Windows Maintenance Programs
Computer maintenance can be both physical (dust removal, etc.) and software. The second is more related to the operating system, since the software maintenance of the PC itself at home…

Continue reading →

RAM
Random access memory - it is the RAM (RAM), it is also an opertivka. Serves for temporary storage of data with which the central processor works. Surely some are asking…

Continue reading →

How to protect a site from hacking by a hacker
With an insecure site, many troubles can happen: hacking by hackers, attacks, virus infection. Some of the most common attacks: XSS attack. The virus code is embedded in the data…

Continue reading →

recommendations

How to install WordPress on hosting

In order to install WordPress on hosting, you need to follow a few steps that we will do now. So, how to install WordPress on hosting.

Step # 1 – Creating Your Domain Directory
Log in to the control panel of your hosting (example on the IspManager 5 panel), create a domain that you should have already registered. If you have not registered a domain, it is best to do it here.

To create the root folder of a domain, click on the menu on the left “www” – “www-domains”. Then to “create”. After that, a window with the WWW-domain tab will open in front of you. Enter the following: Continue reading

Advanced CSS Hacks Collection

A hack is a method that allows CSS to be perceived only by a specific browser.
Hacks can be used not only to fix bugs in the layout, but also if certain browser features are used to speed up the rendering of a web page in it (for example, CSS3 properties)

ALL KNOWN CONDITIONAL COMMENTS IN IE
Despite their fame, there are many rarely used ones.
For example, a stylesheet that will be visible to all browsers except IE versions 5-8.
<! – [if! IE] -> <link href = “styles.css” rel = “stylesheet” media = “all” /> <! – [endif] -> Continue reading

5 fashionable ways to hide from face identification

Today, the face recognition algorithm is used everywhere. And not only in professional tracking systems or smart web services, but in various entertainment applications and basic functions like autofocus. Poster Daily decided to try to trick the algorithm with makeup.

Different systems for recognizing a human face have different goals, which is why their algorithms differ. One of the first systems that were able to establish a person’s identity from a photo looked for nodal points on the image that made up the main features of the face, and measured the distance between them. The main measurement parameters are the distance between the eyes, the width of the nose, the depth of the orbit, the shape of the cheekbones, and the length of the jaw line. Key figures in digital terms Continue reading

How to install WordPress on hosting
In order to install WordPress on hosting, you need to follow a few steps that we will do now. So, how to install WordPress on hosting. Step # 1 -…

...

IT consulting
IT consulting refers to the widest range of solutions designed to optimize existing IT resources for the needs of a particular business, its structure and features. Ultimately, its goal is…

...

Video card
A video card is also a graphics accelerator, a computer component responsible for outputting images and generating graphics, for example, in games. The video card is necessary for the computer…

...

Disabling Unnecessary Windows Services
This article provides specific recommendations about which services in Windows can be safely turned off with one caveat: if you are dealing with your personal computer that is not included…

...