VPN Basic Concepts and Classification
The term VPN (Eng. "Virtual Private Network") refers to a group of technologies that provide a network connection, or the so-called logical network, functioning on top of some other network,…

Continue reading →

Why does the computer not see the USB flash drive? 8 reasons
Sometimes at the most inopportune moment, when it is urgent to remove information from a USB flash drive to a PC, the computer refuses to see the new device. It…

Continue reading →

Security in Firefox Browser
When working on the Internet, the highest priority should be to ensure the safety of users. Indeed, in the "global web" there is a huge number of fraudulent sites and…

Continue reading →

their intellectual

1 2 3 6

Code optimization

In the process of writing code, it is impossible to detect all errors and correct them. Writing a code, especially in large volumes, is a monotonous thing, somewhat tedious and often repeated, so the eye becomes blurry. Search and correction of errors is for me personally a separate finishing procedure. In addition to obvious errors, illogical sections of code often pop up, which also have to be rewritten, simplified, and eliminated.

In addition to fixing errors and other shortcomings, you need to take care of optimizing content for search engines. Search engines impose certain requirements on websites, which only multiply every year, and if you have not decided to deliberately close the site from indexing, you should adhere to these requirements. Continue reading

Silent installation of applications (silent install)

Silent installation is such a process in which you sit quietly and look at the screen where the software installation process takes place without your participation, provided that it is generally visible. At the same time, the installer does not bother you with questions like Do you agree with the license agreement ?. Installation options are used by default. those. those that the installer offers when installing the software in the usual way.

The disadvantages of a silent installation include all kinds of panels in browsers and E-Bay tags on the desktop, since most of these bonuses are included in the installation by default. But this is rather an exception, although not rare. Read more about silent installation in this article. Continue reading

Bat files, examples

You can perform all the examples published below not only by creating and running a BAT file containing these commands, but also copying them directly to the command line.

To open the command line in the right place (in the folder with files, for example), you need to call the context menu (RMB) with the Shift key held down:

command line call

You can read about how to work with the command line in this article. We pass directly to the teams. Continue reading

1 2 3 6
Delete a banner using Kaspersky WindowsUnlocker
Today, the removal of ransomware viruses has become somewhat more complicated than before - many time-tested methods do not work. For example, now it’s unlikely that you can unblock a…

...

How to calculate a person’s location by IP
Each computer has its own network card - IP, designed specifically for searching, receiving and transmitting information. The IP address on the PC can be local, dynamic, or static. The…

...

WiFi router - what is it and how to choose it correctly
Nowadays it is already difficult to meet a person who does not use a computer and does not have his home. Often people buy several computers, many also have laptops…

...

Mozilla Firefox Web Browser Overview
For more than 10 years I have been using the "Firefox" browser in my daily work on my PC and have gained a decent experience, which I hasten to share.…

...