Capacitor Replacement
In the element base of the computer (and not only) there is one bottleneck - electrolytic capacitors. They contain electrolyte, electrolyte is a liquid. Therefore, heating such a capacitor leads…

Continue reading →

Code optimization
In the process of writing code, it is impossible to detect all errors and correct them. Writing a code, especially in large volumes, is a monotonous thing, somewhat tedious and…

Continue reading →

Personal Data Security
What is personal information, and why does the state develop entire laws designed to protect such data? Imagine that you are making an order online. In the process of forming…

Continue reading →

replacing capacitors

Bat files, examples

You can perform all the examples published below not only by creating and running a BAT file containing these commands, but also copying them directly to the command line.

To open the command line in the right place (in the folder with files, for example), you need to call the context menu (RMB) with the Shift key held down:

command line call

You can read about how to work with the command line in this article. We pass directly to the teams. Continue reading

Capacitor Replacement

In the element base of the computer (and not only) there is one bottleneck – electrolytic capacitors. They contain electrolyte, electrolyte is a liquid. Therefore, heating such a capacitor leads to its failure, as the electrolyte evaporates. And heating in the system unit is a regular thing.

Therefore, replacing capacitors is a matter of time. More than half of the failures of motherboards of the middle and lower price category are caused by dried or swollen capacitors. Even more often, for this reason, computer power supplies break down.

swollen capacitors Continue reading

Destination of proxies and NAT
A proxy server is the link between users and the Internet. Proxy server - a server that is constantly on the Web, transmitting all requests from the user computer to…

...

Overview of modern antiviruses
Of all the threats to the security of user information, viruses stand apart. These small malicious programs, if not handled carefully, can steal or destroy any data. But it turns…

...

Work on the Windows command line
The most common startup recommendations are: Start, Run, cmd. There is a Run item in the start menu. He runs a program that allows you to transfer single commands to the…

...

Why does the computer not see the USB flash drive? 8 reasons
Sometimes at the most inopportune moment, when it is urgent to remove information from a USB flash drive to a PC, the computer refuses to see the new device. It…

...