How to connect multiple computers to the Internet through one
It all started with the fact that I connected to the regional fishing network. The speed of 100Mbit was very impressive and pleasantly pleased. The Internet was indescribably bright (especially…

Continue reading →

Computer jargon - a malignant tumor
Without language, communication between people would be impossible. Regardless of what first comes to mind when mentioning the word "language", the first and second meanings will be true. But certainly…

Continue reading →

How to hack a site?
To begin with, we will determine that in this article I in no way urge anyone to hack someone’s Internet resources using the methods described below. The main goal of…

Continue reading →

appropriate search engines

Open the fb2 format.

When surfing the Internet, you may come to this question: “How to open fb2?”. But really, why open such an outstanding format?
Well, let’s take turns.

FictionBook – a format for representing electronic versions of books in the form of XML documents, where each element of the book is described by its own tags. The standard is designed to provide compatibility with any device and format. XML makes it easy to create documents that are ready for immediate use and software processing (conversion, storage, management) in absolutely any environment. The main goal of supporters of storing books in the FictionBook format is to clearly store the structure of the book with the ability to easily convert (including automated) a FictionBook format file to other popular formats: rtf, rb, isilo3.pdb, etc. Continue reading

Zombie farm, another option, do not kill, but bury it!

A rather interesting situation is obtained – there are two Zombie farms on Vkontakte. Different in content, design, voice acting, gameplay, but with exactly the same name.
I must say right away that this is the second zombie farm in chronology, but the time difference with the opening is literally two weeks. In addition, the applications are really different, so there can be no talk of outright plagiarism, rather both projects copy some points from their Western counterparts. Continue reading

How to hack a page in a social network in contact?

This informative article in contact hacking can be perceived differently. As a guide for beginners, to help participants in the VKontakte project, or simply as a guide. However, it cannot be qualified as a fraudster’s guide. In principle, the information for the fraudster is too small and cannot be used in full. All the information laid out in this article does not so move towards active illegal actions, as, using an example, it shows how to deal with these actions. It’s no secret, it’s easier to fight with someone you know. Here, a lot of useful, really useful information is also presented that will facilitate your stay on the site in contact. Continue reading

The history of development and evolution of the keyboard.
We all use the keyboard every day, it is difficult to say whether there can be a more important and universal device for entering information into a computer than a…

...

Counter on the site. Settings, description, selection of the best ...
Experience shows that in the promotion of any site a good counter is the most necessary and convenient tool for evaluating your actions in the process of advertising campaigns. Despite…

...

There are many ways to open the djvu format on both the computer and the phone.
Recently, electronic books in the DjVu format have been very popular. Files in this format are generally smaller in size than PDF extension documents. The djvu format is widely used…

...

What topic to choose for a blog? Just not about the blog!
I wonder how many sites in RuNet about sites and blogs about blogs? Of course, no one specifically calculated them, but - a lot! There are very famous among them,…

...