Advanced CSS Hacks Collection
A hack is a method that allows CSS to be perceived only by a specific browser. Hacks can be used not only to fix bugs in the layout, but also…

Continue reading →

Apple Pay: what is it and how to use it
Apple Pay is a payment system that allows you to pay for goods in stores by attaching an Apple mobile device to the terminal. The system works according to the…

Continue reading →

Windows Maintenance Programs
Computer maintenance can be both physical (dust removal, etc.) and software. The second is more related to the operating system, since the software maintenance of the PC itself at home…

Continue reading →

the malfunctioning


The central processing unit (CPU) is the core of the computer, so to speak its main brain, that component that performs the bulk of the computer’s work. They usually call it simply a processor, and sometimes because of its flint basis, “stone”.

Processors have been developing for a long time and quickly in stores, now most of them can not be found. In view of rapid development, naturally a lot of models and technologies have appeared, to disassemble them completely is a very big topic, so I will try to describe briefly.
The description of processors is often replete with various technologies, such as a set of instructions, for example, the MMX family, the SSE family, the 3DNow family! etc. Actually, these instruction sets are more likely to be interesting to Continue reading

How hackers turn our printers, cameras and thermostats into sinister cyber army

In the fall, several large hacker attacks took place in which IoT devices were used. One of them is for Russian banks. The Daily Poster tells the story of other interesting hacks and explains how attackers harm people through light bulbs and refrigerators.
Internet of things attacks Russian banks
On Thursday, November 10, five large Russian banks were subjected to DDoS attacks – a large number of junk requests came to sites that loaded servers and made sites inaccessible. The attacks went to the Moscow Exchange, Alfa Bank, Sberbank, Otkritie Bank, VTB Bank and Rosbank. Almost all banks managed to cope with the load. Among the possible organizers of the attack was a hacker under the nickname vimproducts, whose customers were allegedly dissatisfied with Russia’s interference in the Continue reading

Windows operating systems

In this article we will look at the types of Windows NT operating systems. Windows NT is not Windows2000 or any other. This is a series, or rather the platform, on the basis of which the OS is being developed. Almost the entire Windows family is based on this platform. In addition to NT, there is also a 9x platform, which includes Windows95, Windows98, and WindowsME.

Due to the fact that there were concerns about the malfunctioning of programs written taking into account old versions of the OS, the 10th version of the operating system was released immediately after the eighth. Otherwise, the 9th version in the version could be interpreted by the program as the operating system of the 9th series. Details about what NT is in this article. Continue reading

A motherboard is one of the main boards (components) of a computer. It is designed to connect the remaining components of the computer into something single called the system unit.…


Video card
A video card is also a graphics accelerator, a computer component responsible for outputting images and generating graphics, for example, in games. The video card is necessary for the computer…


Rules of work and behavior on the Internet
Every Internet user should be clearly aware that the Internet can not only benefit, but also cause considerable harm. To avoid trouble, strictly follow the recommendations and rules listed below.…