VPN Basic Concepts and Classification
The term VPN (Eng. "Virtual Private Network") refers to a group of technologies that provide a network connection, or the so-called logical network, functioning on top of some other network,…

Continue reading →

VPN Basic Concepts and Classification
The term VPN (Eng. "Virtual Private Network") refers to a group of technologies that provide a network connection, or the so-called logical network, functioning on top of some other network,…

Continue reading →

Removing SMS viruses
Recently, viruses that require sending SMS have become a very popular and profitable type of money withdrawal from cybercriminals. As a result of this, a lot of varieties of SMS…

Continue reading →

film directors

SeaMonkey Web Browser Overview

Shrimp support is not as dynamic (in every way) as Firefox. But as it turned out, this has not only disadvantages, but also a number of advantages. I switched to this wonderful browser forced. At the time of writing my review on Firefox Gekko, it was updated to the 52nd version and due to the experiments of the developers it began to slow down significantly. But the main reason was the inability to use the web-developer panel, which did not work at that time a little less than completely.

And since SeaMonkey supports a small, but still a sufficient number of Firefox add-ons and is updated more slowly in terms of the Gekko engine, it was decided to switch temporarily and permanently to using this browser. Read the details in the article.

Now I switched back to Firefox Quantum and the return move can be considered quite comfortable. However, in Continue reading

The difference between Windows and Linux

A couple of years ago in one forum I, participating in one heated debate on the topic of whose swamp is better, published a post that will reveal the topic of this article. I quote it below:

A small digression about Windows and Linux. Here you understand what’s the matter: Windows is a combination of the core of the system, as well as utility programs and scripts that perform certain operations and tasks. On this OS, you do not have the right to modify or delete scripts and system software …

When you, for example, change the cursor on Windows, the work on changing the cursor is executed by a Continue reading

Capacitor Replacement

In the element base of the computer (and not only) there is one bottleneck – electrolytic capacitors. They contain electrolyte, electrolyte is a liquid. Therefore, heating such a capacitor leads to its failure, as the electrolyte evaporates. And heating in the system unit is a regular thing.

Therefore, replacing capacitors is a matter of time. More than half of the failures of motherboards of the middle and lower price category are caused by dried or swollen capacitors. Even more often, for this reason, computer power supplies break down.

swollen capacitors Continue reading

How to choose a service on the Internet
Nowadays, electronic gadgets are firmly in use, and with them the Internet. There, according to the trend of the time, the service sector is also moving. Even in my small…

...

Overview of modern antiviruses
Of all the threats to the security of user information, viruses stand apart. These small malicious programs, if not handled carefully, can steal or destroy any data. But it turns…

...

IP address in detail
From Wikipedia, the free encyclopedia IP-address (IP address, short for English. Internet Protocol Address) - a unique identifier (address) for a device (usually a computer) connected to a local network…

...

Child Safety Online
Many users, even the most experienced, sometimes do not suspect that having protected themselves, they forget about their own children. They forget, especially when creating different accounts in the OS…

...