Causes and methods for resolving error 0x0000007b
If a problem 0x0000007b occurs, a blue screen appears on the monitor. The PC stops responding to any action. In some cases, a reboot may help. Such a problem often…

Continue reading →

Modernization of old PCs
Immediately, I note that the article is not one year old and it was left on the site for a change. It is clear that now on the market there…

Continue reading →

How to hack a computer
A home computer is an excellent and at the same time the most vulnerable place to attack. Hacking someone else’s PC, you can not only view the information stored in…

Continue reading →

returning to discover

Bat files, examples

You can execute all the examples published below not only by creating and running a BAT file containing these commands, but by copying them directly to the command line.

To open the command line in the right place (in the folder with files, for example), you need to call the context menu (RMB) with the Shift key held down:

command line call

You can read about how to work with the command line in this article. We pass directly to the teams. Continue reading

D-Link DIR-300 Setup

The DIR-300 router has been discontinued today, and its more modern version, DIR-300NRU, can be seen on sale. The difference between them is small: slightly different interfaces (NRU cannot be restarted through the interface), different versions of Wi-Fi (G and stripped-down N), different firmware and Russification files. Otherwise, the information is relevant for the new version of the router.

In fact, the English word route means a route. Therefore, correctly and in Russian this device is called a router. But since everyone will look for a router anyway, I will use this name. The article will focus on configuring the DIR-300 router from D-Link. Continue reading

Child lock

I think many visitors to the site have children. Everyone certainly has a computer. And now you just have to turn away, as the child begins to play on the computer keyboard, like on a piano. As a result, anything can happen. Therefore, I am often asked questions about how to block a computer from small children.

Also, a lock is needed from time to time, when suddenly you suddenly realize that the keyboard needs to be cleaned, moreover, without delay. Locking the computer in this case is also a more convenient, practical and quick solution than turning off the PC during cleaning.

If you came to this page from a search engine for the computer is blocked, then you should read the article Continue reading

PC Recommendations
Now we will consider the question of choosing a personal computer (PC). Immediately it is worth noting that the examples below are taken from the price list of the DNS…

...

CSS layouts: fixed, rubber, elastic. Pros and cons
What layout layout (using Cascading Style Sheets, CSS) can be considered the best? Each of them has its own hacks (quirks) and its own unique pros and cons. Will one…

...

Ways to replace the motherboard without reinstalling for Windows 7
As a rule, after upgrading the computer with replacing the motherboard, the user has to install the operating system “clean”, installing the necessary programs along the way. All this can…

...

How to protect a site from hacking by a hacker
With an insecure site, many troubles can happen: hacking by hackers, attacks, virus infection. Some of the most common attacks: XSS attack. The virus code is embedded in the data…

...