Do you want to know who is calling you every time before you pick up the phone? Get rid of spam callers with these simple tips. Find out who is calling you and block them today.
Do you want to know who is calling you every time before you pick up the phone? Get rid of spam callers with these simple tips. Find out who is calling you and block them today.
More sophisticated cyberattacks, virtual reality on available hardware and an ever-increasing number of IoT devices. What is trending in IT now and what can we expect from the new decade?
The Internet of Things is becoming a challenge for security experts as our IoT devices are not yet ready for a hacker attack.
The microservice architecture is an innovative approach to creating applications. Learn what kind of solution it offers to developers.
In this piece, we’ll delve into what containerization is, some key terms you’ll need to know, some of the top container platforms as Docker and Kubernetes and some recommended implementation approaches.
We've compared the pros and cons of some of the best free web monitoring tools out there, and added some recommendations for more complexed platforms that can also monitor content, clouds, or SSL.
Cryptojacking is one of the newest forms of cyber attacks that security experts are able to identify. Find out how to recognize it and protect yourself.
A DDoS attack still can put upside down any business as hackers find new ways to infiltrate the strongest systems. Find out more about DDoS attacks today.
Did you know that Google allows you to do this? Get to know its hidden tricks.
SSL-based threats can open the door to phishing, ransomware and more. Find out how to protect yourself from encrypted atacks.
Want to leave the cyber world? Follow the next steps in the article to erase your digital footprint.
Your email account and passwords might be compromised in this new massive data breach. Get to know why!
5G will arrive soon and Intel predicts how we will use its extraordinary speed.
Are you excited about what technology will bring in 2019? Wait! More dangerous cyber threats are coming as well.
It is time to relax after those intense hours of coding and dealing with infrastructure maintenance. Take a breath with these relaxation apps.
Have you ever heard about APIs? Discover the messenger that makes app communication possible.
If you have never designed a disaster recovery plan, your business continuity might be compromised. Get to know why.
No matter what Windows version you use, these firewalls can help you to keep your PC safe.
This is why you should consider containerization as a serious alternative to replace a VM.
How to use the REST API in WordPress? We show you how it can be used practically and skillfully on the example of developing an app.
In the second part of the series, we present you a simple tutorial on how to learn the basics of REST API and try it in practice.
The REST API revolutionized WordPress. In part one of the series, you will find out what the new functionalities are and how you can use it.
Nevada's desert is the place where one of the craziest cryptocurrency projects is taking place. Discover what is the plan of this man in love with Etherum.
Do you need more privacy and control over your infrastructure? If so, you may profit from a private cloud.
Internet threats are everywhere but Angler Phishing is especially dangerous. Get to know why.
Are you still considering moving your company to the cloud? We'll tell why you should do it.
A new study reveals that a DSL connection may be causing lack of sleep in people. Are you one of them?
An exciting year is coming regarding technology. Take a look at what you can expect in the IT sphere.
The future is here: this is how machine learning is providing computers their own way of thinking.
Looking for a place to save those bitcoins? Take a look at the best five cryptocurrency wallets on the market
Maybe that combination of numbers and letters is not protecting you so much. Discover if your password is an open door for crackers.
Google Plus has been kind of a dead social network from the beginning and the company has finally realized it.
Want to jump into app development? Hold on! First of all, read this advice.
According to Jaron Lanier, we are approaching an apocalyptic scenario where everybody will be conditioned by Social Networks. Discover why.
These are the features of the new fastest supercomputer in the world and you will love it!
Experience what it feels like to be in charge of a cyber attack and have fun in the meantime with this hacking simulators.
5G will arrive to make your life faster and easier in harmony with the cloud. We'll explain you why.
What if a computer could reveal the meaning of your dreams? What if the same computer could project your dreams as a movie after you wake up? This can happen very soon.
If you are new in virtualization, you must take a look at this brief introduction to get to know its basic architecture.
Google is seriously thinking of burying the URL very soon. Discover what is behind this controversial decision.
Discover the difference between a cloud server backup and a physical one and get to know which vendors can help you with it.
Take a look at the content that lies in the underworld of the public network through the best Deep Web websites
Get to know how the integration of augmented reality into the cloud will change your interaction with the world.
Have you ever heard of Shodan? Discover why it is considered the devil inside the internet of things!
Protect your data from intruders. With these security measures, you can set a good server protection system.
How much time do you spend on giving and checking your likes every day? You could be under Facebook stress.
Get to know what is Cyber Blitzkrieg, the apocalyptic scenario caused by a lethal cyber war.
You are still on time to catch some of the most exciting IT summits. Take a look to the technology current events!
This is what you should know about your IP address and some effective ways to protect your privacy when browsing anonymously.
Have you reached the point where you must decide between a Dedicated or Managed Server? We will help you make the right choice.
Find out how the basic OpenStack architecture works and the current possibilities to start using it.
These guys were capable to put governments and corporations on their knees. Get to know the most famous hackers in history.
This is how Ray Kurzweil unveils the future. Get to know the man who is called the ultimate thinking machine.
Both of them are like a black hole but they are a little bit different. Take a look into the Dark Web and the Deep Web.
Get focus and increase your brain productivity by listening to this great music for programmers
Compare the pros and cons of each data backup method to design the best restoration strategy.
What would you think if a small robot, almost invisible, could connect your brain to the Internet, cure cancer or destroy the Earth? Discover the universe of nanotechnology.
Take a look at the most exciting technological race in the world: quantum supremacy or how a quantum computer will change the paradigm of computer science.
Find out if your computer has been attacked by one of these threats and how to get rid of them with the best malware protection.
Do you know how to increase your Wifi security? Find out here what the best algorithm is to keep intruders away.
The next automotive revolution will happen thanks to the cloud technology in cars. Find out why.
Are you interested in mining Bitcoins but don´t know much about cryptocurrencies? In this article we help you to choose a mining rig, a software and a Bitcoin wallet. We also advice you how to mine profitably.
How exactly does Bitcoin mining work? How many Bitcoins are there and how many of them still remain unmined? Find all the answers in this article.
Digital advertising is ever so often spreading malware, even on big name websites. People therefore increasingly turn to ad blocking. But the publishers don’t like it. Is there a way out of this?
Criminals claiming to be a hacker group extort money from companies. They threaten them with a DDoS attack. But it seems they might not actually be able to run any sort of attack.
Experts found vulnerabilities in surveillance devices. Security cameras and DVR devices are favoured by hackers for a reason. Think about securing this aspect of your network as well.
Scientists managed another breakthrough. They built a quantum computer that can execute the difficult Shor’s algorithm. It’s just five atoms big, but the experts claim it will be easy to scale it up.
The fastest European supercomputer will get a hardware gift. The Swiss supercomputer center CSCS will replace its GPUs and CPUs, almost doubling its performance.
Some people trust webpages when they show them an icon of a lock. But internet security is not as simple as that. Read all about the SSL certificates, how do they work and why should you use them on your company server.
Today is the anniversary of Moore’s law. Fifty-one years ago Gordon E. Moore predicted the CPU development pace for the coming years. And his “law” has set the pace ever of IT industry ever since.
Administrators might just have gotten a new weapon against hackers. Dell has published DCEPT, a tool that lures hackers into its traps. It’s free, open source and already evolving.
A new vector of attack uses mice. Hackers can take control of a computer through a wireless mouse. Only wired and Bluetooth devices are safe from this powerful exploit.
Scientists created a new CPU that uses light instead of electricity for its IO operations. The throughput density of the chip is up to fifty times greater than that of current processors – and it saves energy as well.
The Internet archive has created a Malware museum. How did viruses work back in the ages of DOS? Now you can see for yourself.
Your data center is almost done. Both the building and the hardware are ready. But how do you breathe life into it all? Read the final part of a guide made by our resident experts to find out.
Setting up network in a new data center need not be overly complicated. Read our detailed guide to find out what are the things to watch out for.
Have you ever thought about building a data center for your company? It’s a complex endeavour, but with the help of this guide, you should be well prepared. Read part one of our How to Build a Data Centre series.
A new virtual model of an ARM1 CPU shows the way data moves in a working chip. Look at the inner workings of a predecessor of modern CPUs that dominate the mobile market.
How did the Prague branch of MasterDC start out? And how does its director Petr Stepanek see the future of the company? Read all about it in the first of interviews with members of our teams.
Neogenia from Brno is very satisfied with our cloud solution. Why did they choose it and how did the migration go? Learn about their experience from Neogenia’s CTO Jan Simecky.
Cloud technologies are ruled by OpenStack. An open platform that keeps pushing the cloud ever further. What is it? And what advantages could the “king of cloud” have for your company?
It’s not easy to stand your ground against DDoS attacks. It’s best to be ready and know the methods of your attackers. Read about two most common types of DDoS – UDP and SYN floods.
Sabotage, theft of passwords and techniques, revenge for dismissal. Some administrators spoil the good name of the others. Why such cases happen and how they can be avoided?
Choosing the right cloud is not a simple matter. What should you focus on when picking a provider? Read the most important questions that might make your choice easier.
Get into a mindset of a hacker with these helpful learning tools. It will help you improve the security of your servers. And hacking can even earn you some money through contests or bug hunting.
Some data centers can even withstand being hit by a rocket. Others fail in a small storm. Defend your data, pick a provider that can withstand natural disasters.
According to the latest surveys, most companies have a group of users that try to bypass company IT rules. Why are they doing it and how can you prevent shadow IT?
What type of storage should you use in servers? Good old mechanical HDDs or new flash-based SSD? Read the part two of our comparison to find out about their pros and cons.
There’s been less and less email spam being sent every day. Is the internet safe already? Not really, it’s just that the attackers are looking for other ways to scam people.
What storage tech should you choose for your server? SSD or HDD? Part one of our series that compares the two is focused on their inner workings, speed and capacity.
Admins were kept very busy these last few months. There have been more DDoS attacks on servers lately, and they were stronger and lasted longer than ever before.
It’s easy to be a bit wary when considering the adoption of a new technology for your company. But with cloud, you don’t have to worry about a thing. Here’s how you can get over the five most common fears of the cloud.
Free cooling is the best way data centers can save millions of dollars. Even huge companies such as Facebook or Google have grown fond of this tech. Why is free cooling so brilliant?
Free cooling is the best way data centers can save millions of dollars. Even huge companies such as Facebook or Google have grown fond of this tech. Why is free cooling so brilliant?
If you have never designed a disaster recovery plan, your business continuity might be compromised. Get to know why.
Our blog brings you the best insights from the world of IT. Subscribe for news and contests!Sounds good!
Done, thank you! We’ll soon be sending you notices about our new posts and contests!
© 1998-2021 Master Internet, s.r.o., holder of ISO 9001:2015 and ISO/IEC 27001:2013 certificates