There is never much disk space. Probably, everyone was faced with the choice of what to remove and free valuable megabytes for new photos or music. And the constant recording of films on DVD to watch them on the big screen, conveniently lounging on the couch with the second half? Or the virus hit the system and you with fear and hope that everything will be able to be restored, looked at the specialist reviving the dead system. There are many situations when you want to combine all the equipment in the house into a single “organism”, increase comfort and feel safe. And a simple home network in such a situation is only part of the solution. You need a reliable storage place, available for any equipment in the house. Continue reading
To begin with, let’s determine that by this article I do not in any way urge anyone to hack someone’s Internet resources using the methods described below.
The main goal of the article is to demonstrate to the user the importance of the topic of data protection on the Internet using an example of a site that is not properly protected. Perhaps, the most common method of hacking a site will be used as a method of attacking a site – SQL injection.
To begin with, we will determine that all, without exception, modern, voluminous, complex sites are built Continue reading
If you can not stand the tedious shopping rush, are limited in mobility (for example, are on maternity leave) or live in remote regions with a meager assortment of local shops, then this type of shopping is for you.
Modern technology allows you to make purchases without leaving your home. It is enough to have access to the Internet, or to know the phone number of the delivery service. But today it will be about the Internet. I’ll tell you about my own online shopping experience. Continue reading