D-Link DIR-300 Setup
The DIR-300 router has been discontinued today and you can see on sale its more modern version - DIR-300NRU. The difference between them is small: slightly different interfaces (NRU cannot…

Continue reading →

Internet fraud
A proverb says: "Forewarned - means armed." Not to listen to her is stupid. Nowadays, the Internet is playing an increasingly important role in people's lives, and is of undoubted…

Continue reading →

Reading books on a computer. How to read books on a computer?
I welcome all fans to read interesting and useful books, as well as those who are just interested in how you can read books on a computer. In the past…

Continue reading →

may well explode

How to improve the noise characteristics of the system unit of a personal computer

When using a home personal computer to watch movies, listen to music or browse the Internet, especially at night, the noise of the system unit becomes especially noticeable. Permanent noise sources are active elements of cooling systems (ventilation) and hard disk drives.
Usually, several fans are installed in the system unit: on the processor heatsink, on the video card (if there is an active cooling system), for blowing the hard drive, for housing ventilation, in the power supply.

The most energy-intensive components of a personal computer are the central processor and video card. Accordingly, they have the most powerful cooling systems, which are the main sources of noise. On the other hand, since all modern processors, including graphic ones, are equipped with energy-saving functions, the heat dissipated by them under low loads is small. In this case, the fan or turbine of the cooling systems installed on them practically Continue reading

License Review Article

Before we talk about licenses, I would like to touch on the subject of licensing in order to clarify. So, licensing is most often designed to preserve the source code (source code) from encroachment. What is it? Literally, the computer code of a program in any programming language.

What advantages does it give? There are absolutely no ordinary users, but a programmer can easily determine by him the principle of the program’s work, be able to track all its actions, what is happening, why and for what. It’s like observing the construction of a house from the window of your apartment or working as an engineer at this construction site. You know the source code – you know all the secrets. Continue reading

Apple iPhone OS

Preamble: Recently, all sorts of mobile and, especially fashionable, cloud technologies have captured the attention of mankind. Desktops and laptops faded into the background, giving way to more compact and attractive toys for leisure and business. Our new friends not only know how to polyphony, show pictures and surf the Internet, but also become fashionable accessories that it’s a sin not to put on a cafe table next to a cup of tea, from time to time sliding the index finger on the inscription “Slide to unlock”. But the day is heading towards the evening, your electronic partner is tired and he has to go on a charge. Well, insert the USB tail where necessary … let it rest.

Guest article written by Maxim Mozaev specifically for Nevor.ru. Maxim is well versed in all kinds of glands and actively uses Apple products. I don’t use the products of the fruit company myself, so I had to invite a competent person who is in the topic to write this article. Continue reading

Delete a banner using Kaspersky WindowsUnlocker
Today, the removal of ransomware viruses has become somewhat more complicated than before - many time-tested methods do not work. For example, now it’s unlikely that you can unblock a…

...

The computer does not turn on: the problem is in the power supply
All PC malfunctions falling under the “computer does not turn on” category boil down to one single problem: it is impossible to download any of the known operating systems to…

...

Home network: Ethernet or Wi-Fi
If you do not go into the jungle of network technology and do not utter such terrible words as a router, a switch, a hub and a routing table, the…

...

File encryption
Encryption is the most common and essentially the simplest way to protect any information. After all, it seems that it could be simpler to take the text, take some algorithm…

...