Top.Mail.Ru

Blog

10 November 2016
Denial of service in BIND
The vulnerability allows a remote user to cause a denial of service. The vulnerability is caused due ...
4 November 2016
3 years of successful work
Today, our company celebrates 3 years since its foundation. All this time we have worked for you, ma ...
3 November 2016
History of Java
In the early 1990s developers at Sun Microsystems company began working on the language called Oak. ...
30 October 2016
Benefits and the dangers of artificial intelligence
Surely everyone has at least some idea of what artificial intelligence. Movies, TV shows, articles f ...
16 October 2016
The most courageous customer will receive an iPhone 7 a ...
In honor of the service's birthday, the most courageous client who made the maximum amount of funds ...
14 October 2016
Web site development - the science and art
When you get on the Internet and for a long time there are, sooner or later you will want to have yo ...
9 October 2016
There are no boundaries for speed
Everyone knows that the initial settings of the operating system are not optimal for the effective o ...
29 September 2016
Some errors in business
In the business world there are a number of large errors. Sometimes, these errors lead us nowhere, s ...
21 September 2016
Critical vulnerability in MySQL
Portal legalhackers.com published details of a critical vulnerability in MySQL (CVE-...