How long can I sit at a computer?
Computing has become literally a part of life. Computers and tablets - it’s impossible to imagine a single day when only a couple of minutes were spent in front of…

Continue reading →

Overview of modern antiviruses
Of all the threats to the security of user information, viruses stand apart. These small malicious programs, if not handled carefully, can steal or destroy any data. But it turns…

Continue reading →

Overview of modern antiviruses
Of all the threats to the security of user information, viruses stand apart. These small malicious programs, if not handled carefully, can steal or destroy any data. But it turns…

Continue reading →

addresses without

Internet speed check (monthly statistics)

Checking the speed of the Internet is a fairly simple task if a single measurement is required. There are a ton of online tests on the Internet for this. But if the task is to measure the speed of the Internet connection within a month with a frequency of once per hour, in order to evaluate the quality of the service and use this data as an argument when communicating with the service provider, the task is somewhat more complicated.

About how I got out of this situation and received summary data for a month (the period and frequency can be any), read the article.

Checking the speed of the Internet should have been carried out constantly with equal frequency. Therefore, the use of a working computer was not suitable for this purpose, otherwise it would have to be kept on all the Continue reading

Local Area Networks and the Internet

When a local area network is connected to the global Internet, one of the PCs, called a server, becomes a kind of conductor and connects to the Internet using a modem or in some other way, while other computers operate through it, they are also called workstations. Just like any of us has a mailing address where we receive mail letters, each computer is assigned an IP address for functioning in the Internet environment, but usually it has only a computer-explorer directly connected to the Internet.

If the computer is connected through a modem, it usually receives a dynamic address from the service provider. It is assigned automatically and is valid for a specific time. While there is also a static address, a permanent address for an unlimited period of use. At least two network devices are usually connected to the Continue reading

File encryption
Encryption is the most common and essentially the simplest way to protect any information. After all, it seems that it could be simpler to take the text, take some algorithm…

...

License Review Article
Before we talk about licenses, I would like to touch on the subject of licensing in order to clarify. So, licensing is most often designed to preserve the source code…

...

WiFi router - what is it and how to choose it correctly
Nowadays it is already difficult to meet a person who does not use a computer and does not have his home. Often people buy several computers, many also have laptops…

...

Present day viruses
There are a huge number of computer viruses in the world. To establish their exact number (along with all modifications and upgrades) no one is taken. Instead, it is customary…

...