announcements and reviews
When working on the Internet, the highest priority should be to ensure the safety of users. Indeed, in the “global web” there is a huge number of fraudulent sites and simply dishonest personalities. To protect their users, Mozilla developers put a huge amount of effort. They came out and went out well, but they did the most important thing – they gave a start to their users. Simple and intuitive add-ons (plug-in) began to appear quite quickly. It is about such plugins that will be discussed in this article.
Written both by craftsmen and professional programmers, these plugins perform one, but very important function – to warn the user about the danger that awaits him. They work quite simply, in fact in two stages. The first step is to track complaints or recommendations of a particular site and by comparing their number we get a positive or negative reaction to the site. Some programs simply suggest that the site is dangerous, others allow you to see why, but they are based on the same algorithm – collecting and displaying information. Continue reading
Encryption is the most common and essentially the simplest way to protect any information. After all, it seems that it could be simpler to take the text, take some algorithm known to you and your friends and use the algorithm to make gibberish from the text that no one else can parse from you and your friends. Simple and pretty angry. To date, the solution remains the most reasonable.
However, many may argue, “then what is the effectiveness and complexity of encryption?” But it is in the selection of the algorithm. At the moment, there are a huge number of encryption systems and ciphers. And each of them is unusually effective and complex to a certain extent. However, they are all classified into two main categories: symmetric and asymmetric ciphers. Further we will focus on them. And already examining an example, we will show what data encryption is. Continue reading
Each writer is waiting for feedback on his works. And it’s wonderful if the responses appear. And if not?
If the readers either weren’t found, or they were silent, but would you like to know if the book is good and how good it is? Then there is only one way – to give up to the beta reader or editor. It is these personalities that can give a detailed, thoughtful and reasoned response to your novel or story, fairy tale or collection of poems.
But how to decide who exactly to go to? In general, is there any difference who to choose? The question, as practice has shown, is relevant: in letters I was repeatedly asked how the literary editor, beta reader and beta tester differ from each other.
Let’s get it right.
Differences between Editor and Beta Reader Continue reading