Internet
Corbina Telecom, the Russian universal telecom operator, has launched the Internet2 project in Moscow, which will result in the union of Corbina Telecom customers - both those already working with…

Continue reading →

How to choose the best laptop
Buying a laptop is not an easy task, and you need to approach this issue no less seriously than purchasing any other equipment. As in the case of buying a…

Continue reading →

How to launch your site? Hosting and domain
So, you have already chosen the method by which your Internet resource will be created, and suppose that your site is already ready to become seen by all Internet users.…

Continue reading →

tanya

1 2 3 17

Open the fb2 format.

When surfing the Internet, you may come to this question: “How to open fb2?”. But really, why open such an outstanding format?
Well, let’s take turns.

FictionBook – a format for representing electronic versions of books in the form of XML documents, where each element of the book is described by its own tags. The standard is designed to provide compatibility with any device and format. XML makes it easy to create documents that are ready for immediate use and software processing (conversion, storage, management) in absolutely any environment. The main goal of supporters of storing books in the FictionBook format is to clearly store the structure of the book with the ability to easily convert (including automated) a FictionBook format file to other popular formats: rtf, rb, isilo3.pdb, etc. Continue reading

Zombie farm, another option, do not kill, but bury it!

A rather interesting situation is obtained – there are two Zombie farms on Vkontakte. Different in content, design, voice acting, gameplay, but with exactly the same name.
I must say right away that this is the second zombie farm in chronology, but the time difference with the opening is literally two weeks. In addition, the applications are really different, so there can be no talk of outright plagiarism, rather both projects copy some points from their Western counterparts. Continue reading

How to hack a page in a social network in contact?

This informative article in contact hacking can be perceived differently. As a guide for beginners, to help participants in the VKontakte project, or simply as a guide. However, it cannot be qualified as a fraudster’s guide. In principle, the information for the fraudster is too small and cannot be used in full. All the information laid out in this article does not so move towards active illegal actions, as, using an example, it shows how to deal with these actions. It’s no secret, it’s easier to fight with someone you know. Here, a lot of useful, really useful information is also presented that will facilitate your stay on the site in contact. Continue reading

1 2 3 17
There is not enough memory on the flash drive! Solution to the problem
Probably everyone is familiar with the situation when you are trying to copy any data (larger than 4 gigabytes) to a flash drive and the operating system displays a message…

...

Virtual reality - evil or salvation? Leave so as not to return ...
When friendship is apart, love has exhausted itself and the finest thread that tied people is torn - then their paths diverge, and each goes his own way in life.…

...

Fifteen of the most famous hacker attacks.
The advent of personal computers had a huge impact on society in the late 70s - early 80s .; just at this time, computer technology has decreased sufficiently in size…

...

How to remove a banner from the desktop and from the browser
If you are reading this article, then you must have encountered such a problem as an advertising module or an informer on the monitor of your computer. It is sometimes…

...