How to create a .htaccess file
If you have your own website, sooner or later you will have to face the creation of the .htaccess file. There are many descriptions of this file, various functions, and…

Continue reading →

What is a CMS?
With this magical combination of letters, Internet users have to deal with more and more. So what does this spell mean, and in what area of ​​the Internet is it…

Continue reading →

Social networks - a phenomenon or the collapse of real life?
The dependence of a person on a computer is very high. Today it’s difficult to live without him if you are in a frantic pace of life. Work, entertainment -…

Continue reading →

they are deleting

What topic to choose for a blog? Just not about the blog!

I wonder how many sites in RuNet about sites and blogs about blogs? Of course, no one specifically calculated them, but – a lot! There are very famous among them, there are less popular ones, and the vast majority are those that no one knows. Except, of course, the author himself and his friends.

And still the people with tenacity worthy of the best application, hammer and hammer the same thing: creation of blogs, search engine optimization, promotion, earnings. Continue reading

What is the uniqueness of the text and how to check it?
You have probably already heard more than once that search engines especially appreciate unique texts, and therefore, when creating your website or any Internet project, you sincerely intend to fill…

...

How to find out your IP address? All the ways!
How to find out your IP address, this question is asked by many people who are not very versed in network protocols and generally devices of modern networks. Ok, let's…

...

How to get client and financial returns from a site?
There are various channels of communication between the manufacturer and the consumer, and the seller and the buyer - traditional media, television, radio, outdoor advertising and points of sale. The…

...

How to hack a site?
To begin with, we will determine that in this article I in no way urge anyone to hack someone’s Internet resources using the methods described below. The main goal of…

...