When a user is looking for something on the Internet, they enter a search query, in response to which search engines offer a list of suitable pages.
But how does the search engine determine their relevance? One of the factors is the correspondence of the text on the page to the query being entered. By placing keywords, people let search engines understand that this is the information a user is interested in. More →
In previous article, we’ve discussed what EFAIL vulnerability is and how it works. Now, we are going to answer frequently asked questions about EFAIL.
Does a problem concern only email clients? Or should I abandon the encryption programs at all? More →
The Computer Security Expert Group found a critical vulnerability in popular e-mail public key encryption systems – PGP (and its free alternative GPG) and S/MIME. The EFAIL vulnerability can be used to fully decrypt messages, including those sent earlier. Professor Münster University of Applied Sciences Sebastian Schinzel reported on the problem.
EFAIL allows attackers to decrypt messages without owning a private key. Researchers and More →
What about the mobile version of the site? It should be made separately?
In general, there are two ways to make sure that the site is normally displayed on both a mobile device and a computer. First: two different versions of the site are made, and users get the appropriate version depending on devices they visit the site with. Second: the site automatically More →
Do I need a hefty server for a site?
You need a server, of course. But usually site owners buy computing power from third-party companies. This service is called hosting. Today there are lots of companies providing hosting services with different prices, equipment and Internet speed in datacenters (special buildings where server equipment is installed). If you need hosting for a simple site, you usually buy so-called More →
What is a site?
A site is a set of connected and linked pages with text, pictures, different media, etc. If you read this article in a browser, More →
As you remember, each server response includes status and headers. In the previous article, we listed all the server response statuses and named the most important of them. This time we will speak about server response headers. Let’s go back to the response example we used earlier: More →
People get sites as an image in the browser. However, search robots get HTML files with certain encrypted information. For ordinary users it’s just a set of symbols, but for a robot this is a clear instruction for scanning data. In this new article you will find out what is contained in such responses, and what you first need to pay attention to for successful promotion.
The server response might look something like this: More →
Each user has got a 404 error at least once. As a rule, people immediately leave 404 error page. But if you are the owner of the site, you do not want the visitors you spend money and time to attract just leave. What to do? It is important to correctly configure and design the page that is not found, so that traffic remains on the site. In this article we will discuss how to do this. More →
Search engines evaluate sites by hundreds of factors, including looking at how much users like your site. The degree of satisfaction of visitors and their reaction to the pages is measured on the basis of various signals – let’s talk about them and in our new article. More →