The ideal form of authorization - how to do it is not necessary
Recently, we posted a number of useful tips on creating effective registration forms on the site, and today we want to talk about the authorization / login block. Recently, a…

Continue reading →

Internet Marketing Cost Effectiveness
What are the main steps in the online sale process? Advertising tools attract potential customers to the site. Tools can be different: seo, contextual advertising, display advertising, advertising on social…

Continue reading →

Security in Firefox Browser
When working on the Internet, the highest priority should be to ensure the safety of users. Indeed, in the "global web" there is a huge number of fraudulent sites and…

Continue reading →

will immediately appear

The ideal form of authorization – how to do it is not necessary

Recently, we posted a number of useful tips on creating effective registration forms on the site, and today we want to talk about the authorization / login block. Recently, a lot of annoying and too “abstruse” implementations of it have appeared on the network. It’s good when designers try to make unusual and beautiful forms of login (see our selection), fitting them into the general concept of a web project, but it’s completely different when they go overboard with functionality. Sometimes it comes to the point that popular password managers (in Chrome or from 1Password) simply do not work.

In the article you will see examples of authorization forms with problems in usability. This is good food for thought for web developers who do not really understand how their audience uses the login tool on the site. In the second part of the article, we will show and tell you how to best implement this task and create simple, connected, recognizable elements that are understandable to visitors and work perfectly with different “password remembers”. The text is an adaptation of this note. Continue reading

Child Safety Online
Many users, even the most experienced, sometimes do not suspect that having protected themselves, they forget about their own children. They forget, especially when creating different accounts in the OS…

...

VPN Basic Concepts and Classification
The term VPN (Eng. "Virtual Private Network") refers to a group of technologies that provide a network connection, or the so-called logical network, functioning on top of some other network,…

...

File encryption
Encryption is the most common and essentially the simplest way to protect any information. After all, it seems that it could be simpler to take the text, take some algorithm…

...