Advanced CSS Hacks Collection
A hack is a method that allows CSS to be perceived only by a specific browser. Hacks can be used not only to fix bugs in the layout, but also…

Continue reading →

Why Kaspersky is not installed
The question of why Kaspersky is not installed is asked by many users. It is no secret to anyone that Kaspersky Anti-Virus is today considered one of the most popular…

Continue reading →

How hackers turn our printers, cameras and thermostats into sinister cyber army
In the fall, several large hacker attacks took place in which IoT devices were used. One of them is for Russian banks. The Daily Poster tells the story of other…

Continue reading →

volume with it

Nettop Choice

Nettop, like the netbook, was introduced by Intel at the release of the Atom processor. That is, in essence, it is the same as a netbook only in the form of a computer (stationary). In fact, it is an ordinary computer with only less power and price. Packed in a small case. It is also worth saying that the monitor is not always attached to nettops, do not forget about it. But there are fully equipped computers, right down to the mouse with the keyboard. But unfortunately, so far this type of computer has not received wide distribution, unlike the same netbook.
The main focus of the nettop is considered to be work with documents and the Internet; in fact, for this purpose it was created. Unlike a conventional personal computer, nettops do not imply the possibility of replacing components at home, primarily because of the extremely small size of the computer. The power supply for computers is remote. Otherwise, they are not fundamentally different from an ordinary computer.
Such computers are well suited for office work or work with documents, as well as for studying, especially if Continue reading

Apple iPhone OS
Preamble: Recently, all sorts of mobile and, especially fashionable, cloud technologies have captured the attention of mankind. Desktops and laptops faded into the background, giving way to more compact and…

...

Child lock
I think many visitors to the site have children. Everyone certainly has a computer. And now you just have to turn away, as the child begins to play on the…

...

Silent installation of applications (silent install)
Silent installation is such a process in which you sit quietly and look at the screen where the software installation process takes place without your participation, provided that it is…

...