Netbook Choice
Netbook, actually you could hear, or if you saw, decide that this is a laptop, just a small one. Actually, many stores throw them in one pile, but the netbook…

Continue reading →

Why everyone hated Apple and why they were wrong
Apple's latest technical solutions have made a lot of noise. In the iPhone 7, the jack slot disappeared, in the new MacBook the usual connectors are replaced with USB Type-C…

Continue reading →

Silent installation of applications (silent install)
Silent installation is such a process in which you sit quietly and look at the screen where the software installation process takes place without your participation, provided that it is…

Continue reading →

how antivirus

Causes and methods for resolving error 0x0000007b

If a problem 0x0000007b occurs, a blue screen appears on the monitor. The PC stops responding to any action. In some cases, a reboot may help. Such a problem often occurs during reinstallation of Windows XP, 7, 10 appears when working with applications and games.

Error
The information code is located at the bottom of the screen and reports that there is no access to the system directory at boot time. There are a large number of reasons for the appearance of such an error, therefore, to solve the problem, you need to take appropriate measures.

When does this error occur? Continue reading

Disabling Unnecessary Windows Services

This article provides specific recommendations about which services in Windows can be safely turned off with one caveat: if you are dealing with your personal computer that is not included in any tricky computer network or is specially configured for highly specialized tasks.

Disabling unnecessary services leads to increased performance – and, of course, saving RAM. The system will not be distracted by unnecessary tasks. In addition, security will increase – if some services that allow you to connect to the computer from the outside simply do not work, then connection is also impossible. Explanations will be given on the example of Windows XP, Windows Vista and Windows Seven – the services on all systems are similar and differ mainly in names. The differences between the names will be indicated Continue reading

How to hack a computer

A home computer is an excellent and at the same time the most vulnerable place to attack. Hacking someone else’s PC, you can not only view the information stored in his memory, but also find out the numbers of bank and virtual cards, and then withdraw all money from them. The resources of the computer itself – the space of the hard disk, the speed of the processor, as well as the speed of the Internet connection will help in attacking other computers that are on the same network as the potential victim. Before you commit a hacker attack, think that the case is illegal and criminally punishable. If this does not scare you, our article is for you.

Hacking a computer through Dark Comet
Dark Comet, or “Rat,” is one of the most popular means of remote computer control. Although the official Continue reading

Child lock
I think many visitors to the site have children. Everyone certainly has a computer. And now you just have to turn away, as the child begins to play on the…

...

Monitor
The monitor is no secret to anyone, it shows us a picture, it’s difficult to work without it. At the moment, on the market you can find LCD monitors. In…

...

Installing a cooler on a processor
Background to the experiment: CPU cooling (LGA775 socket) was provided by the CNPS7700-AICu cooling system. Intel Pentium D930 processor, was purchased in 2005. At that time, quite powerful and expensive.…

...