GDPR technology - compliance with the anonymity of users

The new Regulation of the GDPR on tougher measures to protect the personal data of users for companies that have residents of EU countries among…

0 30.05.18 в 08:20 other 9130 Read more

Social engineering. Hacking of the human mind

The methods of "classic" hacking change after security systems, but no matter how powerful a system you build, there will always remain a weak link - the human…

0 21.05.18 в 13:31 other 7005 Read more

Description of features and use of VPN

Good afternoon! Now we are talking about such an important topic in our time, as an opportunity to bypass the blocking of sites. The problem is very relevant in our…

0 20.02.18 в 16:20 other 10589 Read more

Referral system by example RSocks

There are many types of advertising promotion of their services. Conventional TV advertising, on the pages of newspapers, on the radio, on banners of cities and suburbs, but in our age of IT-development the most popular and effective are referral systems and partner…

0 07.02.18 в 13:21 other 9142 Read more

Editor of articles VK. What is it and how to use it?

Recently, VKontakte, the most popular social network in Russia, has made editor of articles openly available. This is an interface that provides the ability to create articles for editors of "VC" groups and ordinary users. Outwardly, it is very similar to the editors of Facebook and Telegram. However, let's take a closer look at what's…

0 01.02.18 в 11:54 other 8843 Read more

Artificial Intelligence DQN and WCS.

In the recent past by the standards of the development of information technologies, in 2015 Google created artificial intelligence based on neural networks, which was able to analyze the condition around itself and draw conclusions about its further education. The name of the new offspring from Google was given in abbreviated from the term "deep Q-network" - DQN. The DQN started training in common arcade games (Pakman, Tennis, Space Invaiders, Boksing and other classics).…

0 25.01.18 в 09:54 other 14010 Read more

Fundamentals of Information Security

In today's world, it becomes more difficult to keep personal and corporate data in secret, so the issue of information security is becoming more acute every day.…

0 25.12.17 в 09:16 other 15394 Read more

OpenVPN technology: how to hide traffic

Together with wide opportunities the Internet carries a number of dangers. First of all, when it comes to anonymity and security.…

0 01.11.17 в 17:05 other 26622 Read more

The Internet without censorship

Initially, the World Wide Web was conceived as a space without borders, where you can get absolutely any information on an anonymous basis.…

0 30.08.17 в 17:19 other 20526 Read more

Popular

Together with wide opportunities the Internet carries a number of...

Initially, the World Wide Web was conceived as a space...

In today's world, it becomes more difficult to keep personal...

In the recent past by the standards of the development...

Good afternoon! Now we are talking about such an important...

New

Сustomers can receive a discount of up to 40% on...

We collect free resources for anyone considering the use of...

For the first time, bot Repairnator was able to independently...

09
Oct 2018

Google is closing down Google+ over lack of use and...

The operating system Whonix is a system for advanced users...

Contact Us
Support
Vadim
Have you got any question?

Click here and we’ll answer