Personal Data Security
What is personal information, and why does the state develop entire laws designed to protect such data? Imagine that you are making an order online. In the process of forming…

Continue reading →

Computer and vision
This article will focus on the effect of the computer on vision. Initially, the article was focused on CRT-monitors (tube), which could seriously impair vision with regular work on the…

Continue reading →

WiFi router - what is it and how to choose it correctly
Nowadays it is already difficult to meet a person who does not use a computer and does not have his home. Often people buy several computers, many also have laptops…

Continue reading →

their intellectual

1 2 3 6

Code optimization

In the process of writing code, it is impossible to detect all errors and correct them. Writing a code, especially in large volumes, is a monotonous thing, somewhat tedious and often repeated, so the eye becomes blurry. Search and correction of errors is for me personally a separate finishing procedure. In addition to obvious errors, illogical sections of code often pop up, which also have to be rewritten, simplified, and eliminated.

In addition to fixing errors and other shortcomings, you need to take care of optimizing content for search engines. Search engines impose certain requirements on websites, which only multiply every year, and if you have not decided to deliberately close the site from indexing, you should adhere to these requirements. Continue reading

Silent installation of applications (silent install)

Silent installation is such a process in which you sit quietly and look at the screen where the software installation process takes place without your participation, provided that it is generally visible. At the same time, the installer does not bother you with questions like Do you agree with the license agreement ?. Installation options are used by default. those. those that the installer offers when installing the software in the usual way.

The disadvantages of a silent installation include all kinds of panels in browsers and E-Bay tags on the desktop, since most of these bonuses are included in the installation by default. But this is rather an exception, although not rare. Read more about silent installation in this article. Continue reading

Bat files, examples

You can perform all the examples published below not only by creating and running a BAT file containing these commands, but also copying them directly to the command line.

To open the command line in the right place (in the folder with files, for example), you need to call the context menu (RMB) with the Shift key held down:

command line call

You can read about how to work with the command line in this article. We pass directly to the teams. Continue reading

1 2 3 6
How to protect your password from hacking
Today, passwords play a significant role in human life. Everywhere on the Internet, on every site, each account must have its own password in order for the user to gain…

...

Computer assembly, pitfalls
Assembling a computer, especially a new one, is a lottery game. A number of factors that are not dependent on the builder can lead to the fact that the computer…

...

Child Safety Online
Many users, even the most experienced, sometimes do not suspect that having protected themselves, they forget about their own children. They forget, especially when creating different accounts in the OS…

...

Delete a banner using Kaspersky WindowsUnlocker
Today, the removal of ransomware viruses has become somewhat more complicated than before - many time-tested methods do not work. For example, now it’s unlikely that you can unblock a…

...