How to hack a computer
A home computer is an excellent and at the same time the most vulnerable place to attack. Hacking someone else’s PC, you can not only view the information stored in…

Continue reading →

Website translation and localization
In technical dictionaries and specialized literature, the term “localization” is often equated with “translation”. However, in practice, localization often goes beyond the scope of translation tasks. What is site localization…

Continue reading →

IT consulting
IT consulting refers to the widest range of solutions designed to optimize existing IT resources for the needs of a particular business, its structure and features. Ultimately, its goal is…

Continue reading →

the screen where

Processor

The central processing unit (CPU) is the core of the computer, so to speak its main brain, that component that performs the bulk of the computer’s work. They usually call it simply a processor, and sometimes because of its flint basis, “stone”.

Processors have been developing for a long time and quickly in stores, now most of them can not be found. In view of rapid development, naturally a lot of models and technologies have appeared, to disassemble them completely is a very big topic, so I will try to describe briefly.
The description of processors is often replete with various technologies, such as a set of instructions, for example, the MMX family, the SSE family, the 3DNow family! etc. Actually, these instruction sets are more likely to be interesting to Continue reading

Silent installation of applications (silent install)

Silent installation is such a process in which you sit quietly and look at the screen where the software installation process takes place without your participation, provided that it is generally visible. At the same time, the installer does not bother you with questions like Do you agree with the license agreement ?. Installation options are used by default. those. those that the installer offers when installing the software in the usual way.

The disadvantages of a silent installation include all sorts of panels in browsers and E-Bay tags on the desktop, since most of these bonuses are included in the installation by default. But this is more likely an exception, although not rare. Read more about silent installation in this article. Continue reading

IT consulting
IT consulting refers to the widest range of solutions designed to optimize existing IT resources for the needs of a particular business, its structure and features. Ultimately, its goal is…

...

Nettop Choice
Nettop, like the netbook, was introduced by Intel at the release of the Atom processor. That is, in essence, it is the same as a netbook only in the form…

...

How to hack a computer
A home computer is an excellent and at the same time the most vulnerable place to attack. Hacking someone else’s PC, you can not only view the information stored in…

...