How to protect a site from hacking by a hacker
With an insecure site, many troubles can happen: hacking by hackers, attacks, virus infection. Some of the most common attacks: XSS attack. The virus code is embedded in the data…

Continue reading →

Capacitor Replacement
In the element base of the computer (and not only) there is one bottleneck - electrolytic capacitors. They contain electrolyte, electrolyte is a liquid. Therefore, heating such a capacitor leads…

Continue reading →

Bat files, examples
You can execute all the examples published below not only by creating and running a BAT file containing these commands, but by copying them directly to the command line. To…

Continue reading →

computing graphics

Video card

A video card is also a graphics accelerator, a computer component responsible for outputting images and generating graphics, for example, in games. The video card is necessary for the computer to work, otherwise it just won’t start, and the picture doesn’t appear. At the moment, there are various types of accelerators, for home systems (desktop), mobile (laptops, communicators and even telephones), for semi-professional and professional use. There are also differences in “acceleration goals”, there are two-dimensional graphics accelerators (2D) and three-dimensional graphics accelerators (3D). 2D accelerators do not always work with 3D graphics, but they are more likely to be semi-professional and professional accelerators; they serve mainly for working, for example, with photography (for example, in magazines that print). But do not think that 3D accelerators do not work with 2D graphics, they work! just focus on 3D. Video cards for home computers are all 3D accelerators.

The main parameters of video cards can be called: graphics processor, type and amount of memory, Continue reading

Installing a cooler on a processor
Background to the experiment: CPU cooling (LGA775 socket) was provided by the CNPS7700-AICu cooling system. Intel Pentium D930 processor, was purchased in 2005. At that time, quite powerful and expensive.…

...

Bat files, examples
You can execute all the examples published below not only by creating and running a BAT file containing these commands, but by copying them directly to the command line. To…

...

How to protect a site from hacking by a hacker
With an insecure site, many troubles can happen: hacking by hackers, attacks, virus infection. Some of the most common attacks: XSS attack. The virus code is embedded in the data…

...