Overview of modern antiviruses
Of all the threats to the security of user information, viruses stand apart. These small malicious programs, if not handled carefully, can steal or destroy any data. But it turns…

Continue reading →

Installing a cooler on a processor
Background to the experiment: CPU cooling (LGA775 socket) was provided by the CNPS7700-AICu cooling system. Intel Pentium D930 processor, was purchased in 2005. At that time, quite powerful and expensive.…

Continue reading →

File encryption
Encryption is the most common and essentially the simplest way to protect any information. After all, it seems that it could be simpler to take the text, take some algorithm…

Continue reading →

addresses without

Internet speed check (monthly statistics)

Checking the speed of the Internet is a fairly simple task if a single measurement is required. There are a ton of online tests on the Internet for this. But if the task is to measure the speed of the Internet connection within a month with a frequency of once per hour, in order to evaluate the quality of the service and use this data as an argument when communicating with the service provider, the task is somewhat more complicated.

About how I got out of this situation and received summary data for a month (the period and frequency can be any), read the article.

Checking the speed of the Internet should have been carried out constantly with equal frequency. Therefore, the use of a working computer was not suitable for this purpose, otherwise it would have to be kept on all the Continue reading

Local Area Networks and the Internet

When a local area network is connected to the global Internet, one of the PCs, called a server, becomes a kind of conductor and connects to the Internet using a modem or in some other way, while other computers operate through it, they are also called workstations. Just like any of us has a mailing address where we receive mail letters, each computer is assigned an IP address for functioning in the Internet environment, but usually it has only a computer-explorer directly connected to the Internet.

If the computer is connected through a modem, it usually receives a dynamic address from the service provider. It is assigned automatically and is valid for a specific time. While there is also a static address, a permanent address for an unlimited period of use. At least two network devices are usually connected to the Continue reading

Why you should never use a free VPN
Today virtual networks are very popular for solving personal security issues on the Internet - VPN. More and more people use them to circumvent network censorship in countries where there…

...

Destination of proxies and NAT
A proxy server is the link between users and the Internet. Proxy server - a server that is constantly on the Web, transmitting all requests from the user computer to…

...

Work on the Windows command line
The most common startup recommendations are: Start, Run, cmd. There is a Run item in the start menu. He runs a program that allows you to transfer single commands to the…

...

Delete a banner using Kaspersky WindowsUnlocker
Today, the removal of ransomware viruses has become somewhat more complicated than before - many time-tested methods do not work. For example, now it’s unlikely that you can unblock a…

...