SeaMonkey Web Browser Overview
Shrimp support is not as dynamic (in every way) as Firefox. But as it turned out, this has not only disadvantages, but also a number of advantages. I switched to…

Continue reading →

Internet speed check (monthly statistics)
Checking the speed of the Internet is a fairly simple task if a single measurement is required. There are a ton of online tests on the Internet for this. But…

Continue reading →

Forum Communication
The Internet has become an integral part of life. Since the Internet is an American invention, many terms have no direct analogues in the Russian language. For example, cookie. In…

Continue reading →

becoming more

Home network: Ethernet or Wi-Fi

If you do not go into the jungle of network technology and do not utter such terrible words as a router, a switch, a hub and a routing table, the task boils down to the following: connect two computers in the same house. You can do this either by extending the network cable from one computer to another (99% of computers and laptops are equipped with an RJ-45 port), or by installing Wi-Fi adapters on computers (most laptops and netbooks have a built-in Wi-Fi adapter). Let’s look at the advantages and disadvantages of each method.
Price. The option with a network cable seems cheaper – you have to spend only on a cable, network adapters are already installed. But laying the cable around the house (especially if you have to drill holes in Continue reading

How to improve the noise characteristics of the system unit of a personal computer

When using a home personal computer to watch movies, listen to music or browse the Internet, especially at night, the noise of the system unit becomes especially noticeable. Permanent noise sources are active elements of cooling systems (ventilation) and hard disk drives.
Usually, several fans are installed in the system unit: on the processor heatsink, on the video card (if there is an active cooling system), for blowing the hard drive, for housing ventilation, in the power supply.

The most energy-intensive components of a personal computer are the central processor and video card. Accordingly, they have the most powerful cooling systems, which are the main sources of noise. On the other hand, since all modern processors, including graphic ones, are equipped with energy-saving functions, the heat dissipated by them under low loads is small. In this case, the fan or turbine of the cooling systems installed on them practically Continue reading

Why you should never use a free VPN

Today virtual networks are very popular for solving personal security issues on the Internet – VPN. More and more people use them to circumvent network censorship in countries where there are severe restrictions, for example, in China. They try to buy a VPN program for their own safety. Thus, you can avoid viruses and have a great guard to protect your bank account by going to the Internet through public wi-fi. Trusting your own computer with high-quality services with reliable VPN servers, you use technologies that connect Why you should never use a free VPNtogether and use complex encryption for your data.

The danger of a free VPN
The market for these products is booming and today you can find more than 300 VPNs. Choosing among the servers on the market, I want to get the best. An attentive user will definitely notice that in addition to Continue reading

Computer and vision
This article will focus on the effect of the computer on vision. Initially, the article was focused on CRT-monitors (tube), which could seriously impair vision with regular work on the…

...

The difference between Windows and Linux
A couple of years ago in one forum I, participating in one heated debate on the topic of whose swamp is better, published a post that will reveal the topic…

...

Creating BAT files
People who are familiar with the term batch file know that BAT files can significantly simplify life and save time if you can write and use them correctly. In this…

...

Personal Data Security
What is personal information, and why does the state develop entire laws designed to protect such data? Imagine that you are making an order online. In the process of forming…

...