Filters
History and evolution of the Internet from its birth to the present day
A panel discussion from the NOGUA 2026 conference on the topic: The History and Evolution...
6 days agoTHE HYDROGEN BOMB AND THE MEMORIAL. Academician Sakharov
Academician Sakharov is loved for different things: some know him as the creator of the...
6 days agoHow a DNS Protocol Failure Led to the Fall of the Runet
On January 30, 2024, a DNS protocol failure caused temporary unavailability of .ru domain sites...
6 days agoA Chronicle of Dnipro's Pre-Internet Era. Refreshing Memories with Sergey Shishkin
Retro Techno is an author's project by Alexander Glushchenko. Together with guests, Alexander reloads memories...
6 days agoChronicle of the pre-Internet era. Rebooting memories with Pavel Belousov
Retro Techno is an author's project by Alexander Glushchenko. Together with guests, Alexander reloads memories...
6 days agoHow to recover a deleted message in Telegram
Short videos for every day: about useful applications, cybersecurity, artificial intelligence and OSINT.
6 days agoWe're being watched: How SORM works
There is a lot of information of varying degrees of reliability available on the Internet...
1 week agoMidjourney. Web-based image editor
The name Midjourney is known to everyone. Since recently, the platform is available in a...
1 week agoVPN Generator: update 2024! How to bypass blockages with Outline, Wireguard or Amnezia VPN for free
"The fight for a free internet never stops! VPN Generator has been updated, adding Outline...
1 week agoVPN vs. Tor: what is VPN and what is Tor, how does the technology work and which one to choose?
The first Tor release was published in 2002, immediately as open-source software, although the technology...
1 week agoHow the U.S. Ambassador Was Spied on for 7 Years with an Invisible Bug—and Its Surprising Link to Electronic Music
In 1945, Soviet spies scored a major victory over their American colleagues: they managed to...
1 week agoAuthenticator Pro: review of two-factor authentication app for Android
"There are quite a few apps for two-factor authentication. The most popular one, Google Authenticator,...
1 week agoBig Brother. History of surveillance
"Holmes versus Moriarty. Bastrykin versus a magnifying glass. Aristotle versus a press with spikes. The...
1 week agoHow to Find and Recover Deleted Web Pages?
"If web pages and content are removed from the Internet, they can still be restored...
2 weeks agoStep-by-step guide to creating AI Assistants using ChatGPT, Operator and ChatLLM
Step-by-step guide to creating personal AI Assistants using ChatGPT, Operator and ChatLLM to automate various...
2 weeks agoWhat is the danger of the Russian app store RuStore?
When you buy a phone, it already has many applications installed. Games, social networks, manufacturer's...
2 weeks agoHow Roskomnadzor Is Breaking the Internet for Putin: From VK to the MAX Messenger
The internet in Russia has gone from a space of almost absolute freedom to one...
2 weeks agoOnboarding: Getting started with OONI Probe
The installation and first launch of the OONI Probe application on a computer. Information is...
2 weeks agoHow Russia’s FSB Is Structured
The FSB is a massive structure made up of dozens of divisions. Thousands of officers...
3 weeks agoConcentration camp in DNR, Ukrainian “spy”, Lamborghini for militants | The story of Alexander Marchenko.
"Alexander Marchenko is a Ukrainian serving a sentence in Russia on trumped-up charges of espionage....
3 weeks ago