File encryption
Encryption is the most common and essentially the simplest way to protect any information. After all, it seems that it could be simpler to take the text, take some algorithm…

Continue reading →

E-Wallet Protection
When comparing the degree of protection of client programs of payment systems Yandex.Money and Webmoney, it turned out that the latter offers more reliable means of protecting client data. However,…

Continue reading →

Computer assembly, pitfalls
Assembling a computer, especially a new one, is a lottery game. A number of factors that are not dependent on the builder can lead to the fact that the computer…

Continue reading →

means armed

Why does the computer not see the USB flash drive? 8 reasons

Sometimes at the most inopportune moment, when it is urgent to remove information from a USB flash drive to a PC, the computer refuses to see the new device. It is about the causes of this problem and its solutions, we will try to tell in detail in our article.

Hardware malfunctions

So, if your computer does not see the USB flash drive, then the first thing you should do when you find a problem is to check the health of the flash drive and the USB connector. A correctly working device connected to a working port will blink steadily. If the indicator blinks, but the computer still does not recognize the USB flash drive, then the problem should be looked for in the operating system. Continue reading

License Review Article

Before we talk about licenses, I would like to touch on the subject of licensing in order to clarify. So, licensing is most often designed to preserve the source code (source code) from encroachment. What is it? Literally, the computer code of a program in any programming language.

What advantages does it give? There are absolutely no ordinary users, but a programmer can easily determine by him the principle of the program’s work, be able to track all its actions, what is happening, why and for what. It’s like observing the construction of a house from the window of your apartment or working as an engineer at this construction site. You know the source code – you know all the secrets. Continue reading

Removing SMS viruses

Recently, viruses that require sending SMS have become a very popular and profitable type of money withdrawal from cybercriminals. As a result of this, a lot of varieties of SMS viruses have appeared. There are not only viruses that require SMS for viewing porn sites, but also disguise for installing and updating programs, locking the system due to unlicensed use, and so on and so forth. The whole variety of varieties in the form of screenshots can be observed here, for example.

ransomware sms virus

Another problem is that an infected user, going to a friend to search the Internet for a solution to his problem, stumbles across the network to Continue reading

Bat files, examples
You can perform all the examples published below not only by creating and running a BAT file containing these commands, but also copying them directly to the command line. To…

...

Forum Communication
The Internet has become an integral part of life. Since the Internet is an American invention, many terms have no direct analogues in the Russian language. For example, cookie. In…

...

Personal Data Security
What is personal information, and why does the state develop entire laws designed to protect such data? Imagine that you are making an order online. In the process of forming…

...

VPN Basic Concepts and Classification
The term VPN (Eng. "Virtual Private Network") refers to a group of technologies that provide a network connection, or the so-called logical network, functioning on top of some other network,…

...