E-Wallet Protection
When comparing the degree of protection of client programs of payment systems Yandex.Money and Webmoney, it turned out that the latter offers more reliable means of protecting client data. However,…

Continue reading →

Cleaning your computer from dust
The topic Cleaning a computer (judging by queries in a search engine) from the point of view of the user for the most part involves cleaning the garbage of the…

Continue reading →

VPN Basic Concepts and Classification
The term VPN (Eng. "Virtual Private Network") refers to a group of technologies that provide a network connection, or the so-called logical network, functioning on top of some other network,…

Continue reading →

participating in

Online Programs

With the development of the Internet, cloud services and various online software are becoming more widespread. Some of the services are paid, but mostly services at such sites are provided for free. In my daily work I myself use a few about a dozen of these services.

Often, in terms of quality of work, they are not inferior to similar software installed on the computer. And since the Internet is firmly entrenched in everyday life and in the minds – the sooner the more programs were installed on a PC, the more it could do. Today, a suddenly broken Internet makes a PC virtually useless. The sense of installing unnecessary software in the system is less and less, and using online more and more. Today, most programs replace bookmarks in an Internet browser. Continue reading

The difference between Windows and Linux

A couple of years ago in one forum I, participating in one heated debate on the topic of whose swamp is better, published a post that will reveal the topic of this article. I quote it below:

A small digression about Windows and Linux. Here you understand what’s the matter: Windows is a combination of the core of the system, as well as utility programs and scripts that perform certain operations and tasks. On this OS, you do not have the right to modify or delete scripts and system software …

When you, for example, change the cursor on Windows, the work on changing the cursor is executed by a Continue reading

E-Wallet Protection
When comparing the degree of protection of client programs of payment systems Yandex.Money and Webmoney, it turned out that the latter offers more reliable means of protecting client data. However,…

...

Cleaning your computer from dust
The topic Cleaning a computer (judging by queries in a search engine) from the point of view of the user for the most part involves cleaning the garbage of the…

...

How to protect your password from hacking
Today, passwords play a significant role in human life. Everywhere on the Internet, on every site, each account must have its own password in order for the user to gain…

...

Local Area Networks and the Internet
When a local area network is connected to the global Internet, one of the PCs, called a server, becomes a kind of conductor and connects to the Internet using a…

...