Modernization of old PCs
Immediately, I note that the article is not one year old and it was left on the site for a change. It is clear that now on the market there…

Continue reading →

How to install WordPress on hosting
In order to install WordPress on hosting, you need to follow a few steps that we will do now. So, how to install WordPress on hosting. Step # 1 -…

Continue reading →

Processor
The central processing unit (CPU) is the core of the computer, so to speak its main brain, that component that performs the bulk of the computer’s work. They usually call…

Continue reading →

money from

Disabling Unnecessary Windows Services

This article provides specific recommendations about which services in Windows can be safely turned off with one caveat: if you are dealing with your personal computer that is not included in any tricky computer network or is specially configured for highly specialized tasks.

Disabling unnecessary services leads to increased performance – and, of course, saving RAM. The system will not be distracted by unnecessary tasks. In addition, security will increase – if some services that allow you to connect to the computer from the outside simply do not work, then connection is also impossible. Explanations will be given on the example of Windows XP, Windows Vista and Windows Seven – the services on all systems are similar and differ mainly in names. The differences between the names will be indicated Continue reading

How to hack a computer

A home computer is an excellent and at the same time the most vulnerable place to attack. Hacking someone else’s PC, you can not only view the information stored in his memory, but also find out the numbers of bank and virtual cards, and then withdraw all money from them. The resources of the computer itself – the space of the hard disk, the speed of the processor, as well as the speed of the Internet connection will help in attacking other computers that are on the same network as the potential victim. Before you commit a hacker attack, think that the case is illegal and criminally punishable. If this does not scare you, our article is for you.

Hacking a computer through Dark Comet
Dark Comet, or “Rat,” is one of the most popular means of remote computer control. Although the official Continue reading

RAM
Random access memory - it is the RAM (RAM), it is also an opertivka. Serves for temporary storage of data with which the central processor works. Surely some are asking…

...

Capacitor Replacement
In the element base of the computer (and not only) there is one bottleneck - electrolytic capacitors. They contain electrolyte, electrolyte is a liquid. Therefore, heating such a capacitor leads…

...

Advanced CSS Hacks Collection
A hack is a method that allows CSS to be perceived only by a specific browser. Hacks can be used not only to fix bugs in the layout, but also…

...

Cleaning your computer from dust
The topic Cleaning the computer (judging by the queries in the search engine) from the point of view of the user for the most part involves cleaning the garbage of the…

...