Creating an Effective Hero Image Image for a Website
Does the user only need 50 milliseconds to form an opinion on any site? Web developers and designers really have very little time to make a good impression on a…

Continue reading →

How is the editor different from a beta reader, and vice versa
Each writer is waiting for feedback on his works. And it’s wonderful if the responses appear. And if not? If the readers either weren’t found, or they were silent, but…

Continue reading →

The ideal form of authorization - how to do it is not necessary
Recently, we posted a number of useful tips on creating effective registration forms on the site, and today we want to talk about the authorization / login block. Recently, a…

Continue reading →

browsing the website

1 2 3 9

All the information about you is … on the Internet

The fact that computers have long and reliably entered the lives of almost every person no longer surprises anyone. This “iron” makes us capable of many things: it allows us to expand our horizons, improve our skills, and receive various kinds of information without much effort.

But the more we use a computer, the more acute the problem of computer security becomes. Indeed, a computer that is not connected to the network itself can hardly be at risk of data hacking or virus infection. Is it that an inept user will forget to check for a “contagion” flash drive or other removable storage medium. That is, the main threat to computer security outside the network is viruses of all types and stripes.

Your “footprints” on the net
But with the first Internet connection, there are many more threats than ordinary viruses. You think that registration on all kinds of sites is a waste of time and does not threaten anything, that your surfing on various web resources cannot be tracked, and no one knows which pages you regularly visit. However, each registration on the forum, in chat or in the “contact”, the entrance to the online store or viewing blogs leaves its “mark” in the network space. Continue reading

If you blocked the site at work

So a person is arranged that the productivity of his activity is directly related to how often he rests, how much time he devotes to relaxation.

Any office employee during the working day gets tired more morally than physically, because conflict situations, decision making, creative manifestations and even just continuous monotonous work, you see, are unlikely to have a positive impact on labor efficiency. We all like these or those sites where we strive to look at a free time, someone prefers forums, and someone likes to chat in a chat.

All this applies to stress relievers, relaxation, stress relievers, helps to be distracted for a short time, so that we can take on the tasks and goals set by the company with renewed vigor. And, of course, all of the above applies to those cases when this is not to the detriment of the work itself. But we are increasingly faced with misunderstanding and prohibitions from our employers, which is confirmed by the emerging boom of blocking social networks for access from the workplace, in particular the most popular, such as Odnoklassniki and Vkontakte. Continue reading

Child Safety Online

Many users, even the most experienced, sometimes do not suspect that having protected themselves, they forget about their own children. They forget, especially when creating different accounts in the OS for themselves and for the child, that children require attention even at the computer and they still cannot and do not want to take care of their own protection. And this task is being placed on our shoulders.

Immediately determine what threats the Internet poses for a child. They can be divided into two categories: threats associated with games and threats associated with paging. With the second, everything is clear, advertisements and pornography, pop-ups and the calculation of children’s naivety. Games carry risks of a different kind – abnormal social adaptation and the study of indecent words, and not only that.

As a matter of fact, further we will consider not only threats, but also ways to protect our children from them. Continue reading

1 2 3 9
File encryption
Encryption is the most common and essentially the simplest way to protect any information. After all, it seems that it could be simpler to take the text, take some algorithm…

...

Top Web Design Articles, Downloads, and Inspiration
We continue the annual tradition and publish the most interesting notes for the "last season". Earlier in Design Mania, you could already see a similar article for 2017 and a…

...

IP address in plain language
Currently, more and more computer owners in the world are becoming users of local networks or the World Wide Web. At the same time, each PC is assigned its own…

...

How to make a color palette for a site and not only
In Design Mania, there have already been several publications with similar topics: in a note about color matching services for websites, in addition to inspiration resources, we examined a couple…

...