E-Wallet Protection
When comparing the degree of protection of client programs of payment systems Yandex.Money and Webmoney, it turned out that the latter offers more reliable means of protecting client data. However,…

Continue reading →

Delete a banner using Kaspersky WindowsUnlocker
Today, the removal of ransomware viruses has become somewhat more complicated than before - many time-tested methods do not work. For example, now it’s unlikely that you can unblock a…

Continue reading →

Overview of modern antiviruses
Of all the threats to the security of user information, viruses stand apart. These small malicious programs, if not handled carefully, can steal or destroy any data. But it turns…

Continue reading →

their intellectual

1 2 3 6

Code optimization

In the process of writing code, it is impossible to detect all errors and correct them. Writing a code, especially in large volumes, is a monotonous thing, somewhat tedious and often repeated, so the eye becomes blurry. Search and correction of errors is for me personally a separate finishing procedure. In addition to obvious errors, illogical sections of code often pop up, which also have to be rewritten, simplified, and eliminated.

In addition to fixing errors and other shortcomings, you need to take care of optimizing content for search engines. Search engines impose certain requirements on websites, which only multiply every year, and if you have not decided to deliberately close the site from indexing, you should adhere to these requirements. Continue reading

Silent installation of applications (silent install)

Silent installation is such a process in which you sit quietly and look at the screen where the software installation process takes place without your participation, provided that it is generally visible. At the same time, the installer does not bother you with questions like Do you agree with the license agreement ?. Installation options are used by default. those. those that the installer offers when installing the software in the usual way.

The disadvantages of a silent installation include all kinds of panels in browsers and E-Bay tags on the desktop, since most of these bonuses are included in the installation by default. But this is rather an exception, although not rare. Read more about silent installation in this article. Continue reading

Bat files, examples

You can perform all the examples published below not only by creating and running a BAT file containing these commands, but also copying them directly to the command line.

To open the command line in the right place (in the folder with files, for example), you need to call the context menu (RMB) with the Shift key held down:

command line call

You can read about how to work with the command line in this article. We pass directly to the teams. Continue reading

1 2 3 6
Removing SMS viruses
Recently, viruses that require sending SMS have become a very popular and profitable type of money withdrawal from cybercriminals. As a result of this, a lot of varieties of SMS…

...

E-Wallet Protection
When comparing the degree of protection of client programs of payment systems Yandex.Money and Webmoney, it turned out that the latter offers more reliable means of protecting client data. However,…

...

Code optimization
In the process of writing code, it is impossible to detect all errors and correct them. Writing a code, especially in large volumes, is a monotonous thing, somewhat tedious and…

...

Installing a cooler on a processor
Background to the experiment: CPU cooling (LGA775 socket) was provided by the CNPS7700-AICu cooling system. Intel Pentium D930 processor, was purchased in 2005. At that time, quite powerful and expensive.…

...