Web 2.0 technologies
| |

The infrastructure of the Web 2.0 is complex and changing in nature, but it always includes: server software, content syndication, messaging protocols, navigation standards various client applications (plug-ins, or grafts, non-standards are generally avoided). These complementary approaches provide Web 2.0 … Read More

Domain name speculation
| |

Domain name speculation refers to buying domains with the intent of selling them later for a higher price. The speculative element can be linked to news and current events, though the period during which such domains can be sold or … Read More

Privacy on the Internet
| |

As the protocols used for e-mail, HTTP uses broadcast of its messages clearly, making it vulnerable to even novices attackers. A simple solution to ensure the privacy of navigation is using an extension protocol called HTTP Secure or HTTPS. Addresses … Read More

Proxy servers
| |

There are increasingly many companies which, along with the use of a firewall equipment, use for HTTP proxy servers. They are designed to be intermediate between the client and the web server, making connections on their behalf. Usually they contain … Read More

Web browsers
| |

In terms of investigations, it should be noted that the accessed links are generally temporarily stored in the client programs. This feature called History – history of navigated pages, and can be a very useful tool for research pages that … Read More

Web address – URL
| |

Generally, the transfer begins with a request that the client makes to the server as a result of a user action such as entering an address or clicking on a link. The addresses are also denominated as URL, acronym for … Read More

HTTP
| |

Hyper Text Transport Protocol (HTTP) is the core of traffic on the World Wide Web (or WWW) on the Internet or private networks, and is basically a very simple protocol. It establishes a connection, and it asks for a document, … Read More

Spamming
| |

Spamming is the act of sending large numbers of unsolicited electronic messages (usually of a commercial nature). Although there are several methods, the most used is based on e-mail. Spam in the form of text messages may also target mobile … Read More

e-Mail
| |

E-mail is probably the service that has contributed most to the increase in popularity of the Internet so great, still one of the main reasons that people connect to this network. The key to success lies right in its features: … Read More

How DNS works in theory
| |

The domain name space consists of a tree of domain names. Each node or leaf in the tree has one or more resource records, which hold information associated with the domain name. The tree sub-divides into zones. A zone consists … Read More

Adobe Integrated Runtime (Adobe AIR)
| |

Adobe Integrated Runtime (AIR), formerly known as Apollo, is a software engine to run software created with Adobe Flash and ActionScript without using a Web browser. Adobe Integrated Runtime runs on the operating system and not inside a browser, such … Read More

Web 2.0
| |

Web 2.0 is the evolution of the Web towards greater simplicity (requiring no technical knowledge or computer for users) and interactivity (allowing everyone, individually or collectively, to contribute, share and collaborate in various forms). The term “Web 2.0” means all … Read More

1 2 3 4 5 6 8