Creating BAT files
People who are familiar with the term batch file know that BAT files can significantly simplify life and save time if you can write and use them correctly. In this…

Continue reading →

Overview of modern antiviruses
Of all the threats to the security of user information, viruses stand apart. These small malicious programs, if not handled carefully, can steal or destroy any data. But it turns…

Continue reading →

E-Wallet Protection
When comparing the degree of protection of client programs of payment systems Yandex.Money and Webmoney, it turned out that the latter offers more reliable means of protecting client data. However,…

Continue reading →

participating in

Online Programs

With the development of the Internet, cloud services and various online software are becoming more widespread. Some of the services are paid, but mostly services at such sites are provided for free. In my daily work I myself use a few about a dozen of these services.

Often, in terms of quality of work, they are not inferior to similar software installed on the computer. And since the Internet is firmly entrenched in everyday life and in the minds – the sooner the more programs were installed on a PC, the more it could do. Today, a suddenly broken Internet makes a PC virtually useless. The sense of installing unnecessary software in the system is less and less, and using online more and more. Today, most programs replace bookmarks in an Internet browser. Continue reading

The difference between Windows and Linux

A couple of years ago in one forum I, participating in one heated debate on the topic of whose swamp is better, published a post that will reveal the topic of this article. I quote it below:

A small digression about Windows and Linux. Here you understand what’s the matter: Windows is a combination of the core of the system, as well as utility programs and scripts that perform certain operations and tasks. On this OS, you do not have the right to modify or delete scripts and system software …

When you, for example, change the cursor on Windows, the work on changing the cursor is executed by a Continue reading

Bat files, examples
You can perform all the examples published below not only by creating and running a BAT file containing these commands, but also copying them directly to the command line. To…

...

Why you should never use a free VPN
Today virtual networks are very popular for solving personal security issues on the Internet - VPN. More and more people use them to circumvent network censorship in countries where there…

...

Local Area Networks and the Internet
When a local area network is connected to the global Internet, one of the PCs, called a server, becomes a kind of conductor and connects to the Internet using a…

...

Computer and vision
This article will focus on the effect of the computer on vision. Initially, the article was focused on CRT-monitors (tube), which could seriously impair vision with regular work on the…

...