File encryption
Encryption is the most common and essentially the simplest way to protect any information. After all, it seems that it could be simpler to take the text, take some algorithm…

Continue reading →

Online Programs
With the development of the Internet, cloud services and various online software are becoming more widespread. Some of the services are paid, but mostly services at such sites are provided…

Continue reading →

Why you should never use a free VPN
Today virtual networks are very popular for solving personal security issues on the Internet - VPN. More and more people use them to circumvent network censorship in countries where there…

Continue reading →

received responses back.

Apple iPhone OS

Preamble: Recently, all sorts of mobile and, especially fashionable, cloud technologies have captured the attention of mankind. Desktops and laptops faded into the background, giving way to more compact and attractive toys for leisure and business. Our new friends not only know how to polyphony, show pictures and surf the Internet, but also become fashionable accessories that it’s a sin not to put on a cafe table next to a cup of tea, from time to time sliding the index finger on the inscription “Slide to unlock”. But the day is heading towards the evening, your electronic partner is tired and he has to go on a charge. Well, insert the USB tail where necessary … let it rest.

Guest article written by Maxim Mozaev specifically for Nevor.ru. Maxim is well versed in all kinds of glands and actively uses Apple products. I don’t use the products of the fruit company myself, so I had to invite a competent person who is in the topic to write this article. Continue reading

Bat files, examples

You can perform all the examples published below not only by creating and running a BAT file containing these commands, but also copying them directly to the command line.

To open the command line in the right place (in the folder with files, for example), you need to call the context menu (RMB) with the Shift key held down:

command line call

You can read about how to work with the command line in this article. We pass directly to the teams. Continue reading

Installing a cooler on a processor

Background to the experiment: CPU cooling (LGA775 socket) was provided by the CNPS7700-AICu cooling system. Intel Pentium D930 processor, was purchased in 2005. At that time, quite powerful and expensive. Therefore, I did not save on cooling. Bought a Zalman CNPS7700-AICu. For four years he regularly performed the task assigned to him. There are no complaints about cooling the processor now, but it has become pretty noisy.

Therefore, I decided to send the old man to retire and started repairs. It is repair, because replacement is laziness and squandering, at least in this situation. In place of the noisy fan, I decided to put Floston, Continue reading

A bit about CCTV systems
When it comes to business security, peace of mind for the life and health of relatives, it is necessary to carefully approach the choice of security system. Over the past…

...

How to protect your password from hacking
Today, passwords play a significant role in human life. Everywhere on the Internet, on every site, each account must have its own password in order for the user to gain…

...

Apple iPhone OS
Preamble: Recently, all sorts of mobile and, especially fashionable, cloud technologies have captured the attention of mankind. Desktops and laptops faded into the background, giving way to more compact and…

...

File encryption
Encryption is the most common and essentially the simplest way to protect any information. After all, it seems that it could be simpler to take the text, take some algorithm…

...