Microsoft купила GitHub

So, it happened! Rumors, which excited the IT community for several years, became a reality. Microsoft officially confirmed that it acquired GitHub for 7.5 billion dollars. The payment will be made by shares of the company, and the transaction will be closed by the end of 2018. It's good or bad - let's deal with…

0 15.06.18 в 07:36 Интересное 471 Read more

The struggle of states with crypto-currencies. Main trends

Attack on crypto-currencies from the states. From the ban on anonymity to…

0 04.06.18 в 10:20 Интересное 990 Read more

GDPR technology - compliance with the anonymity of users

The new Regulation of the GDPR on tougher measures to protect the personal data of users for companies that have residents of EU countries among…

0 30.05.18 в 08:20 other 951 Read more

Social engineering. Hacking of the human mind

The methods of "classic" hacking change after security systems, but no matter how powerful a system you build, there will always remain a weak link - the human…

0 21.05.18 в 13:31 other 1033 Read more

VPN + Tor technology. Self-tuning and use.

​The most common methods for organizing network anonymity are the Tor browser and the VPN technology. With their help, a real IP address is hidden, Internet censorship is circumvented and international restrictions are…

0 25.04.18 в 15:26 Интересное 918 Read more

Introducing twitch.tv and the features of TwitchViewers

You probably know the video-tuning service Twitch.tv specializing mainly on the subject of computer games and e-sports tournaments. Twitch's audience has grown continuously throughout its existence and already counts tens of millions of unique visitors a month. Today, more than two million streamers from around the world choose this service daily for their broadcasts in a wide variety of…

Extradition to the United States for violations in the field of information technology

Thousands of cybercrimes are committed daily in the world, large amounts of money are being stolen from electronic bank accounts, secret data, some of which are then publicly published. Every year the damage from such violations becomes more serious. According to analysts' forecasts, by 2019 in the world economy the damage from cybercrime can reach 2 trillion…

0 20.04.18 в 11:48 Интересное 822 Read more

Description of features and use of VPN

Good afternoon! Now we are talking about such an important topic in our time, as an opportunity to bypass the blocking of sites. The problem is very relevant in our…

0 20.02.18 в 16:20 other 3335 Read more

Referral system by example RSocks

There are many types of advertising promotion of their services. Conventional TV advertising, on the pages of newspapers, on the radio, on banners of cities and suburbs, but in our age of IT-development the most popular and effective are referral systems and partner…

0 07.02.18 в 13:21 other 2573 Read more

Editor of articles VK. What is it and how to use it?

Recently, VKontakte, the most popular social network in Russia, has made editor of articles openly available. This is an interface that provides the ability to create articles for editors of "VC" groups and ordinary users. Outwardly, it is very similar to the editors of Facebook and Telegram. However, let's take a closer look at what's…

0 01.02.18 в 11:54 other 2642 Read more

Popular

Together with wide opportunities the Internet carries a number of...

Initially, the World Wide Web was conceived as a space...

In today's world, it becomes more difficult to keep personal...

In the recent past by the standards of the development...

Good afternoon! Now we are talking about such an important...

New

So, it happened! Rumors, which excited the IT community for...

Attack on crypto-currencies from the states. From the ban on...

The new Regulation of the GDPR on tougher measures to...

The methods of "classic" hacking change after security systems, but...

​The most common methods for organizing network anonymity are the...

Contact Us
Have you got any question?

Click here and we’ll answer