like any of us has a mailing address where we receive mail letters, each computer is assigned an IP address for functioning in the Internet environment, but usually it has only a computer conductor directly connected to the Internet.

If the computer is connected through a modem, it usually receives a dynamic address from the service provider. It is assigned automatically and is valid for a specific time. While there is also a static address, a permanent address for an unlimited period of use. At least two network devices are usually connected to the gateway computer (server): a modem and a network card, so it actually has two IP addresses, real and internal, which the network card receives on the local network. Continue reading

All the information about you is … on the Internet

The fact that computers have long and reliably entered the lives of almost every person no longer surprises anyone. This “iron” makes us capable of many things: it allows us to expand our horizons, improve our skills, and receive various kinds of information without much effort.

But the more we use a computer, the more acute the problem of computer security becomes. Indeed, a computer that is not connected to the network itself can hardly be at risk of data hacking or virus infection. Is it that an inept user will forget to check for a “contagion” flash drive or other removable storage medium. That is, the main threat to computer security outside the network is viruses of all types and stripes.

Your “footprints” on the net
But with the first Internet connection, there are many more threats than ordinary viruses. You think that registration on all kinds of sites is a waste of time and does not threaten anything, that your surfing on various web resources cannot be tracked, and no one knows which pages you regularly visit. However, each registration on the forum, in chat or in the “contact”, the entrance to the online store or viewing blogs leaves its “mark” in the network space. Continue reading

1 2 3 10
Effective B2B website designs for 2019
If you are producing a product / service that is in demand in a particular field and trying to create a suitable website that fully reflects your attitude to work,…

...

How to attract customers? 5 effective online advertising tools.
“Where to buy the goods?”, “Who should I order the service from?”, “Which company should I contact?” Your potential customers can find many answers to these questions, and there should…

...

E-wallet protection
When comparing the degree of protection of client programs of Yandex.Money and Webmoney payment systems, it turned out that the latter offers more reliable means of protecting client data. However,…

...

Self-creating a graphic logo - step by step instructions
In this informative post, I would like to consider all aspects of creating a company logo - the most important element of a modern identity / brand. The lesson will…

...