Personal Data Security
What is personal information, and why does the state develop entire laws designed to protect such data? Imagine that you are making an order online. In the process of forming…

Continue reading →

Freemake
Computer assembly, pitfalls
Assembling a computer, especially a new one, is a lottery game. A number of factors that are not dependent on the builder can lead to the fact that the computer…

Continue reading →

Code optimization
In the process of writing code, it is impossible to detect all errors and correct them. Writing a code, especially in large volumes, is a monotonous thing, somewhat tedious and…

Continue reading →

Cleaning a computer

1 2 3 7

Online Programs

With the development of the Internet, cloud services and various online software are becoming more widespread. Some of the services are paid, but mostly services at such sites are provided for free. In my daily work I myself use a few about a dozen of these services.

Often, in terms of quality of work, they are not inferior to similar software installed on the computer. And since the Internet is firmly entrenched in everyday life and in the minds – the sooner the more programs were installed on a PC, the more it could do. Today, a suddenly broken Internet makes a PC virtually useless. The sense of installing unnecessary software in the system is less and less, and using online more and more. Today, most programs replace bookmarks in an Internet browser. Continue reading

License Review Article

Before we talk about licenses, I would like to touch on the subject of licensing in order to clarify. So, licensing is most often designed to preserve the source code (source code) from encroachment. What is it? Literally, the computer code of a program in any programming language.

What advantages does it give? There are absolutely no ordinary users, but a programmer can easily determine by him the principle of the program’s work, be able to track all its actions, what is happening, why and for what. It’s like observing the construction of a house from the window of your apartment or working as an engineer at this construction site. You know the source code – you know all the secrets. Continue reading

Removing SMS viruses

Recently, viruses that require sending SMS have become a very popular and profitable type of money withdrawal from cybercriminals. As a result of this, a lot of varieties of SMS viruses have appeared. There are not only viruses that require SMS for viewing porn sites, but also disguise for installing and updating programs, locking the system due to unlicensed use, and so on and so forth. The whole variety of varieties in the form of screenshots can be observed here, for example.

ransomware sms virus

Another problem is that an infected user, going to a friend to search the Internet for a solution to his problem, stumbles across the network to Continue reading

1 2 3 7
WiFi router - what is it and how to choose it correctly
Nowadays it is already difficult to meet a person who does not use a computer and does not have his home. Often people buy several computers, many also have laptops…

...

A bit about CCTV systems
When it comes to business security, peace of mind for the life and health of relatives, it is necessary to carefully approach the choice of security system. Over the past…

...

Mozilla Firefox Web Browser Overview
For more than 10 years I have been using the "Firefox" browser in my daily work on my PC and have gained a decent experience, which I hasten to share.…

...

Silent installation of applications (silent install)
Silent installation is such a process in which you sit quietly and look at the screen where the software installation process takes place without your participation, provided that it is…

...