Destination of proxies and NAT
A proxy server is designed to mediate between a workstation and a worldwide network. The proxy computer passes user requests through itself and then returns the results received from Inetrnet.…

Continue reading →

How to sell the context: without a budget, more expensive than the market and on its own terms
How we started: don't know the rules - play your own way Before I started doing agent business, I worked in an in-house. I did not like sales managers, I…

Continue reading →

What is a firewall and why is it needed?
We will not go into little things like translating words, occupying them some part of the article. Just point out that a firewall (from the English - fire wall), or…

Continue reading →

main points

Destination of proxies and NAT

A proxy server is designed to mediate between a workstation and a worldwide network.

The proxy computer passes user requests through itself and then returns the results received from Inetrnet. This is a kind of “trustee”, contributing to the simultaneous access of all machines on the local network to the Internet. At the same time, the administrator setting up the grid is relieved of the need to assign a separate IP address to each individual point, build a complex routing scheme, and contact the provider for an additional (usually paid) service. Continue reading

Child Safety Online

Many users, even the most experienced, sometimes do not suspect that having protected themselves, they forget about their own children. They forget, especially when creating different accounts in the OS for themselves and for the child, that children require attention even at the computer and they still cannot and do not want to take care of their own protection. And this task is being placed on our shoulders.

Immediately determine what threats the Internet poses for a child. They can be divided into two categories: threats associated with games and threats associated with paging. With the second, everything is clear, advertisements and pornography, pop-ups and the calculation of children’s naivety. Games carry risks of a different kind – abnormal social adaptation and the study of indecent words, and not only that. Continue reading

How Instagram Algorithm Actually Works

The happy times of the chronological tape, which everyone loved so much, Instagram representatives sent to the past because of two simple facts:

– 70% of the content from the profiles that the user subscribed to, he simply skipped due to the fact that there were too many posts.

– The user also missed 50% of posts from friends, due to a previous reason.

Therefore, an algorithm appeared that began to decide for us what is interesting, what is relevant and what should be in our feeds. I’m really happy.

But thanks to the implementation of the algorithm, users now see 90% of posts from his friends and Continue reading

How to bring a new product to the market: contextual advertising opportunities for generating demand
How to sell goods or services that consumers are not yet aware of? Bringing a new product or service to the market is always accompanied by significant risks, among which…

...

5 trends Email-marketing
In anticipation of the year of the fiery monkey, it's time to knock out some results, as well as outline trends. As promised at the end of the last publication,…

...

Early Testing: Problems and Solutions
Early testing removes the problems of accumulating risks and the consequent waste of time and money on fixing errors. If it comes to developing an online store (or any other…

...

E-Wallet Protection
When comparing the degree of protection of client programs of Yandex.Money and Webmoney payment systems, it turned out that the latter offers more reliable means of protecting client data. However,…

...