Rules of work and behavior on the Internet
Every Internet user should be clearly aware that the Internet can not only benefit, but also cause considerable harm. To avoid trouble, strictly follow the recommendations and rules listed below.…

Continue reading →

BIOS update
Updating (flashing) the BIOS of any device is a responsible procedure. I do not write difficult, because there is nothing complicated there. However, any error made while updating the firmware…

Continue reading →

Processor
The central processing unit (CPU) is the core of the computer, so to speak its main brain, that component that performs the bulk of the computer’s work. They usually call…

Continue reading →

Rules of work and behavior on the Internet

Every Internet user should be clearly aware that the Internet can not only benefit, but also cause considerable harm. To avoid trouble, strictly follow the recommendations and rules listed below.

• To use the Internet safely, you must have a good antivirus program. At the same time, it is necessary that the installed antivirus can work in monitoring mode – this will allow you to identify a danger immediately when it occurs.

• Use extreme caution when visiting unknown resources on the Internet. Currently, viruses and malicious programs have spread, for infection with which it is enough just to visit a specific web page.

• If you are connected to the Internet through a telephone line, the modem speaker must be turned on. This will allow you to timely detect attempts by network attackers to connect this computer to a particular resource by dialing a given phone number (often it is practiced by distributors of pornographic sites and services of a similar nature). If during the process you hear that the modem began to randomly dial a number without user intervention, you must immediately disconnect from the Network by disconnecting the network cable. After that, you need to check the computer with a special program of the Antispyware category – most likely, a spy module for automatic dialing is implemented in the computer.

• After downloading files, archives, etc. from the Internet you must immediately check them with an antivirus program, and only after that run them for execution, unpack them, etc. Many viruses and malware can be an executable file or archive.

• Mail letters received from unknown and doubtful senders must be checked with a good anti-virus program (with updated anti-virus databases) before opening. If this is not done, then you can quickly turn your computer into a breeding ground for viruses.

• Never reply to letters containing a request to send confidential data (username, password, etc.) to the specified address. With the help of such a simple trick, attackers seize other people’s logins and passwords.

• It is also strongly discouraged to reply to emails that are spam – otherwise the spammer will know that your mailbox is functioning (and this is important information for any spammer). As a result, the amount of spam received will increase many times.

• If you need to leave some information about yourself when visiting various resources on the Internet (forums, portals, sites, etc.), then such information should be minimal (for example, it is completely optional to provide your passport data, home address, various passwords, etc. .P.). Despite the fact that many Internet resources guarantee complete confidentiality, you should not be naive – if someone needs to get this information, he will receive it. Moreover, the options for information leakage can be very different. Who can get confidential information?

♦ Hacker. It simply hacks into the system of protecting the site or portal (or does something similar).

♦ Blackmailer. If someone makes various frivolous acquaintances on the Internet, indicating at the same time as a means of communication a phone number or the address of the main mailbox, then according to these data it is easy to collect incriminating evidence. This is achieved due to the wide capabilities of modern powerful search engines.

♦ A person (or group of persons) collecting individual information about people (for example, the same passport data). In this case, the portal employee who has access to this data will be interested (most often – bribed). As a result, after some time, a careless user learns (as a rule, from law enforcement agencies) that, for example, an offshore (or some other) company is opened on his passport data, through which a dozen or two million dollars are laundered every day. It is easy to guess that the responsibility for all this will rest precisely with the user who frivolously entrusted his personal data to the administration of the Internet resource.

♦ Representative of well-known law enforcement agencies. He will simply contact the site (portal) administration and politely ask to provide him with all the information about users who have registered on the site (and, of course, will receive it as soon as possible).

• When you are finished browsing the Internet, always disconnect the network cable from the telephone line or from the local network.

In general, one of the main rules of work on the Internet is constant vigilance. Remember: what you see on the monitor screen is just the tip of the iceberg, and a huge number of ongoing processes are hidden from your eyes, many of which are openly destructive.

Capacitor Replacement
In the element base of the computer (and not only) there is one bottleneck - electrolytic capacitors. They contain electrolyte, electrolyte is a liquid. Therefore, heating such a capacitor leads…

...

Windows operating systems
In this article we will look at the types of Windows NT operating systems. Windows NT is not Windows2000 or any other. This is a series, or rather the platform,…

...

Why the computer slows down and freezes - reasons and solution
Almost all PC users are faced with the fact that over time, the computer began to slow down. But, a few months ago, this has not happened yet and this…

...