Rules of work and behavior on the Internet
Every Internet user should be clearly aware that the Internet can not only benefit, but also cause considerable harm. To avoid trouble, strictly follow the recommendations and rules listed below.…

Continue reading →

Computer assembly
Installation is performed in this order: first, the processor, cooler, random access memory (RAM), motherboard, video card, power supply, hard drive and optical drive. Also consider the problems when you…

Continue reading →

PC Recommendations
Now we will consider the question of choosing a personal computer (PC). Immediately it is worth noting that the examples below are taken from the price list of the DNS…

Continue reading →

processor with

Computer Upgrade

I’ll start with the upgrade, as it can slightly influence the decision of what is right for you. Upgrade (Upgrade) – this word means updating or improving what is, in this case, a computer. This issue, upgrade, does not apply to laptops. Due to the difficulties of assembly, upgrades to laptops and netbooks are not carried out.
So, after working for some time on the computer, you began to conceive that new programs do not work so fast, you also feel a lack of power in games, and you wondered “what to do?”. There are three Continue reading

Apple Pay: what is it and how to use it
Apple Pay is a payment system that allows you to pay for goods in stores by attaching an Apple mobile device to the terminal. The system works according to the…

...

Work on the Windows command line
The most common startup recommendations are: Start, Run, cmd. There is a Run item in the start menu. He runs a program that allows you to transfer single commands to…

...

Windows Maintenance Programs
Computer maintenance can be both physical (dust removal, etc.) and software. The second is more related to the operating system, since the software maintenance of the PC itself at home…

...

How to protect a site from hacking by a hacker
With an insecure site, many troubles can happen: hacking by hackers, attacks, virus infection. Some of the most common attacks: XSS attack. The virus code is embedded in the data…

...