Reading books on a computer. How to read books on a computer?
I welcome all fans to read interesting and useful books, as well as those who are just interested in how you can read books on a computer. In the past…

Continue reading →

Work on the Windows command line
The most common startup recommendations are: Start, Run, cmd. There is a Run item in the start menu. He runs a program that allows you to transfer single commands to the…

Continue reading →

File encryption
Encryption is the most common and essentially the simplest way to protect any information. After all, it seems that it could be simpler to take the text, take some algorithm…

Continue reading →

especially fashionable

Home network: Ethernet or Wi-Fi

If you do not go into the jungle of network technology and do not utter such terrible words as a router, a switch, a hub and a routing table, the task boils down to the following: connect two computers in the same house. You can do this either by extending the network cable from one computer to another (99% of computers and laptops are equipped with an RJ-45 port), or by installing Wi-Fi adapters on computers (most laptops and netbooks have a built-in Wi-Fi adapter). Let’s look at the advantages and disadvantages of each method.
Price. The option with a network cable seems cheaper – you have to spend only on a cable, network adapters are already installed. But laying the cable around the house (especially if you have to drill holes in Continue reading

Apple iPhone OS

Preamble: Recently, all sorts of mobile and, especially fashionable, cloud technologies have captured the attention of mankind. Desktops and laptops faded into the background, giving way to more compact and attractive toys for leisure and business. Our new friends not only know how to polyphony, show pictures and surf the Internet, but also become fashionable accessories that it’s a sin not to put on a cafe table next to a cup of tea, from time to time sliding the index finger on the inscription “Slide to unlock”. But the day is heading towards the evening, your electronic partner is tired and he has to go on a charge. Well, insert the USB tail where necessary … let it rest.

Guest article written by Maxim Mozaev specifically for Nevor.ru. Maxim is well versed in all kinds of glands and actively uses Apple products. I don’t use the products of the fruit company myself, so I had to invite a competent person who is in the topic to write this article. Continue reading

Personal Data Security
What is personal information, and why does the state develop entire laws designed to protect such data? Imagine that you are making an order online. In the process of forming…

...

Installing a cooler on a processor
Background to the experiment: CPU cooling (LGA775 socket) was provided by the CNPS7700-AICu cooling system. Intel Pentium D930 processor, was purchased in 2005. At that time, quite powerful and expensive.…

...

Mozilla Firefox Web Browser Overview
For more than 10 years I have been using the "Firefox" browser in my daily work on my PC and have gained a decent experience, which I hasten to share.…

...

Silent installation of applications (silent install)
Silent installation is such a process in which you sit quietly and look at the screen where the software installation process takes place without your participation, provided that it is…

...