How to protect your password from hacking
Today, passwords play a significant role in human life. Everywhere on the Internet, on every site, each account must have its own password in order for the user to gain…

Continue reading →

How to protect your password from hacking
Today, passwords play a significant role in human life. Everywhere on the Internet, on every site, each account must have its own password in order for the user to gain…

Continue reading →

How to protect your password from hacking
Today, passwords play a significant role in human life. Everywhere on the Internet, on every site, each account must have its own password in order for the user to gain…

Continue reading →

router or router

Bat files, examples

You can perform all the examples published below not only by creating and running a BAT file containing these commands, but also copying them directly to the command line.

To open the command line in the right place (in the folder with files, for example), you need to call the context menu (RMB) with the Shift key held down:

command line call

You can read about how to work with the command line in this article. We pass directly to the teams. Continue reading

Installing a cooler on a processor

Background to the experiment: CPU cooling (LGA775 socket) was provided by the CNPS7700-AICu cooling system. Intel Pentium D930 processor, was purchased in 2005. At that time, quite powerful and expensive. Therefore, I did not save on cooling. Bought a Zalman CNPS7700-AICu. For four years he regularly performed the task assigned to him. There are no complaints about cooling the processor now, but it has become pretty noisy.

Therefore, I decided to send the old man to retire and started repairs. It is repair, because replacement is laziness and squandering, at least in this situation. In place of the noisy fan, I decided to put Floston, Continue reading

How long can I sit at a computer?

Computing has become literally a part of life. Computers and tablets – it’s impossible to imagine a single day when only a couple of minutes were spent in front of the screen. Usually time is calculated in hours.

Everyone knows that from long work at the computer there are various health problems. The article will not affect the “troubles” of the skeleton, muscle tissue, and the gastrointestinal tract. Let us dwell on the field of vision.

Basic rules for working at a computer and how much to sit at a computer?
Safety regulations approved long ago and almost unchanged to this day clearly state: Continue reading

E-Wallet Protection
When comparing the degree of protection of client programs of payment systems Yandex.Money and Webmoney, it turned out that the latter offers more reliable means of protecting client data. However,…

...

Installing a cooler on a processor
Background to the experiment: CPU cooling (LGA775 socket) was provided by the CNPS7700-AICu cooling system. Intel Pentium D930 processor, was purchased in 2005. At that time, quite powerful and expensive.…

...

E-Wallet Protection
When comparing the degree of protection of client programs of payment systems Yandex.Money and Webmoney, it turned out that the latter offers more reliable means of protecting client data. However,…

...

File encryption
Encryption is the most common and essentially the simplest way to protect any information. After all, it seems that it could be simpler to take the text, take some algorithm…

...