Destination of proxies and NAT
A proxy server is designed to mediate between a workstation and a worldwide network. The proxy computer passes user requests through itself and then returns the results received from Inetrnet.…

Continue reading →

Personal Data Security
What is personal information and why does the state develop entire laws designed to protect such data? Imagine that you are making an order online. In the process of forming…

Continue reading →

Personal Data Security
What is personal information and why does the state develop entire laws designed to protect such data? Imagine that you are making an order online. In the process of forming…

Continue reading →

disconnect from

Destination of proxies and NAT

A proxy server is designed to mediate between a workstation and a worldwide network.

The proxy computer passes user requests through itself and then returns the results received from Inetrnet. This is a kind of “trustee”, contributing to the simultaneous access of all machines on the local network to the Internet. At the same time, the administrator setting up the grid is relieved of the need to assign a separate IP address to each individual point, build a complex routing scheme, and contact the provider for an additional (usually paid) service. Continue reading

How Instagram Algorithm Actually Works

The happy times of the chronological tape, which everyone loved so much, Instagram representatives sent to the past because of two simple facts:

– 70% of the content from the profiles that the user subscribed to, he simply skipped due to the fact that there were too many posts.

– The user also missed 50% of posts from friends, due to a previous reason.

Therefore, an algorithm appeared that began to decide for us what is interesting, what is relevant and what should be in our feeds. I’m really happy.

But thanks to the implementation of the algorithm, users now see 90% of posts from his friends and Continue reading

Video content: how to produce and when it is time to refuse

Over the past few years, research has regularly been published on what the future of video content is. For example, the American company Orchestrate predicts that in 2016, 1.5 billion people will be consumers of video content. However, most of the works do not specify what kind of video in question. Online cinemas is one story, ugc video about cats is another, training videos are third.
Should the editors spend money on producing their own video? Stories when a video shoots and “explodes the Internet” provoke online media to produce their own video. But the truth is that not all video content is equally promising.
We tell about the experience of “Lady Mail.Ru”: what it is like to create our own videos, what difficulties Continue reading

Dashboard for SEO Specialist
Each specialist in website promotion works with a set of tools, services and reports that are used daily. Viewing data is time-consuming, therefore it is useful to have a summary…

...

File encryption
Encryption is the most common and essentially the simplest way to protect any information. After all, it seems that it could be simpler to take the text, take some algorithm…

...

How do companies launch a blog and why
Today we’ll talk about the corporate blog and its role in the brand promotion strategy. This article we want to help companies that plan to develop content marketing, but do…

...

Overview of modern antiviruses
Of all the threats to the security of user information, viruses stand apart. These small malicious programs, if not handled carefully, can steal or destroy any data. But it turns…

...