Present day viruses
There are a huge number of computer viruses in the world. To establish their exact number (along with all modifications and upgrades) no one is taken. Instead, it is customary…

Continue reading →

E-Wallet Protection
When comparing the degree of protection of client programs of payment systems Yandex.Money and Webmoney, it turned out that the latter offers more reliable means of protecting client data. However,…

Continue reading →

SeaMonkey Web Browser Overview
Shrimp support is not as dynamic (in every way) as Firefox. But as it turned out, this has not only disadvantages, but also a number of advantages. I switched to…

Continue reading →

replacing capacitors

Bat files, examples

You can perform all the examples published below not only by creating and running a BAT file containing these commands, but also copying them directly to the command line.

To open the command line in the right place (in the folder with files, for example), you need to call the context menu (RMB) with the Shift key held down:

command line call

You can read about how to work with the command line in this article. We pass directly to the teams. Continue reading

Capacitor Replacement

In the element base of the computer (and not only) there is one bottleneck – electrolytic capacitors. They contain electrolyte, electrolyte is a liquid. Therefore, heating such a capacitor leads to its failure, as the electrolyte evaporates. And heating in the system unit is a regular thing.

Therefore, replacing capacitors is a matter of time. More than half of the failures of motherboards of the middle and lower price category are caused by dried or swollen capacitors. Even more often, for this reason, computer power supplies break down.

swollen capacitors Continue reading

Home network: Ethernet or Wi-Fi
If you do not go into the jungle of network technology and do not utter such terrible words as a router, a switch, a hub and a routing table, the…

...

WiFi router - what is it and how to choose it correctly
Nowadays it is already difficult to meet a person who does not use a computer and does not have his home. Often people buy several computers, many also have laptops…

...

How to protect your password from hacking
Today, passwords play a significant role in human life. Everywhere on the Internet, on every site, each account must have its own password in order for the user to gain…

...

How to calculate a person’s location by IP
Each computer has its own network card - IP, designed specifically for searching, receiving and transmitting information. The IP address on the PC can be local, dynamic, or static. The…

...