How to write without inspiration and ideas? 6 Tips for Keeping Your Personal or Corporate Blogging
Have you ever done this when you need to publish something fresh, but you don’t have any ideas for articles or the desire to knock on your keyboard? Usually at…

Continue reading →

Internet Handwriting: 7 Tips For Those Who Want To Be “Their Own” Online
On the Internet, you can be anyone and anytime. You can like cats (or even be them), listen to birdsong or look for someone who is wrong. But no matter…

Continue reading →

How to sell the context: without a budget, more expensive than the market and on its own terms
How we started: don't know the rules - play your own way Before I started doing agent business, I worked in an in-house. I did not like sales managers, I…

Continue reading →

solid commercial

Personal Data Security

What is personal information and why does the state develop entire laws designed to protect such data? Imagine that you are making an order online. In the process of forming the order, you specify such data as contact phone number and address.

It would seem that nothing bad happened, the order was delivered on time and you were satisfied. However, after some time, you begin to receive a lot of advertising letters to your address, strangers call you on your home phone and, calling you by name, offer your services. In addition, you may encounter theft of plastic card data when working with online banking. Continue reading

File encryption

Encryption is the most common and essentially the simplest way to protect any information. After all, it seems that it could be simpler to take the text, take some algorithm known to you and your friends and using the algorithm to make gibberish from the text that no one except you and your friends will parse. Simple and pretty angry. To date, the solution remains the most reasonable.

However, many may argue, “then what is the effectiveness and complexity of encryption?” But it is in the selection of the algorithm. At the moment, there are a huge number of encryption systems and ciphers. And each of them is unusually effective and complex to a certain extent. However, they are all classified into two main categories: symmetric and asymmetric ciphers. Further we will focus on them. And already examining an example, we will show what data encryption is.

Symmetric Ciphers Continue reading

What is a firewall and why is it needed?

We will not go into little things like translating words, occupying them some part of the article. Just point out that a firewall (from the English – fire wall), or as it is also called brandmauer (with German – fire wall) in Russian has two names that display its purpose (inter) firewall. This is a screen that protects the user from influences coming from outside. When connecting to the Internet, having a firewall is not a luxury, and indeed such a risk is hardly justified, it will most likely lead to raking up a bunch of viruses, or even just to reinstall the system. Continue reading

7 Tips for Creating GIFs
At InVision, GIF animations are used not only for pampering - they play an important role in terms of marketing and training. Therefore, we even tried to use them on…

...

How to make TK on content and not screw it up
TK is always a sore subject, no matter what area we talk about. Based on my personal experience, I can note that 90% of clients from small and medium-sized businesses…

...

Instagram Stories for Business analytics
In two years, I created and tested dozens, if not more, of various content ideas on Instagram Stories on my projects. I know for sure that one cannot expect any…

...

Destination of proxies and NAT
A proxy server is designed to mediate between a workstation and a worldwide network. The proxy computer passes user requests through itself and then returns the results received from Inetrnet.…

...