Installing a cooler on a processor
Background to the experiment: CPU cooling (LGA775 socket) was provided by the CNPS7700-AICu cooling system. Intel Pentium D930 processor, was purchased in 2005. At that time, quite powerful and expensive.…

Continue reading →

VPN Basic Concepts and Classification
The term VPN (Eng. "Virtual Private Network") refers to a group of technologies that provide a network connection, or the so-called logical network, functioning on top of some other network,…

Continue reading →

How to choose a service on the Internet
Nowadays, electronic gadgets are firmly in use, and with them the Internet. There, according to the trend of the time, the service sector is also moving. Even in my small…

Continue reading →

separate workstation

How long can I sit at a computer?

Computing has become literally a part of life. Computers and tablets – it’s impossible to imagine a single day when only a couple of minutes were spent in front of the screen. Usually time is calculated in hours.

Everyone knows that from long work at the computer there are various health problems. The article will not affect the “troubles” of the skeleton, muscle tissue, and the gastrointestinal tract. Let us dwell on the field of vision.

Basic rules for working at a computer and how much to sit at a computer?
Safety regulations approved long ago and almost unchanged to this day clearly state: Continue reading

Computer assembly, pitfalls

Assembling a computer, especially a new one, is a lottery game. A number of factors that are not dependent on the builder can lead to the fact that the computer will not work stably or even refuse to start. Factory defects, violation of storage (transportation) conditions, a crude version of devices and drivers for them, as well as the totality of all of the above in different proportions.

Add inattention or negligence when assembling a computer as a possible aggravating factor. What do we have as a result? Assembling a computer is a very complicated and responsible event that requires attention, caution, and the presence of certain knowledge and experience. So it’s worth it, so to speak, to Continue reading

Overview of modern antiviruses

Of all the threats to the security of user information, viruses stand apart. These small malicious programs, if not handled carefully, can steal or destroy any data. But it turns out to be the easiest to defend against them. The Internet is teeming with dozens of different antivirus programs that offer us a quick and easy solution to the problem. But how good are these programs? How to make a specific choice?

Laboratory Research – Clean Water Cheating
Very often you can find on the Internet studies of various laboratories or some scientists there, which talk about the advantages of various antiviruses over others. Do not pay attention to this bluff, all antiviruses have disadvantages and advantages, and Continue reading

Online Programs
With the development of the Internet, cloud services and various online software are becoming more widespread. Some of the services are paid, but mostly services at such sites are provided…

...

The difference between Windows and Linux
A couple of years ago in one forum I, participating in one heated debate on the topic of whose swamp is better, published a post that will reveal the topic…

...

Security in Firefox Browser
When working on the Internet, the highest priority should be to ensure the safety of users. Indeed, in the "global web" there is a huge number of fraudulent sites and…

...

What is a firewall and why is it needed?
We will not go into little things like translating words, occupying them some part of the article. Just point out that a firewall (from the English - fire wall), or…

...