D-Link DIR-300 Setup
The DIR-300 router has been discontinued today and you can see on sale its more modern version - DIR-300NRU. The difference between them is small: slightly different interfaces (NRU cannot…

Continue reading →

Linux operating systems
Linux is not an operating system, but just its kernel. Everything that you are accustomed to see and understand as an OS (buttons, windows and panels) - in fact, it…

Continue reading →

Installing a cooler on a processor
Background to the experiment: CPU cooling (LGA775 socket) was provided by the CNPS7700-AICu cooling system. Intel Pentium D930 processor, was purchased in 2005. At that time, quite powerful and expensive.…

Continue reading →

the network

Bat files, examples

You can perform all the examples published below not only by creating and running a BAT file containing these commands, but also copying them directly to the command line.

To open the command line in the right place (in the folder with files, for example), you need to call the context menu (RMB) with the Shift key held down:

command line call

You can read about how to work with the command line in this article. We pass directly to the teams. Continue reading

A bit about CCTV systems

When it comes to business security, peace of mind for the life and health of relatives, it is necessary to carefully approach the choice of security system. Over the past year alone, more than 100 thousand surveillance cameras have been installed in Russia!

Depending on where the camera is located, video surveillance systems can be external, internal and hidden. In any case, such systems monitor the object using a video camera. Using one or more cameras, you can follow it from one or several points.

Today, digital or analog systems are used. The first system uses analog means to record or reproduce a signal. As a result, the signal that will be transmitted from the cameras to the video surveillance monitors is presented in the same Continue reading

How to calculate a person’s location by IP

Each computer has its own network card – IP, designed specifically for searching, receiving and transmitting information. The IP address on the PC can be local, dynamic, or static. The latter is fixed directly to the device and remains unchanged.

Dynamic is provided by providers: it changes every time you disconnect from the network and connect to it again. Local is designed to connect peripheral devices in one territory (this can be a home network, office or an entire enterprise), as well as to create local networks. Depending on what kind of IP a person is using, you can determine his exact location or the zone from which he goes to the Internet. Continue reading

Apple iPhone OS
Preamble: Recently, all sorts of mobile and, especially fashionable, cloud technologies have captured the attention of mankind. Desktops and laptops faded into the background, giving way to more compact and…

...

Overview of modern antiviruses
Of all the threats to the security of user information, viruses stand apart. These small malicious programs, if not handled carefully, can steal or destroy any data. But it turns…

...

SeaMonkey Web Browser Overview
Shrimp support is not as dynamic (in every way) as Firefox. But as it turned out, this has not only disadvantages, but also a number of advantages. I switched to…

...

How to improve the noise characteristics of the system unit of a personal computer
When using a home personal computer to watch movies, listen to music or browse the Internet, especially at night, the noise of the system unit becomes especially noticeable. Permanent noise…

...