Bat files, examples
You can execute all the examples published below not only by creating and running a BAT file containing these commands, but by copying them directly to the command line. To…

Continue reading →

Start trading on a professional exchange built on a powerful engine: https://beaxy.com/
Creating BAT files
People who are familiar with the term batch file know that BAT files can significantly simplify life and save time if you can write and use them correctly. In this…

Continue reading →

Internet marketing
Internet marketing is an organization of marketing in the Internet environment. Internet marketing methods include: design and development of Internet sites, contextual advertising banner advertising search engine marketing e-mail marketing,…

Continue reading →

devices rarely

Advanced CSS Hacks Collection

A hack is a method that allows CSS to be perceived only by a specific browser.
Hacks can be used not only to fix bugs in the layout, but also if certain browser features are used to speed up the rendering of a web page in it (for example, CSS3 properties)

ALL KNOWN CONDITIONAL COMMENTS IN IE
Despite their fame, there are many rarely used ones.
For example, a stylesheet that will be visible to all browsers except IE versions 5-8.
<! – [if! IE] -> <link href = “styles.css” rel = “stylesheet” media = “all” /> <! – [endif] -> Continue reading

How hackers turn our printers, cameras and thermostats into sinister cyber army

In the fall, several large hacker attacks took place in which IoT devices were used. One of them is for Russian banks. The Daily Poster tells the story of other interesting hacks and explains how attackers harm people through light bulbs and refrigerators.
Internet of things attacks Russian banks
On Thursday, November 10, five large Russian banks were subjected to DDoS attacks – a large number of junk requests came to sites that loaded servers and made sites inaccessible. The attacks went to the Moscow Exchange, Alfa Bank, Sberbank, Otkritie Bank, VTB Bank and Rosbank. Almost all banks managed to cope with the load. Among the possible organizers of the attack was a hacker under the nickname vimproducts, whose customers were allegedly dissatisfied with Russia’s interference in the Continue reading

Nettop Choice
Nettop, like the netbook, was introduced by Intel at the release of the Atom processor. That is, in essence, it is the same as a netbook only in the form…

...

Silent installation of applications (silent install)
Silent installation is such a process in which you sit quietly and look at the screen where the software installation process takes place without your participation, provided that it is…

...

RAM
Random access memory - it is the RAM (RAM), it is also an opertivka. Serves for temporary storage of data with which the central processor works. Surely some are asking…

...

Ways to replace the motherboard without reinstalling for Windows 7
As a rule, after upgrading the computer with replacing the motherboard, the user has to install the operating system “clean”, installing the necessary programs along the way. All this can…

...