Silent installation of applications (silent install)
Silent installation is such a process in which you sit quietly and look at the screen where the software installation process takes place without your participation, provided that it is…

Continue reading →

Security in Firefox Browser
When working on the Internet, the highest priority should be to ensure the safety of users. Indeed, in the "global web" there is a huge number of fraudulent sites and…

Continue reading →

A bit about CCTV systems
When it comes to business security, peace of mind for the life and health of relatives, it is necessary to carefully approach the choice of security system. Over the past…

Continue reading →

may well explode

How to improve the noise characteristics of the system unit of a personal computer

When using a home personal computer to watch movies, listen to music or browse the Internet, especially at night, the noise of the system unit becomes especially noticeable. Permanent noise sources are active elements of cooling systems (ventilation) and hard disk drives.
Usually, several fans are installed in the system unit: on the processor heatsink, on the video card (if there is an active cooling system), for blowing the hard drive, for housing ventilation, in the power supply.

The most energy-intensive components of a personal computer are the central processor and video card. Accordingly, they have the most powerful cooling systems, which are the main sources of noise. On the other hand, since all modern processors, including graphic ones, are equipped with energy-saving functions, the heat dissipated by them under low loads is small. In this case, the fan or turbine of the cooling systems installed on them practically Continue reading

License Review Article

Before we talk about licenses, I would like to touch on the subject of licensing in order to clarify. So, licensing is most often designed to preserve the source code (source code) from encroachment. What is it? Literally, the computer code of a program in any programming language.

What advantages does it give? There are absolutely no ordinary users, but a programmer can easily determine by him the principle of the program’s work, be able to track all its actions, what is happening, why and for what. It’s like observing the construction of a house from the window of your apartment or working as an engineer at this construction site. You know the source code – you know all the secrets. Continue reading

Apple iPhone OS

Preamble: Recently, all sorts of mobile and, especially fashionable, cloud technologies have captured the attention of mankind. Desktops and laptops faded into the background, giving way to more compact and attractive toys for leisure and business. Our new friends not only know how to polyphony, show pictures and surf the Internet, but also become fashionable accessories that it’s a sin not to put on a cafe table next to a cup of tea, from time to time sliding the index finger on the inscription “Slide to unlock”. But the day is heading towards the evening, your electronic partner is tired and he has to go on a charge. Well, insert the USB tail where necessary … let it rest.

Guest article written by Maxim Mozaev specifically for Nevor.ru. Maxim is well versed in all kinds of glands and actively uses Apple products. I don’t use the products of the fruit company myself, so I had to invite a competent person who is in the topic to write this article. Continue reading

Security in Firefox Browser
When working on the Internet, the highest priority should be to ensure the safety of users. Indeed, in the "global web" there is a huge number of fraudulent sites and…

...

The computer does not turn on: the problem is in the power supply
All PC malfunctions falling under the “computer does not turn on” category boil down to one single problem: it is impossible to download any of the known operating systems to…

...

Delete a banner using Kaspersky WindowsUnlocker
Today, the removal of ransomware viruses has become somewhat more complicated than before - many time-tested methods do not work. For example, now it’s unlikely that you can unblock a…

...

Creating BAT files
People who are familiar with the term batch file know that BAT files can significantly simplify life and save time if you can write and use them correctly. In this…

...