How to hack a page in a social network in contact?
This informative article in contact hacking can be perceived differently. As a guide for beginners, to help participants in the VKontakte project, or simply as a guide. However, it cannot…

Continue reading →

How to choose the best laptop
Buying a laptop is not an easy task, and you need to approach this issue no less seriously than purchasing any other equipment. As in the case of buying a…

Continue reading →

How to remove a banner from the desktop and from the browser
If you are reading this article, then you must have encountered such a problem as an advertising module or an informer on the monitor of your computer. It is sometimes…

Continue reading →

appropriate search engines

Open the fb2 format.

When surfing the Internet, you may come to this question: “How to open fb2?”. But really, why open such an outstanding format?
Well, let’s take turns.

FictionBook – a format for representing electronic versions of books in the form of XML documents, where each element of the book is described by its own tags. The standard is designed to provide compatibility with any device and format. XML makes it easy to create documents that are ready for immediate use and software processing (conversion, storage, management) in absolutely any environment. The main goal of supporters of storing books in the FictionBook format is to clearly store the structure of the book with the ability to easily convert (including automated) a FictionBook format file to other popular formats: rtf, rb, isilo3.pdb, etc. Continue reading

Zombie farm, another option, do not kill, but bury it!

A rather interesting situation is obtained – there are two Zombie farms on Vkontakte. Different in content, design, voice acting, gameplay, but with exactly the same name.
I must say right away that this is the second zombie farm in chronology, but the time difference with the opening is literally two weeks. In addition, the applications are really different, so there can be no talk of outright plagiarism, rather both projects copy some points from their Western counterparts. Continue reading

How to hack a page in a social network in contact?

This informative article in contact hacking can be perceived differently. As a guide for beginners, to help participants in the VKontakte project, or simply as a guide. However, it cannot be qualified as a fraudster’s guide. In principle, the information for the fraudster is too small and cannot be used in full. All the information laid out in this article does not so move towards active illegal actions, as, using an example, it shows how to deal with these actions. It’s no secret, it’s easier to fight with someone you know. Here, a lot of useful, really useful information is also presented that will facilitate your stay on the site in contact. Continue reading

Counter on the site. Settings, description, selection of the best ...
Experience shows that in the promotion of any site a good counter is the most necessary and convenient tool for evaluating your actions in the process of advertising campaigns. Despite…

...

Quantum Computers and Quantum Internet
Are there limits to the development of the computer industry? Taking into account the pace of this development over the past half century, a rather rosy impression is formed about…

...

Can Kaspersky Anti-Virus protect a computer?
Today, in the age of the Internet and the global exchange of information without an antivirus, it’s impossible in any way, probably everyone knows this. Which antivirus is better? People…

...

How to create a .htaccess file
If you have your own website, sooner or later you will have to face the creation of the .htaccess file. There are many descriptions of this file, various functions, and…

...