Computer assembly
Installation is performed in this order: first, the processor, cooler, random access memory (RAM), motherboard, video card, power supply, hard drive and optical drive. Also consider the problems when you…

Continue reading →

PC Recommendations
Now we will consider the question of choosing a personal computer (PC). Immediately it is worth noting that the examples below are taken from the price list of the DNS…

Continue reading →

Cleaning your computer from dust
The topic Cleaning the computer (judging by the queries in the search engine) from the point of view of the user for the most part involves cleaning the garbage of the…

Continue reading →

the malfunctioning

Processor

The central processing unit (CPU) is the core of the computer, so to speak its main brain, that component that performs the bulk of the computer’s work. They usually call it simply a processor, and sometimes because of its flint basis, “stone”.

Processors have been developing for a long time and quickly in stores, now most of them can not be found. In view of rapid development, naturally a lot of models and technologies have appeared, to disassemble them completely is a very big topic, so I will try to describe briefly.
The description of processors is often replete with various technologies, such as a set of instructions, for example, the MMX family, the SSE family, the 3DNow family! etc. Actually, these instruction sets are more likely to be interesting to Continue reading

How hackers turn our printers, cameras and thermostats into sinister cyber army

In the fall, several large hacker attacks took place in which IoT devices were used. One of them is for Russian banks. The Daily Poster tells the story of other interesting hacks and explains how attackers harm people through light bulbs and refrigerators.
Internet of things attacks Russian banks
On Thursday, November 10, five large Russian banks were subjected to DDoS attacks – a large number of junk requests came to sites that loaded servers and made sites inaccessible. The attacks went to the Moscow Exchange, Alfa Bank, Sberbank, Otkritie Bank, VTB Bank and Rosbank. Almost all banks managed to cope with the load. Among the possible organizers of the attack was a hacker under the nickname vimproducts, whose customers were allegedly dissatisfied with Russia’s interference in the Continue reading

Windows operating systems

In this article we will look at the types of Windows NT operating systems. Windows NT is not Windows2000 or any other. This is a series, or rather the platform, on the basis of which the OS is being developed. Almost the entire Windows family is based on this platform. In addition to NT, there is also a 9x platform, which includes Windows95, Windows98, and WindowsME.

Due to the fact that there were concerns about the malfunctioning of programs written taking into account old versions of the OS, the 10th version of the operating system was released immediately after the eighth. Otherwise, the 9th version in the version could be interpreted by the program as the operating system of the 9th series. Details about what NT is in this article. Continue reading

Ways to replace the motherboard without reinstalling for Windows 7
As a rule, after upgrading the computer with replacing the motherboard, the user has to install the operating system “clean”, installing the necessary programs along the way. All this can…

...

Video card
A video card is also a graphics accelerator, a computer component responsible for outputting images and generating graphics, for example, in games. The video card is necessary for the computer…

...

How to protect a site from hacking by a hacker
With an insecure site, many troubles can happen: hacking by hackers, attacks, virus infection. Some of the most common attacks: XSS attack. The virus code is embedded in the data…

...

Bat files, examples
You can execute all the examples published below not only by creating and running a BAT file containing these commands, but by copying them directly to the command line. To…

...