Bat files, examples
You can perform all the examples published below not only by creating and running a BAT file containing these commands, but also copying them directly to the command line. To…

Continue reading →

E-Wallet Protection
When comparing the degree of protection of client programs of payment systems Yandex.Money and Webmoney, it turned out that the latter offers more reliable means of protecting client data. However,…

Continue reading →

Personal Data Security
What is personal information, and why does the state develop entire laws designed to protect such data? Imagine that you are making an order online. In the process of forming…

Continue reading →

received responses back.

Apple iPhone OS

Preamble: Recently, all sorts of mobile and, especially fashionable, cloud technologies have captured the attention of mankind. Desktops and laptops faded into the background, giving way to more compact and attractive toys for leisure and business. Our new friends not only know how to polyphony, show pictures and surf the Internet, but also become fashionable accessories that it’s a sin not to put on a cafe table next to a cup of tea, from time to time sliding the index finger on the inscription “Slide to unlock”. But the day is heading towards the evening, your electronic partner is tired and he has to go on a charge. Well, insert the USB tail where necessary … let it rest.

Guest article written by Maxim Mozaev specifically for Nevor.ru. Maxim is well versed in all kinds of glands and actively uses Apple products. I don’t use the products of the fruit company myself, so I had to invite a competent person who is in the topic to write this article. Continue reading

Bat files, examples

You can perform all the examples published below not only by creating and running a BAT file containing these commands, but also copying them directly to the command line.

To open the command line in the right place (in the folder with files, for example), you need to call the context menu (RMB) with the Shift key held down:

command line call

You can read about how to work with the command line in this article. We pass directly to the teams. Continue reading

Installing a cooler on a processor

Background to the experiment: CPU cooling (LGA775 socket) was provided by the CNPS7700-AICu cooling system. Intel Pentium D930 processor, was purchased in 2005. At that time, quite powerful and expensive. Therefore, I did not save on cooling. Bought a Zalman CNPS7700-AICu. For four years he regularly performed the task assigned to him. There are no complaints about cooling the processor now, but it has become pretty noisy.

Therefore, I decided to send the old man to retire and started repairs. It is repair, because replacement is laziness and squandering, at least in this situation. In place of the noisy fan, I decided to put Floston, Continue reading

Present day viruses
There are a huge number of computer viruses in the world. To establish their exact number (along with all modifications and upgrades) no one is taken. Instead, it is customary…

...

Home network: Ethernet or Wi-Fi
If you do not go into the jungle of network technology and do not utter such terrible words as a router, a switch, a hub and a routing table, the…

...

Present day viruses
There are a huge number of computer viruses in the world. To establish their exact number (along with all modifications and upgrades) no one is taken. Instead, it is customary…

...

How to calculate a person’s location by IP
Each computer has its own network card - IP, designed specifically for searching, receiving and transmitting information. The IP address on the PC can be local, dynamic, or static. The…

...