Bat files, examples
You can perform all the examples published below not only by creating and running a BAT file containing these commands, but also copying them directly to the command line. To…

Continue reading →

The difference between Windows and Linux
A couple of years ago in one forum I, participating in one heated debate on the topic of whose swamp is better, published a post that will reveal the topic…

Continue reading →

Child Safety Online
Many users, even the most experienced, sometimes do not suspect that having protected themselves, they forget about their own children. They forget, especially when creating different accounts in the OS…

Continue reading →

how it is written

Removing SMS viruses

Recently, viruses that require sending SMS have become a very popular and profitable type of money withdrawal from cybercriminals. As a result of this, a lot of varieties of SMS viruses have appeared. There are not only viruses that require SMS for viewing porn sites, but also disguise for installing and updating programs, locking the system due to unlicensed use, and so on and so forth. The whole variety of varieties in the form of screenshots can be observed here, for example.

ransomware sms virus

Another problem is that an infected user, going to a friend to search the Internet for a solution to his problem, stumbles across the network to Continue reading

Computer assembly, pitfalls
Assembling a computer, especially a new one, is a lottery game. A number of factors that are not dependent on the builder can lead to the fact that the computer…

...

Work on the Windows command line
The most common startup recommendations are: Start, Run, cmd. There is a Run item in the start menu. He runs a program that allows you to transfer single commands to the…

...

Installing a cooler on a processor
Background to the experiment: CPU cooling (LGA775 socket) was provided by the CNPS7700-AICu cooling system. Intel Pentium D930 processor, was purchased in 2005. At that time, quite powerful and expensive.…

...

Personal Data Security
What is personal information, and why does the state develop entire laws designed to protect such data? Imagine that you are making an order online. In the process of forming…

...