Destination of proxies and NAT
A proxy server is the link between users and the Internet. Proxy server - a server that is constantly on the Web, transmitting all requests from the user computer to…

Continue reading →

Bat files, examples
You can perform all the examples published below not only by creating and running a BAT file containing these commands, but also copying them directly to the command line. To…

Continue reading →

A bit about CCTV systems
When it comes to business security, peace of mind for the life and health of relatives, it is necessary to carefully approach the choice of security system. Over the past…

Continue reading →

the reasons why

How to choose a service on the Internet

Nowadays, electronic gadgets are firmly in use, and with them the Internet. There, according to the trend of the time, the service sector is also moving. Even in my small city with a population of about 100,000, I can’t say exactly where this company or company is located (and whether it is located at all). And will-not-will have to look for information on the Internet.

And here you can encounter the problem of the quality and reliability of information, find a company that really provides services for a long time, quality and established itself in the market, or you can stumble on incompetent specialists or an interlayer company that collects orders and sells them to other companies, or even all at swindlers. Continue reading

Silent installation of applications (silent install)
Silent installation is such a process in which you sit quietly and look at the screen where the software installation process takes place without your participation, provided that it is…

...

Why you should never use a free VPN
Today virtual networks are very popular for solving personal security issues on the Internet - VPN. More and more people use them to circumvent network censorship in countries where there…

...

Bat files, examples
You can perform all the examples published below not only by creating and running a BAT file containing these commands, but also copying them directly to the command line. To…

...

Why you should never use a free VPN
Today virtual networks are very popular for solving personal security issues on the Internet - VPN. More and more people use them to circumvent network censorship in countries where there…

...