Silent installation of applications (silent install)
Silent installation is such a process in which you sit quietly and look at the screen where the software installation process takes place without your participation, provided that it is…

Continue reading →

Present day viruses
There are a huge number of computer viruses in the world. To establish their exact number (along with all modifications and upgrades) no one is taken. Instead, it is customary…

Continue reading →

Modernization of old PCs
I note right away that the article has been for several years and it was left on the site for a change. It is clear that now on the market…

Continue reading →

significant role

Computer assembly, pitfalls

Assembling a computer, especially a new one, is a lottery game. A number of factors that are not dependent on the builder can lead to the fact that the computer will not work stably or even refuse to start. Factory defects, violation of storage (transportation) conditions, a crude version of devices and drivers for them, as well as the totality of all of the above in different proportions.

Add inattention or negligence when assembling a computer as a possible aggravating factor. What do we have as a result? Assembling a computer is a very complicated and responsible event that requires attention, caution, and the presence of certain knowledge and experience. So it’s worth it, so to speak, to Continue reading

WiFi router – what is it and how to choose it correctly

Nowadays it is already difficult to meet a person who does not use a computer and does not have his home. Often people buy several computers, many also have laptops and smart phones – communicators.

A router or router is a network device that performs the function of forwarding data packets between network segments, in other words, the device helps to build a network between computers connected to it and, if possible, connect to the Internet. More modern routers can additionally perform a number of useful functions – for example, you can restrict access to potentially dangerous sites, enable a firewall, encrypt traffic, and so on.

What is a WiFi router? Continue reading

Overview of modern antiviruses

Of all the threats to the security of user information, viruses stand apart. These small malicious programs, if not handled carefully, can steal or destroy any data. But it turns out to be the easiest to defend against them. The Internet is teeming with dozens of different antivirus programs that offer us a quick and easy solution to the problem. But how good are these programs? How to make a specific choice?

Laboratory Research – Clean Water Cheating
Very often you can find on the Internet studies of various laboratories or some scientists there, which talk about the advantages of various antiviruses over others. Do not pay attention to this bluff, all antiviruses have disadvantages and advantages, and Continue reading

Silent installation of applications (silent install)
Silent installation is such a process in which you sit quietly and look at the screen where the software installation process takes place without your participation, provided that it is…

...

Why you should never use a free VPN
Today virtual networks are very popular for solving personal security issues on the Internet - VPN. More and more people use them to circumvent network censorship in countries where there…

...

Creating BAT files
People who are familiar with the term batch file know that BAT files can significantly simplify life and save time if you can write and use them correctly. In this…

...

How to calculate a person’s location by IP
Each computer has its own network card - IP, designed specifically for searching, receiving and transmitting information. The IP address on the PC can be local, dynamic, or static. The…

...