Computer Upgrade
I'll start with the upgrade, as it can slightly influence the decision of what is right for you. Upgrade (Upgrade) - this word means updating or improving what is, in…

Continue reading →

How to hack a computer
A home computer is an excellent and at the same time the most vulnerable place to attack. Hacking someone else’s PC, you can not only view the information stored in…

Continue reading →

PC Recommendations
Now we will consider the question of choosing a personal computer (PC). Immediately it is worth noting that the examples below are taken from the price list of the DNS…

Continue reading →

spam – otherwise

Why everyone hated Apple and why they were wrong

Apple’s latest technical solutions have made a lot of noise. In the iPhone 7, the jack slot disappeared, in the new MacBook the usual connectors are replaced with USB Type-C and there is no memory card slot. Poster Daily recalls all the joys that engineers from Cupertino deprived us of, and why it is difficult to argue with them.
Apple for 30 years with an enviable persistence has been producing computers of closed architecture under the control of its own operating system. Neither the popularity of the PC as a gaming platform, nor the recognition in 2006 that Intel chips were better than their own could convince them of this. It turns out that the company, which we used to consider the most important developer of innovations, is in fact very conservative and rational in the market. By tradition, Apple itself decides what is needed and what Continue reading

Apple Pay: what is it and how to use it

Apple Pay is a payment system that allows you to pay for goods in stores by attaching an Apple mobile device to the terminal. The system works according to the NFC protocol and only on terminals that accept contactless payments (they must have a PayPass or PayWave label). The system is compatible only with models older than the iPhone 6, including the iPhone SE, as well as with the Apple Watch. In the latter case, the system will be able to configure through the iPhone 5, 5s and 5c.

To pay, you need to bring the gadget to the terminal, select the card in the application and attach your finger to the Touch ID sensor. On Apple Watch, a payment is launched by double-clicking on the power button and does not require special authorization. Neither Apple Pay nor other payment services charge Continue reading

Apple iPhone OS

Preamble: Recently, all sorts of mobile and, especially fashionable, cloud technologies have captured the attention of mankind. Desktops and laptops faded into the background, giving way to more compact and attractive toys for leisure and business. Our new friends not only know how to polyphony, show pictures and surf the Internet, but also become fashion accessories that cannot be put on a table in a cafe next to a cup of tea, from time to time sliding the index finger on the inscription “Slide to unlock”. But the day is heading towards the evening, your electronic partner is tired and he has to go on a charge. Well, insert the USB tail where necessary … let it rest. Continue reading

How hackers turn our printers, cameras and thermostats into sinister cyber army
In the fall, several large hacker attacks took place in which IoT devices were used. One of them is for Russian banks. The Daily Poster tells the story of other…

...

Computer assembly
Installation is performed in this order: first, the processor, cooler, random access memory (RAM), motherboard, video card, power supply, hard drive and optical drive. Also consider the problems when you…

...

IT consulting
IT consulting refers to the widest range of solutions designed to optimize existing IT resources for the needs of a particular business, its structure and features. Ultimately, its goal is…

...

Printers, scanners, faxes, multifunction printers
Faxes, I start with them, because rarely buy a fax home. A little bit about faxes, in fact it is a mixture of several devices, a printer, a scanner and…

...