Bot has learnd to find and correct build failures on Travis CI

For the first time, bot Repairnator was able to independently create patches to eliminate errors in assemblies arising in the process of continuous…

0 29.10.18 в 15:00 Интересное 1521 Read more

RIP Google+

Google is closing down Google+ over lack of use and security issues…

0 09.10.18 в 09:00 Интересное 2518 Read more

Introduction to the WhonixOS

The operating system Whonix is a system for advanced users and fans of anonymous visits to Web…

Yandex began indexing personal data from Google Docs

Yandex users paid attention to the beginning of the search engine indexing of documents Google Docs, where there was personal information. The problem was quickly resolved, and already at 1 am on Thursday, the information again became inaccessible to ordinary…

0 10.07.18 в 12:35 Интересное 10364 Read more

The new law prohibits the publication of links to sites with restricted access

Vladimir Putin signed a law, which provides for fines for publishing links to sites that are banned in Russia. This information appeared recently on the president's…

0 02.07.18 в 08:27 Интересное 9270 Read more

Microsoft купила GitHub

So, it happened! Rumors, which excited the IT community for several years, became a reality. Microsoft officially confirmed that it acquired GitHub for 7.5 billion dollars. The payment will be made by shares of the company, and the transaction will be closed by the end of 2018. It's good or bad - let's deal with…

0 15.06.18 в 07:36 Интересное 6495 Read more

The struggle of states with crypto-currencies. Main trends

Attack on crypto-currencies from the states. From the ban on anonymity to…

0 04.06.18 в 10:20 Интересное 6813 Read more

GDPR technology - compliance with the anonymity of users

The new Regulation of the GDPR on tougher measures to protect the personal data of users for companies that have residents of EU countries among…

0 30.05.18 в 08:20 other 8807 Read more

Social engineering. Hacking of the human mind

The methods of "classic" hacking change after security systems, but no matter how powerful a system you build, there will always remain a weak link - the human…

0 21.05.18 в 13:31 other 6744 Read more

VPN + Tor technology. Self-tuning and use.

​The most common methods for organizing network anonymity are the Tor browser and the VPN technology. With their help, a real IP address is hidden, Internet censorship is circumvented and international restrictions are…

0 25.04.18 в 15:26 Интересное 7247 Read more

Popular

Together with wide opportunities the Internet carries a number of...

Initially, the World Wide Web was conceived as a space...

In today's world, it becomes more difficult to keep personal...

In the recent past by the standards of the development...

Yandex users paid attention to the beginning of the search...

New

For the first time, bot Repairnator was able to independently...

09
Oct 2018

Google is closing down Google+ over lack of use and...

The operating system Whonix is a system for advanced users...

Yandex users paid attention to the beginning of the search...

Vladimir Putin signed a law, which provides for fines for...

Contact Us
Support
Arthur
Have you got any question?

Click here and we’ll answer