Reading books on a computer. How to read books on a computer?
I welcome all fans to read interesting and useful books, as well as those who are just interested in how you can read books on a computer. In the past…

Continue reading →

Online Programs
With the development of the Internet, cloud services and various online software are becoming more widespread. Some of the services are paid, but mostly services at such sites are provided…

Continue reading →

Silent installation of applications (silent install)
Silent installation is such a process in which you sit quietly and look at the screen where the software installation process takes place without your participation, provided that it is…

Continue reading →

process of forming

Linux operating systems

Linux is not an operating system, but just its kernel. Everything that you are accustomed to see and understand as an OS (buttons, windows and panels) – in fact, it is not. What you see is the GUI (Graphical user interface), that is, the graphical user interface, also called the graphical environment or graphical shell. GUI is a program designed to simplify the life of the user so that he does not suffer from the console. In fact, any OS looks like a console, that is, like the good old DOS.

The types of operating systems built on the Linux kernel vary widely both in providing a working environment and in the set of applications available in the OS. This is partly because some programs support only some GUIs or depend on other programs that are not in the system. A quick overview of the differences Continue reading

Apple iPhone OS

Preamble: Recently, all sorts of mobile and, especially fashionable, cloud technologies have captured the attention of mankind. Desktops and laptops faded into the background, giving way to more compact and attractive toys for leisure and business. Our new friends not only know how to polyphony, show pictures and surf the Internet, but also become fashionable accessories that it’s a sin not to put on a cafe table next to a cup of tea, from time to time sliding the index finger on the inscription “Slide to unlock”. But the day is heading towards the evening, your electronic partner is tired and he has to go on a charge. Well, insert the USB tail where necessary … let it rest.

Guest article written by Maxim Mozaev specifically for Nevor.ru. Maxim is well versed in all kinds of glands and actively uses Apple products. I don’t use the products of the fruit company myself, so I had to invite a competent person who is in the topic to write this article. Continue reading

Internet speed check (monthly statistics)

Checking the speed of the Internet is a fairly simple task if a single measurement is required. There are a ton of online tests on the Internet for this. But if the task is to measure the speed of the Internet connection within a month with a frequency of once per hour, in order to evaluate the quality of the service and use this data as an argument when communicating with the service provider, the task is somewhat more complicated.

About how I got out of this situation and received summary data for a month (the period and frequency can be any), read the article.

Checking the speed of the Internet should have been carried out constantly with equal frequency. Therefore, the use of a working computer was not suitable for this purpose, otherwise it would have to be kept on all the Continue reading

Destination of proxies and NAT
A proxy server is the link between users and the Internet. Proxy server - a server that is constantly on the Web, transmitting all requests from the user computer to…

...

Overview of modern antiviruses
Of all the threats to the security of user information, viruses stand apart. These small malicious programs, if not handled carefully, can steal or destroy any data. But it turns…

...

Destination of proxies and NAT
A proxy server is the link between users and the Internet. Proxy server - a server that is constantly on the Web, transmitting all requests from the user computer to…

...

Present day viruses
There are a huge number of computer viruses in the world. To establish their exact number (along with all modifications and upgrades) no one is taken. Instead, it is customary…

...