Destination of proxies and NAT
A proxy server is the link between users and the Internet. Proxy server - a server that is constantly on the Web, transmitting all requests from the user computer to…

Continue reading →

Home network: Ethernet or Wi-Fi
If you do not go into the jungle of network technology and do not utter such terrible words as a router, a switch, a hub and a routing table, the…

Continue reading →

Silent installation of applications (silent install)
Silent installation is such a process in which you sit quietly and look at the screen where the software installation process takes place without your participation, provided that it is…

Continue reading →

which responds

Code optimization

In the process of writing code, it is impossible to detect all errors and correct them. Writing a code, especially in large volumes, is a monotonous thing, somewhat tedious and often repeated, so the eye becomes blurry. Search and correction of errors is for me personally a separate finishing procedure. In addition to obvious errors, illogical sections of code often pop up, which also have to be rewritten, simplified, and eliminated.

In addition to fixing errors and other shortcomings, you need to take care of optimizing content for search engines. Search engines impose certain requirements on websites, which only multiply every year, and if you have not decided to deliberately close the site from indexing, you should adhere to these requirements. Continue reading

Linux operating systems

Linux is not an operating system, but just its kernel. Everything that you are accustomed to see and understand as an OS (buttons, windows and panels) – in fact, it is not. What you see is the GUI (Graphical user interface), that is, the graphical user interface, also called the graphical environment or graphical shell. GUI is a program designed to simplify the life of the user so that he does not suffer from the console. In fact, any OS looks like a console, that is, like the good old DOS.

The types of operating systems built on the Linux kernel vary widely both in providing a working environment and in the set of applications available in the OS. This is partly because some programs support only some GUIs or depend on other programs that are not in the system. A quick overview of the differences Continue reading

Silent installation of applications (silent install)

Silent installation is such a process in which you sit quietly and look at the screen where the software installation process takes place without your participation, provided that it is generally visible. At the same time, the installer does not bother you with questions like Do you agree with the license agreement ?. Installation options are used by default. those. those that the installer offers when installing the software in the usual way.

The disadvantages of a silent installation include all kinds of panels in browsers and E-Bay tags on the desktop, since most of these bonuses are included in the installation by default. But this is rather an exception, although not rare. Read more about silent installation in this article. Continue reading

Personal Data Security
What is personal information, and why does the state develop entire laws designed to protect such data? Imagine that you are making an order online. In the process of forming…

...

How to protect your password from hacking
Today, passwords play a significant role in human life. Everywhere on the Internet, on every site, each account must have its own password in order for the user to gain…

...

Bat files, examples
You can perform all the examples published below not only by creating and running a BAT file containing these commands, but also copying them directly to the command line. To…

...

Code optimization
In the process of writing code, it is impossible to detect all errors and correct them. Writing a code, especially in large volumes, is a monotonous thing, somewhat tedious and…

...