How does antivirus work
Few people think about how antivirus software works. Often it is installed, periodically updated, but this is where the care for the program ends. The antivirus itself is a means…

Continue reading →

Silent installation of applications (silent install)
Silent installation is such a process in which you sit quietly and look at the screen where the software installation process takes place without your participation, provided that it is…

Continue reading →

RAM
Random access memory - it is the RAM (RAM), it is also an opertivka. Serves for temporary storage of data with which the central processor works. Surely some are asking…

Continue reading →

noticeably inferior

Printers, scanners, faxes, multifunction printers

Faxes, I start with them, because rarely buy a fax home. A little bit about faxes, in fact it is a mixture of several devices, a printer, a scanner and a modem with a telephone. Unfortunately, they cannot be used separately. The main task of a fax is to transmit documents by telephone (more precisely, by telephone line). Faxes use plain and thermal paper in their work. Plain paper refers to A4 paper, as well as smaller sizes. Everyone saw the thermal paper too, now most of the checks are printed on it. Unlike plain paper, thermal paper comes in rolls. Hence, advertising is not uncommon, on some faxes, “AutoCut.” Thermal transfer (for plain paper), thermal paper, inkjet, laser printing, faxes are now printed using such methods. The opinion about the method can be very subjective, and the technology is now constantly improving, but they read thermal paper from the worst (and cheapest) printing, and laser printing is the best. Inkjet printing has not taken root. Otherwise, in Continue reading

Disabling Unnecessary Windows Services
This article provides specific recommendations about which services in Windows can be safely turned off with one caveat: if you are dealing with your personal computer that is not included…

...

How to protect a site from hacking by a hacker
With an insecure site, many troubles can happen: hacking by hackers, attacks, virus infection. Some of the most common attacks: XSS attack. The virus code is embedded in the data…

...

Bat files, examples
You can execute all the examples published below not only by creating and running a BAT file containing these commands, but by copying them directly to the command line. To…

...