What is a firewall and why is it needed?
We will not go into little things like translating words, occupying them some part of…

Continue reading →

How to attract customers? 5 effective online advertising tools.
“Where to buy the goods?”, “Who should I order the service from?”, “Which company should…

Continue reading →

The allowable marginal cost of the targeted action of the visitor on the site.
Website performance is measured not by the site’s position in the TOP, and not by…

Continue reading →

allows using a visually

Child Safety Online

Many users, even the most experienced, sometimes do not suspect that having protected themselves, they forget about their own children. They forget, especially when creating different accounts in the OS for themselves and for the child, that children require attention even at the computer and they still cannot and do not want to take care of their own protection. And this task is being placed on our shoulders.

Immediately determine what threats the Internet poses for a child. They can be divided into two categories: threats associated with games and threats associated with paging. With the second, everything is clear, advertisements and pornography, pop-ups and the calculation of children’s naivety. Games carry risks of a different kind – abnormal social adaptation and the study of indecent words, and not only that.

As a matter of fact, further we will consider not only threats, but also ways to protect our children from them. Continue reading

Present day viruses

There are a huge number of computer viruses in the world. To establish their exact number (along with all modifications and upgrades) no one is taken. Instead, it is customary to calculate the loss or intensity of a virus attack. But, neither one nor the other allows users to understand what, exactly, how and why it gets to their computer?

Reasons for creating viruses
There are no reasons for the appearance of viruses as such. These are the reasons for human stupidity. We simply have the actual value – a huge number of computer viruses and virus programs that inhabit the Internet along with sites. It’s true that it’s worth highlighting several reasons, it’s still worth it, they are especially clear to any person.
Childishness
Banal reason. Someone wanted to try “what happens if?” True, almost no one is now engaged in viral childishness. However, it is impossible not to mention it. Indeed, this is how the first virus arose. Continue reading

PPTP VPN

This protocol allows you to implement a secure point-to-point connection by creating a tunnel in an insecure network.

The work of PPTP is to implement PPP frames in IP packets for transferring them to any IP network, including the Internet. In addition, this technology can be used to create a tunnel between local networks.

A TCP connection is used to service the created PPTP tunnel.

Brief specification
The protocol specification was published in 1999 in RFC2637, but the IETF community has not ratified it.
Less secure than IPSec, PPTP establishes a PPP session using the GRE protocol. The 1723 TCP port is used to control and initiate the GRE connection. Redirecting PPTP to the firewall is difficult because the protocol requires two sessions to be established simultaneously. Continue reading

5 examples of designer pain: the most common phrases coming from customers and clients
No matter how many years have passed, and TK for the designer always remains a…

...

E-wallet protection
When comparing the degree of protection of client programs of Yandex.Money and Webmoney payment systems,…

...

How the media have changed Mankind, and Manchestovo has changed the media over the past couple of thousand years
Today, mass communication is the most important form of information exchange. Newspapers, radio, television and,…

...