How hackers turn our printers, cameras and thermostats into sinister cyber army
In the fall, several large hacker attacks took place in which IoT devices were used. One of them is for Russian banks. The Daily Poster tells the story of other…

Continue reading →

Modernization of old PCs
Immediately, I note that the article is not one year old and it was left on the site for a change. It is clear that now on the market there…

Continue reading →

Apple Pay: what is it and how to use it
Apple Pay is a payment system that allows you to pay for goods in stores by attaching an Apple mobile device to the terminal. The system works according to the…

Continue reading →

the memory

RAM

Random access memory – it is the RAM (RAM), it is also an opertivka. Serves for temporary storage of data with which the central processor works. Surely some are asking the question “why?”, Because there is a hard drive, there is memory in the processor. The answer is simple, the need to store more and more operational data is constantly growing and the processor memory (cache) is very small for that, with regards to the hard disk, some data is stored on it, but only a part, the speed of RAM is much faster than the speed of working with hard disk, because RAM is used.

The main characteristics of RAM are: memory type, memory speed, timings, form factor, volume.
Type of memory – with the development of technology and computer technology, more and more types of memory appear, more precisely, newer ones remove old ones from the market. At the moment, DDR3 is common, although so Continue reading

Work on the Windows command line
The most common startup recommendations are: Start, Run, cmd. There is a Run item in the start menu. He runs a program that allows you to transfer single commands to…

...

How does antivirus work
Few people think about how antivirus software works. Often it is installed, periodically updated, but this is where the care for the program ends. The antivirus itself is a means…

...

PC Recommendations
Now we will consider the question of choosing a personal computer (PC). Immediately it is worth noting that the examples below are taken from the price list of the DNS…

...

How to protect a site from hacking by a hacker
With an insecure site, many troubles can happen: hacking by hackers, attacks, virus infection. Some of the most common attacks: XSS attack. The virus code is embedded in the data…

...