Computer assembly, pitfalls
Assembling a computer, especially a new one, is a lottery game. A number of factors that are not dependent on the builder can lead to the fact that the computer…

Continue reading →

VPN Basic Concepts and Classification
The term VPN (Eng. "Virtual Private Network") refers to a group of technologies that provide a network connection, or the so-called logical network, functioning on top of some other network,…

Continue reading →

Present day viruses
There are a huge number of computer viruses in the world. To establish their exact number (along with all modifications and upgrades) no one is taken. Instead, it is customary…

Continue reading →

received responses back.

Apple iPhone OS

Preamble: Recently, all sorts of mobile and, especially fashionable, cloud technologies have captured the attention of mankind. Desktops and laptops faded into the background, giving way to more compact and attractive toys for leisure and business. Our new friends not only know how to polyphony, show pictures and surf the Internet, but also become fashionable accessories that it’s a sin not to put on a cafe table next to a cup of tea, from time to time sliding the index finger on the inscription “Slide to unlock”. But the day is heading towards the evening, your electronic partner is tired and he has to go on a charge. Well, insert the USB tail where necessary … let it rest.

Guest article written by Maxim Mozaev specifically for Nevor.ru. Maxim is well versed in all kinds of glands and actively uses Apple products. I don’t use the products of the fruit company myself, so I had to invite a competent person who is in the topic to write this article. Continue reading

Bat files, examples

You can perform all the examples published below not only by creating and running a BAT file containing these commands, but also copying them directly to the command line.

To open the command line in the right place (in the folder with files, for example), you need to call the context menu (RMB) with the Shift key held down:

command line call

You can read about how to work with the command line in this article. We pass directly to the teams. Continue reading

Installing a cooler on a processor

Background to the experiment: CPU cooling (LGA775 socket) was provided by the CNPS7700-AICu cooling system. Intel Pentium D930 processor, was purchased in 2005. At that time, quite powerful and expensive. Therefore, I did not save on cooling. Bought a Zalman CNPS7700-AICu. For four years he regularly performed the task assigned to him. There are no complaints about cooling the processor now, but it has become pretty noisy.

Therefore, I decided to send the old man to retire and started repairs. It is repair, because replacement is laziness and squandering, at least in this situation. In place of the noisy fan, I decided to put Floston, Continue reading

Destination of proxies and NAT
A proxy server is the link between users and the Internet. Proxy server - a server that is constantly on the Web, transmitting all requests from the user computer to…

...

How to calculate a person’s location by IP
Each computer has its own network card - IP, designed specifically for searching, receiving and transmitting information. The IP address on the PC can be local, dynamic, or static. The…

...

Why you should never use a free VPN
Today virtual networks are very popular for solving personal security issues on the Internet - VPN. More and more people use them to circumvent network censorship in countries where there…

...

Local Area Networks and the Internet
When a local area network is connected to the global Internet, one of the PCs, called a server, becomes a kind of conductor and connects to the Internet using a…

...