How to protect a site from hacking by a hacker
With an insecure site, many troubles can happen: hacking by hackers, attacks, virus infection. Some of the most common attacks: XSS attack. The virus code is embedded in the data…

Continue reading →

Creating BAT files
People who are familiar with the term batch file know that BAT files can significantly simplify life and save time if you can write and use them correctly. In this…

Continue reading →

5 fashionable ways to hide from face identification
Today, the face recognition algorithm is used everywhere. And not only in professional tracking systems or smart web services, but in various entertainment applications and basic functions like autofocus. Poster…

Continue reading →

material from

Computer assembly

Installation is performed in this order: first, the processor, cooler, random access memory (RAM), motherboard, video card, power supply, hard drive and optical drive. Also consider the problems when you turn it on.

Processor Installation.

It is most convenient to start assembling the computer by installing the processor, cooler and memory modules on the motherboard, while it is not yet installed in the case. Of course, you can first put the motherboard in the case, and then put the processor. But in this case, it is unlikely to get a cooler without Continue reading

BIOS update
Updating (flashing) the BIOS of any device is a responsible procedure. I do not write difficult, because there is nothing complicated there. However, any error made while updating the firmware…

...

Advanced CSS Hacks Collection
A hack is a method that allows CSS to be perceived only by a specific browser. Hacks can be used not only to fix bugs in the layout, but also…

...

Computer assembly
Installation is performed in this order: first, the processor, cooler, random access memory (RAM), motherboard, video card, power supply, hard drive and optical drive. Also consider the problems when you…

...