Advanced CSS Hacks Collection
A hack is a method that allows CSS to be perceived only by a specific browser. Hacks can be used not only to fix bugs in the layout, but also…

Continue reading →

Why Kaspersky is not installed
The question of why Kaspersky is not installed is asked by many users. It is no secret to anyone that Kaspersky Anti-Virus is today considered one of the most popular…

Continue reading →

Linux operating systems
Linux is not an operating system, but just its kernel. Everything that you are accustomed to see and understand as an OS (buttons, windows and panels) - in fact, it…

Continue reading →

the malfunctioning

Processor

The central processing unit (CPU) is the core of the computer, so to speak its main brain, that component that performs the bulk of the computer’s work. They usually call it simply a processor, and sometimes because of its flint basis, “stone”.

Processors have been developing for a long time and quickly in stores, now most of them can not be found. In view of rapid development, naturally a lot of models and technologies have appeared, to disassemble them completely is a very big topic, so I will try to describe briefly.
The description of processors is often replete with various technologies, such as a set of instructions, for example, the MMX family, the SSE family, the 3DNow family! etc. Actually, these instruction sets are more likely to be interesting to Continue reading

How hackers turn our printers, cameras and thermostats into sinister cyber army

In the fall, several large hacker attacks took place in which IoT devices were used. One of them is for Russian banks. The Daily Poster tells the story of other interesting hacks and explains how attackers harm people through light bulbs and refrigerators.
Internet of things attacks Russian banks
On Thursday, November 10, five large Russian banks were subjected to DDoS attacks – a large number of junk requests came to sites that loaded servers and made sites inaccessible. The attacks went to the Moscow Exchange, Alfa Bank, Sberbank, Otkritie Bank, VTB Bank and Rosbank. Almost all banks managed to cope with the load. Among the possible organizers of the attack was a hacker under the nickname vimproducts, whose customers were allegedly dissatisfied with Russia’s interference in the Continue reading

Windows operating systems

In this article we will look at the types of Windows NT operating systems. Windows NT is not Windows2000 or any other. This is a series, or rather the platform, on the basis of which the OS is being developed. Almost the entire Windows family is based on this platform. In addition to NT, there is also a 9x platform, which includes Windows95, Windows98, and WindowsME.

Due to the fact that there were concerns about the malfunctioning of programs written taking into account old versions of the OS, the 10th version of the operating system was released immediately after the eighth. Otherwise, the 9th version in the version could be interpreted by the program as the operating system of the 9th series. Details about what NT is in this article. Continue reading

How to hack a computer
A home computer is an excellent and at the same time the most vulnerable place to attack. Hacking someone else’s PC, you can not only view the information stored in…

...

Installing a cooler on a processor
Background to the experiment: CPU cooling (LGA775 socket) was provided by the CNPS7700-AICu cooling system. Intel Pentium D930 processor, was purchased in 2005. At that time, quite powerful and expensive.…

...

Windows operating systems
In this article we will look at the types of Windows NT operating systems. Windows NT is not Windows2000 or any other. This is a series, or rather the platform,…

...