Netbook Choice
Netbook, actually you could hear, or if you saw, decide that this is a laptop, just a small one. Actually, many stores throw them in one pile, but the netbook…

Continue reading →

Computer assembly
Installation is performed in this order: first, the processor, cooler, random access memory (RAM), motherboard, video card, power supply, hard drive and optical drive. Also consider the problems when you…

Continue reading →

5 fashionable ways to hide from face identification
Today, the face recognition algorithm is used everywhere. And not only in professional tracking systems or smart web services, but in various entertainment applications and basic functions like autofocus. Poster…

Continue reading →

small one

Netbook Choice

Netbook, actually you could hear, or if you saw, decide that this is a laptop, just a small one. Actually, many stores throw them in one pile, but the netbook is not a laptop.
If the laptop, you can say, is a “stripped down” version of the computer, then the netbook, in turn, is a “stripped down” version of the laptop. But if laptops use full-sized parts (accessories), only upgraded specifically for the laptop, then the netbook already uses smaller parts (accessories), for example, the same processor. In general, a netbook is no different from a computer or laptop, there is also a processor, motherboard, RAM, etc. And how to replace parts in a laptop is almost not possible, so you should remember this before choosing. Continue reading

Choosing a Laptop
The first thing I want to say is not to confuse laptops with netbooks. Unfortunately, in the price lists they are all under the name of laptops, but it’s good…

...

D-Link DIR-300 Setup
The DIR-300 router has been discontinued today, and its more modern version, DIR-300NRU, can be seen on sale. The difference between them is small: slightly different interfaces (NRU cannot be…

...

Silent installation of applications (silent install)
Silent installation is such a process in which you sit quietly and look at the screen where the software installation process takes place without your participation, provided that it is…

...

How to protect a site from hacking by a hacker
With an insecure site, many troubles can happen: hacking by hackers, attacks, virus infection. Some of the most common attacks: XSS attack. The virus code is embedded in the data…

...