Why everyone hated Apple and why they were wrong
Apple's latest technical solutions have made a lot of noise. In the iPhone 7, the jack slot disappeared, in the new MacBook the usual connectors are replaced with USB Type-C…

Continue reading →

How hackers turn our printers, cameras and thermostats into sinister cyber army
In the fall, several large hacker attacks took place in which IoT devices were used. One of them is for Russian banks. The Daily Poster tells the story of other…

Continue reading →

Monitor
The monitor is no secret to anyone, it shows us a picture, it’s difficult to work without it. At the moment, on the market you can find LCD monitors. In…

Continue reading →

most effective

PC Recommendations

Now we will consider the question of choosing a personal computer (PC). Immediately it is worth noting that the examples below are taken from the price list of the DNS store (federal network) for January-February 2011.

So, you have decided to buy a computer. As a rule, the question immediately arises, which computer or laptop is better? (how many times have I heard this) It is worth saying here that a laptop is more convenient, it takes up less space, it is mobile, but it is more expensive than a personal computer of similar capacity, and accordingly a laptop of similar price will be less powerful. So if the occupied Continue reading

Advanced CSS Hacks Collection

A hack is a method that allows CSS to be perceived only by a specific browser.
Hacks can be used not only to fix bugs in the layout, but also if certain browser features are used to speed up the rendering of a web page in it (for example, CSS3 properties)

ALL KNOWN CONDITIONAL COMMENTS IN IE
Despite their fame, there are many rarely used ones.
For example, a stylesheet that will be visible to all browsers except IE versions 5-8.
<! – [if! IE] -> <link href = “styles.css” rel = “stylesheet” media = “all” /> <! – [endif] -> Continue reading

IT consulting

IT consulting refers to the widest range of solutions designed to optimize existing IT resources for the needs of a particular business, its structure and features. Ultimately, its goal is to improve the operation of management systems and office equipment available at the enterprise for the benefit of the business. High-quality and versatile consulting includes:

IT audit
optimization of existing ones and development of a strategy for introducing new IT solutions;
audit of business processes with various penetration depths.
It is unlikely that anyone today will seriously deny the serious role of IT processes in running a business, especially a large one. At the same time, the larger the business, the more difficult IT solutions will be Continue reading

Advanced CSS Hacks Collection
A hack is a method that allows CSS to be perceived only by a specific browser. Hacks can be used not only to fix bugs in the layout, but also…

...

How to hack a computer
A home computer is an excellent and at the same time the most vulnerable place to attack. Hacking someone else’s PC, you can not only view the information stored in…

...

CSS layouts: fixed, rubber, elastic. Pros and cons
What layout layout (using Cascading Style Sheets, CSS) can be considered the best? Each of them has its own hacks (quirks) and its own unique pros and cons. Will one…

...

Linux operating systems
Linux is not an operating system, but just its kernel. Everything that you are accustomed to see and understand as an OS (buttons, windows and panels) - in fact, it…

...