VPN Basic Concepts and Classification
The term VPN (Eng. "Virtual Private Network") refers to a group of technologies that provide a network connection, or the so-called logical network, functioning on top of some other network,…

Continue reading →

How to make a color palette for a site and not only
In Design Mania, there have already been several publications with similar topics: in a note about color matching services for websites, in addition to inspiration resources, we examined a couple…

Continue reading →

Connect Xbox 360 via VPN server
Regional content protection checks your account for belonging to a specific country, and checks it against the IP address of your console. If your account is American, and the IP…

Continue reading →

will immediately appear

The ideal form of authorization – how to do it is not necessary

Recently, we posted a number of useful tips on creating effective registration forms on the site, and today we want to talk about the authorization / login block. Recently, a lot of annoying and too “abstruse” implementations of it have appeared on the network. It’s good when designers try to make unusual and beautiful forms of login (see our selection), fitting them into the general concept of a web project, but it’s completely different when they go overboard with functionality. Sometimes it comes to the point that popular password managers (in Chrome or from 1Password) simply do not work.

In the article you will see examples of authorization forms with problems in usability. This is good food for thought for web developers who do not really understand how their audience uses the login tool on the site. In the second part of the article, we will show and tell you how to best implement this task and create simple, connected, recognizable elements that are understandable to visitors and work perfectly with different “password remembers”. The text is an adaptation of this note. Continue reading

VPN Basic Concepts and Classification
The term VPN (Eng. "Virtual Private Network") refers to a group of technologies that provide a network connection, or the so-called logical network, functioning on top of some other network,…

...

Present day viruses
There are a huge number of computer viruses in the world. To establish their exact number (along with all modifications and upgrades) no one is taken. Instead, it is customary…

...

PPTP VPN
This protocol allows you to implement a secure point-to-point connection by creating a tunnel in an insecure network. The work of PPTP is to implement PPP frames in IP packets…

...

How is the editor different from a beta reader, and vice versa
Each writer is waiting for feedback on his works. And it’s wonderful if the responses appear. And if not? If the readers either weren’t found, or they were silent, but…

...