How hackers turn our printers, cameras and thermostats into sinister cyber army
In the fall, several large hacker attacks took place in which IoT devices were used. One of them is for Russian banks. The Daily Poster tells the story of other…

Continue reading →

BIOS update
Updating (flashing) the BIOS of any device is a responsible procedure. I do not write difficult, because there is nothing complicated there. However, any error made while updating the firmware…

Continue reading →

D-Link DIR-300 Setup
The DIR-300 router has been discontinued today, and its more modern version, DIR-300NRU, can be seen on sale. The difference between them is small: slightly different interfaces (NRU cannot be…

Continue reading →

small one

Netbook Choice

Netbook, actually you could hear, or if you saw, decide that this is a laptop, just a small one. Actually, many stores throw them in one pile, but the netbook is not a laptop.
If the laptop, you can say, is a “stripped down” version of the computer, then the netbook, in turn, is a “stripped down” version of the laptop. But if laptops use full-sized parts (accessories), only upgraded specifically for the laptop, then the netbook already uses smaller parts (accessories), for example, the same processor. In general, a netbook is no different from a computer or laptop, there is also a processor, motherboard, RAM, etc. And how to replace parts in a laptop is almost not possible, so you should remember this before choosing. Continue reading

Silent installation of applications (silent install)
Silent installation is such a process in which you sit quietly and look at the screen where the software installation process takes place without your participation, provided that it is…

...

Nettop Choice
Nettop, like the netbook, was introduced by Intel at the release of the Atom processor. That is, in essence, it is the same as a netbook only in the form…

...

How to protect a site from hacking by a hacker
With an insecure site, many troubles can happen: hacking by hackers, attacks, virus infection. Some of the most common attacks: XSS attack. The virus code is embedded in the data…

...

Work on the Windows command line
The most common startup recommendations are: Start, Run, cmd. There is a Run item in the start menu. He runs a program that allows you to transfer single commands to…

...