License Review Article
Before we talk about licenses, I would like to touch on the subject of licensing in order to clarify. So, licensing is most often designed to preserve the source code…

Continue reading →

Delete a banner using Kaspersky WindowsUnlocker
Today, the removal of ransomware viruses has become somewhat more complicated than before - many time-tested methods do not work. For example, now it’s unlikely that you can unblock a…

Continue reading →

The computer does not turn on: the problem is in the power supply
All PC malfunctions falling under the “computer does not turn on” category boil down to one single problem: it is impossible to download any of the known operating systems to…

Continue reading →

access and provide

Local Area Networks and the Internet

When a local area network is connected to the global Internet, one of the PCs, called a server, becomes a kind of conductor and connects to the Internet using a modem or in some other way, while other computers operate through it, they are also called workstations. Just like any of us has a mailing address where we receive mail letters, each computer is assigned an IP address for functioning in the Internet environment, but usually it has only a computer-explorer directly connected to the Internet.

If the computer is connected through a modem, it usually receives a dynamic address from the service provider. It is assigned automatically and is valid for a specific time. While there is also a static address, a permanent address for an unlimited period of use. At least two network devices are usually connected to the Continue reading

File encryption

Encryption is the most common and essentially the simplest way to protect any information. After all, it seems that it could be simpler to take the text, take some algorithm known to you and your friends and use the algorithm to make gibberish from the text that no one except you and your friends will parse. Simple and pretty angry. To date, the solution remains the most reasonable.

However, many may argue, “then what is the effectiveness and complexity of encryption?” But it is in the selection of the algorithm. At the moment, there are a huge number of encryption systems and ciphers. And each of them is unusually effective and complex to a certain extent. However, all of them are classified into two main categories: symmetric and asymmetric ciphers. Further we will focus on them. And already examining an example, we will show what data encryption is. Continue reading

E-Wallet Protection

When comparing the degree of protection of client programs of payment systems Yandex.Money and Webmoney, it turned out that the latter offers more reliable means of protecting client data. However, in addition to this, both systems offer their customers online payment methods.

Since many users in modern conditions rely on network applications, this type of payment is becoming increasingly popular. It does not require software installation on a home computer, can work with any operating system and does not bind the user to a separate workstation. Continue reading

What is a firewall and why is it needed?
We will not go into little things like translating words, occupying them some part of the article. Just point out that a firewall (from the English - fire wall), or…

...

Destination of proxies and NAT
A proxy server is the link between users and the Internet. Proxy server - a server that is constantly on the Web, transmitting all requests from the user computer to…

...

How long can I sit at a computer?
Computing has become literally a part of life. Computers and tablets - it’s impossible to imagine a single day when only a couple of minutes were spent in front of…

...

The computer does not turn on: the problem is in the power supply
All PC malfunctions falling under the “computer does not turn on” category boil down to one single problem: it is impossible to download any of the known operating systems to…

...