Modernization of old PCs
Immediately, I note that the article is not one year old and it was left on the site for a change. It is clear that now on the market there…

Continue reading →

CSS layouts: fixed, rubber, elastic. Pros and cons
What layout layout (using Cascading Style Sheets, CSS) can be considered the best? Each of them has its own hacks (quirks) and its own unique pros and cons. Will one…

Continue reading →

Cleaning your computer from dust
The topic Cleaning the computer (judging by the queries in the search engine) from the point of view of the user for the most part involves cleaning the garbage of the…

Continue reading →

Not Found

Apologies, but the page you requested could not be found. Perhaps searching will help.

Tag Cloud

achieved due actions in relation active development additional settings almost everything and which antivirus software article Windows better perceived computing graphics contact is maximum delete unnecessary devices rarely different cards digitize the signal Electronic stores facial features Internet marketing Internet resource material from menu or tooltips minimum and most effective new resource noticeably inferior only to obtain processor with provide him provide him with record companies remote control responsibility - act returning to discover send confidential settings apply shutting it down slots where successfully compete that appears the distribution the installed the keyboard the memory the request the responsibility the thickness they differ from this arrangement this hosting this information through the whois version also visual inspection volume with it which collector your abilities
Silent installation of applications (silent install)
Silent installation is such a process in which you sit quietly and look at the screen where the software installation process takes place without your participation, provided that it is…

...

Windows Maintenance Programs
Computer maintenance can be both physical (dust removal, etc.) and software. The second is more related to the operating system, since the software maintenance of the PC itself at home…

...

5 fashionable ways to hide from face identification
Today, the face recognition algorithm is used everywhere. And not only in professional tracking systems or smart web services, but in various entertainment applications and basic functions like autofocus. Poster…

...