Printers, scanners, faxes, multifunction printers
Faxes, I start with them, because rarely buy a fax home. A little bit about faxes, in fact it is a mixture of several devices, a printer, a scanner and…

Continue reading →

D-Link DIR-300 Setup
The DIR-300 router has been discontinued today, and its more modern version, DIR-300NRU, can be seen on sale. The difference between them is small: slightly different interfaces (NRU cannot be…

Continue reading →

Work on the Windows command line
The most common startup recommendations are: Start, Run, cmd. There is a Run item in the start menu. He runs a program that allows you to transfer single commands to…

Continue reading →

volume with it

Nettop Choice

Nettop, like the netbook, was introduced by Intel at the release of the Atom processor. That is, in essence, it is the same as a netbook only in the form of a computer (stationary). In fact, it is an ordinary computer with only less power and price. Packed in a small case. It is also worth saying that the monitor is not always attached to nettops, do not forget about it. But there are fully equipped computers, right down to the mouse with the keyboard. But unfortunately, so far this type of computer has not received wide distribution, unlike the same netbook.
The main focus of the nettop is considered to be work with documents and the Internet; in fact, for this purpose it was created. Unlike a conventional personal computer, nettops do not imply the possibility of replacing components at home, primarily because of the extremely small size of the computer. The power supply for computers is remote. Otherwise, they are not fundamentally different from an ordinary computer.
Such computers are well suited for office work or work with documents, as well as for studying, especially if Continue reading

Silent installation of applications (silent install)
Silent installation is such a process in which you sit quietly and look at the screen where the software installation process takes place without your participation, provided that it is…

...

How to protect a site from hacking by a hacker
With an insecure site, many troubles can happen: hacking by hackers, attacks, virus infection. Some of the most common attacks: XSS attack. The virus code is embedded in the data…

...

Netbook Choice
Netbook, actually you could hear, or if you saw, decide that this is a laptop, just a small one. Actually, many stores throw them in one pile, but the netbook…

...

Bat files, examples
You can execute all the examples published below not only by creating and running a BAT file containing these commands, but by copying them directly to the command line. To…

...