PC Recommendations
Now we will consider the question of choosing a personal computer (PC). Immediately it is worth noting that the examples below are taken from the price list of the DNS…

Continue reading →

How to protect a site from hacking by a hacker
With an insecure site, many troubles can happen: hacking by hackers, attacks, virus infection. Some of the most common attacks: XSS attack. The virus code is embedded in the data…

Continue reading →

D-Link DIR-300 Setup
The DIR-300 router has been discontinued today, and its more modern version, DIR-300NRU, can be seen on sale. The difference between them is small: slightly different interfaces (NRU cannot be…

Continue reading →

to polyphony

Apple iPhone OS

Preamble: Recently, all sorts of mobile and, especially fashionable, cloud technologies have captured the attention of mankind. Desktops and laptops faded into the background, giving way to more compact and attractive toys for leisure and business. Our new friends not only know how to polyphony, show pictures and surf the Internet, but also become fashion accessories that cannot be put on a table in a cafe next to a cup of tea, from time to time sliding the index finger on the inscription “Slide to unlock”. But the day is heading towards the evening, your electronic partner is tired and he has to go on a charge. Well, insert the USB tail where necessary … let it rest. Continue reading

Internet marketing
Internet marketing is an organization of marketing in the Internet environment. Internet marketing methods include: design and development of Internet sites, contextual advertising banner advertising search engine marketing e-mail marketing,…

...

Silent installation of applications (silent install)
Silent installation is such a process in which you sit quietly and look at the screen where the software installation process takes place without your participation, provided that it is…

...

Internet marketing
Internet marketing is an organization of marketing in the Internet environment. Internet marketing methods include: design and development of Internet sites, contextual advertising banner advertising search engine marketing e-mail marketing,…

...

Why Kaspersky is not installed
The question of why Kaspersky is not installed is asked by many users. It is no secret to anyone that Kaspersky Anti-Virus is today considered one of the most popular…

...