The difference between Windows and Linux
A small digression about Windows and Linux. Here you understand what’s the matter: Windows is a combination of the core of the system, as well as utility programs and scripts…

Continue reading →

How to protect a site from hacking by a hacker
With an insecure site, many troubles can happen: hacking by hackers, attacks, virus infection. Some of the most common attacks: XSS attack. The virus code is embedded in the data…

Continue reading →

Netbook Choice
Netbook, actually you could hear, or if you saw, decide that this is a laptop, just a small one. Actually, many stores throw them in one pile, but the netbook…

Continue reading →

material from

Computer assembly

Installation is performed in this order: first, the processor, cooler, random access memory (RAM), motherboard, video card, power supply, hard drive and optical drive. Also consider the problems when you turn it on.

Processor Installation.

It is most convenient to start assembling the computer by installing the processor, cooler and memory modules on the motherboard, while it is not yet installed in the case. Of course, you can first put the motherboard in the case, and then put the processor. But in this case, it is unlikely to get a cooler without Continue reading

Internet marketing
Internet marketing is an organization of marketing in the Internet environment. Internet marketing methods include: design and development of Internet sites, contextual advertising banner advertising search engine marketing e-mail marketing,…

...

Netbook Choice
Netbook, actually you could hear, or if you saw, decide that this is a laptop, just a small one. Actually, many stores throw them in one pile, but the netbook…

...

Where to start creating your own website
Where do any construction work begin? Can I hammer a nail without a hammer? Maybe yes. But is such work convenient and practical? And will it be effective? The questions…

...

How to hack a computer
A home computer is an excellent and at the same time the most vulnerable place to attack. Hacking someone else’s PC, you can not only view the information stored in…

...