Your computer

Modernization of old PCs
Immediately, I note that the article is not one year old and it was left on the site for a change. It is clear that now on the market there…

Continue reading →

Ways to replace the motherboard without reinstalling for Windows 7
As a rule, after upgrading the computer with replacing the motherboard, the user has to install the operating system “clean”, installing the necessary programs along the way. All this can…

Continue reading →

Creating BAT files
People who are familiar with the term batch file know that BAT files can significantly simplify life and save time if you can write and use them correctly. In this…

Continue reading →

1 8 9 10

Why Kaspersky is not installed

The question of why Kaspersky is not installed is asked by many users. It is no secret to anyone that Kaspersky Anti-Virus is today considered one of the most popular anti-virus programs. So why is there a problem with installing this software, why do errors appear that force the user to choose some other anti-virus program? Let’s talk about this in more detail.

Previous version of Kaspersky deleted incorrectly
If Kaspersky is not installed, the reasons for this may be different. For example, you did not uninstall the previous version of the program. This error is the most common. Some users either incorrectly remove Continue reading

How to hack a computer

A home computer is an excellent and at the same time the most vulnerable place to attack. Hacking someone else’s PC, you can not only view the information stored in his memory, but also find out the numbers of bank and virtual cards, and then withdraw all money from them. The resources of the computer itself – the space of the hard disk, the speed of the processor, as well as the speed of the Internet connection will help in attacking other computers that are on the same network as the potential victim. Before you commit a hacker attack, think that the case is illegal and criminally punishable. If this does not scare you, our article is for you.

Hacking a computer through Dark Comet
Dark Comet, or “Rat,” is one of the most popular means of remote computer control. Although the official Continue reading

How does antivirus work

Few people think about how antivirus software works. Often it is installed, periodically updated, but this is where the care for the program ends. The antivirus itself is a means of combating viruses, trojans, spyware, worms, backdoors and other garbage, which we scoop in large quantities from the Internet.

The lion’s share of such programs is aimed at Windows. Firstly, this operating system is the most common in the world. Secondly, it is vulnerable to attacks and hacking attempts due to its popularity. Thirdly, the audience using the OS does not shine with special knowledge of computer literacy. There is also spyware for Linux and MacOS, but it is completely useless from the word. Continue reading

How to protect a site from hacking by a hacker

With an insecure site, many troubles can happen: hacking by hackers, attacks, virus infection. Some of the most common attacks:

XSS attack. The virus code is embedded in the data sent by the user (in the unprotected fields of the registration form, subscription, order, call back, comment). A knowledgeable user can thus “break” the site, making it inoperative.
SQL injection. An action is added to the SQL query that was not originally there, without violating the structure of the previous query. This allows you to access databases, modify and download files from Continue reading

Rules of work and behavior on the Internet

Every Internet user should be clearly aware that the Internet can not only benefit, but also cause considerable harm. To avoid trouble, strictly follow the recommendations and rules listed below.

• To use the Internet safely, you must have a good antivirus program. At the same time, it is necessary that the installed antivirus can work in monitoring mode – this will allow you to identify a danger immediately when it occurs.

• Use extreme caution when visiting unknown resources on the Internet. Currently, viruses and malicious programs have spread, for infection with which it is enough just to visit a specific web page.

• If you are connected to the Internet through a telephone line, the modem speaker must be turned on. This will Continue reading

1 8 9 10
Work on the Windows command line
The most common startup recommendations are: Start, Run, cmd. There is a Run item in the start menu. He runs a program that allows you to transfer single commands to…

...

Motherboard
A motherboard is one of the main boards (components) of a computer. It is designed to connect the remaining components of the computer into something single called the system unit.…

...

Processor
The central processing unit (CPU) is the core of the computer, so to speak its main brain, that component that performs the bulk of the computer’s work. They usually call…

...

Causes and methods for resolving error 0x0000007b
If a problem 0x0000007b occurs, a blue screen appears on the monitor. The PC stops responding to any action. In some cases, a reboot may help. Such a problem often…

...