Monitor
The monitor is no secret to anyone, it shows us a picture, it’s difficult to work without it. At the moment, on the market you can find LCD monitors. In…

Continue reading →

How hackers turn our printers, cameras and thermostats into sinister cyber army
In the fall, several large hacker attacks took place in which IoT devices were used. One of them is for Russian banks. The Daily Poster tells the story of other…

Continue reading →

Work on the Windows command line
The most common startup recommendations are: Start, Run, cmd. There is a Run item in the start menu. He runs a program that allows you to transfer single commands to…

Continue reading →

responsibility – act

1 2 3 5

Processor

The central processing unit (CPU) is the core of the computer, so to speak its main brain, that component that performs the bulk of the computer’s work. They usually call it simply a processor, and sometimes because of its flint basis, “stone”.

Processors have been developing for a long time and quickly in stores, now most of them can not be found. In view of rapid development, naturally a lot of models and technologies have appeared, to disassemble them completely is a very big topic, so I will try to describe briefly.
The description of processors is often replete with various technologies, such as a set of instructions, for example, the MMX family, the SSE family, the 3DNow family! etc. Actually, these instruction sets are more likely to be interesting to Continue reading

Website translation and localization

In technical dictionaries and specialized literature, the term “localization” is often equated with “translation”. However, in practice, localization often goes beyond the scope of translation tasks.

What is site localization
Localization – transferring a site from one linguistic and cultural environment to another. For full localization, you need to translate not only content, text content, but also labels for various navigational elements, meta tags, alt and title images, various technical information and service files. The composition and volume of text fragments that need to be transferred from one language to another are determined individually, but, in any case, it is optimal to order high-quality localization in a specialized bureau. Continue reading

Internet marketing

Internet marketing is an organization of marketing in the Internet environment. Internet marketing methods include:

design and development of Internet sites,
contextual advertising
banner advertising
search engine marketing
e-mail marketing,
Web 2.0 strategies.
Internet marketing provides unique opportunities by providing communication with target audiences, as Continue reading

1 2 3 5
Computer Upgrade
I'll start with the upgrade, as it can slightly influence the decision of what is right for you. Upgrade (Upgrade) - this word means updating or improving what is, in…

...

Bat files, examples
You can execute all the examples published below not only by creating and running a BAT file containing these commands, but by copying them directly to the command line. To…

...

How to protect a site from hacking by a hacker
With an insecure site, many troubles can happen: hacking by hackers, attacks, virus infection. Some of the most common attacks: XSS attack. The virus code is embedded in the data…

...

How hackers turn our printers, cameras and thermostats into sinister cyber army
In the fall, several large hacker attacks took place in which IoT devices were used. One of them is for Russian banks. The Daily Poster tells the story of other…

...