GDPR technology - compliance with the anonymity of users

The new Regulation of the GDPR on tougher measures to protect the personal data of users for companies that have residents of EU countries among…

0 30.05.18 в 08:20 other 959 Read more

Social engineering. Hacking of the human mind

The methods of "classic" hacking change after security systems, but no matter how powerful a system you build, there will always remain a weak link - the human…

0 21.05.18 в 13:31 other 1039 Read more

Description of features and use of VPN

Good afternoon! Now we are talking about such an important topic in our time, as an opportunity to bypass the blocking of sites. The problem is very relevant in our…

0 20.02.18 в 16:20 other 3344 Read more

Referral system by example RSocks

There are many types of advertising promotion of their services. Conventional TV advertising, on the pages of newspapers, on the radio, on banners of cities and suburbs, but in our age of IT-development the most popular and effective are referral systems and partner…

0 07.02.18 в 13:21 other 2582 Read more

Editor of articles VK. What is it and how to use it?

Recently, VKontakte, the most popular social network in Russia, has made editor of articles openly available. This is an interface that provides the ability to create articles for editors of "VC" groups and ordinary users. Outwardly, it is very similar to the editors of Facebook and Telegram. However, let's take a closer look at what's…

0 01.02.18 в 11:54 other 2654 Read more

Artificial Intelligence DQN and WCS.

In the recent past by the standards of the development of information technologies, in 2015 Google created artificial intelligence based on neural networks, which was able to analyze the condition around itself and draw conclusions about its further education. The name of the new offspring from Google was given in abbreviated from the term "deep Q-network" - DQN. The DQN started training in common arcade games (Pakman, Tennis, Space Invaiders, Boksing and other classics).…

0 25.01.18 в 09:54 other 4826 Read more

Fundamentals of Information Security

In today's world, it becomes more difficult to keep personal and corporate data in secret, so the issue of information security is becoming more acute every day.…

0 25.12.17 в 09:16 other 5204 Read more

OpenVPN technology: how to hide traffic

Together with wide opportunities the Internet carries a number of dangers. First of all, when it comes to anonymity and security.…

0 01.11.17 в 17:05 other 6678 Read more

The Internet without censorship

Initially, the World Wide Web was conceived as a space without borders, where you can get absolutely any information on an anonymous basis.…

0 30.08.17 в 17:19 other 6463 Read more

Popular

Together with wide opportunities the Internet carries a number of...

Initially, the World Wide Web was conceived as a space...

In today's world, it becomes more difficult to keep personal...

In the recent past by the standards of the development...

Good afternoon! Now we are talking about such an important...

New

So, it happened! Rumors, which excited the IT community for...

Attack on crypto-currencies from the states. From the ban on...

The new Regulation of the GDPR on tougher measures to...

The methods of "classic" hacking change after security systems, but...

​The most common methods for organizing network anonymity are the...

Contact Us
Have you got any question?

Click here and we’ll answer