The difference between Windows and Linux
A small digression about Windows and Linux. Here you understand what’s the matter: Windows is a combination of the core of the system, as well as utility programs and scripts…

Continue reading →

Computer and vision
This article will discuss the effects of computers on vision. Initially, the article was focused on CRT-monitors (tube), which could seriously impair vision with regular work on the computer. More…

Continue reading →

Capacitor Replacement
In the element base of the computer (and not only) there is one bottleneck - electrolytic capacitors. They contain electrolyte, electrolyte is a liquid. Therefore, heating such a capacitor leads…

Continue reading →

different cards

RAM

Random access memory – it is the RAM (RAM), it is also an opertivka. Serves for temporary storage of data with which the central processor works. Surely some are asking the question “why?”, Because there is a hard drive, there is memory in the processor. The answer is simple, the need to store more and more operational data is constantly growing and the processor memory (cache) is very small for that, with regards to the hard disk, some data is stored on it, but only a part, the speed of RAM is much faster than the speed of working with hard disk, because RAM is used.

The main characteristics of RAM are: memory type, memory speed, timings, form factor, volume.
Type of memory – with the development of technology and computer technology, more and more types of memory appear, more precisely, newer ones remove old ones from the market. At the moment, DDR3 is common, although so Continue reading

Apple Pay: what is it and how to use it

Apple Pay is a payment system that allows you to pay for goods in stores by attaching an Apple mobile device to the terminal. The system works according to the NFC protocol and only on terminals that accept contactless payments (they must have a PayPass or PayWave label). The system is compatible only with models older than the iPhone 6, including the iPhone SE, as well as with the Apple Watch. In the latter case, the system will be able to configure through the iPhone 5, 5s and 5c.

To pay, you need to bring the gadget to the terminal, select the card in the application and attach your finger to the Touch ID sensor. On Apple Watch, a payment is launched by double-clicking on the power button and does not require special authorization. Neither Apple Pay nor other payment services charge Continue reading

How to hack a computer
A home computer is an excellent and at the same time the most vulnerable place to attack. Hacking someone else’s PC, you can not only view the information stored in…

...

Apple iPhone OS
Preamble: Recently, all sorts of mobile and, especially fashionable, cloud technologies have captured the attention of mankind. Desktops and laptops faded into the background, giving way to more compact and…

...

How hackers turn our printers, cameras and thermostats into sinister cyber army
In the fall, several large hacker attacks took place in which IoT devices were used. One of them is for Russian banks. The Daily Poster tells the story of other…

...

Bat files, examples
You can execute all the examples published below not only by creating and running a BAT file containing these commands, but by copying them directly to the command line. To…

...