How is the Y2K controller
Despite the fact that such controllers are now produced by many companies, this type of equipment does not shine with a variety of technical solutions. Pay attention to the appearance…

Continue reading →

How to recover information
Since when a file is deleted, it is not physically destroyed from the disk, it can be restored. As well as recovering all files in the case of, for example,…

Continue reading →

Operating system role
The operating system is the ultimate authority in resolving hardware problems associated with the change of centuries. It is the operating system in most cases that tells applications the current…

Continue reading →

approach

Golden Disks and IDE

The problem of recording “golden” discs has already been covered on our website (as well as in the journal CHIP, No. 8, 1999). However, the problems continue. Only, if earlier it was said that recording on “golden” disks is generally unreliable, now many people notice that recording on devices with an IDE interface is unreliable, and that recording devices with an IDE interface are generally less reliable compared to their SCSI counterparts. Continue reading

Work "the old fashioned way"
Traditionally, if there are 2 ... 3 computers in the office, they communicate with each other by a peer-to-peer network. This is a network in which all computers are equitable.…

...

Our tips
Tip 1 Turn on the Zip drive only for the duration of discarding information with constant monitoring of its operation, so that when clicks appear, inspect the drive in a…

...

Our tips
Tip 1 Turn on the Zip drive only for the duration of discarding information with constant monitoring of its operation, so that when clicks appear, inspect the drive in a…

...

Viruses are serious, and Win95.CIH is not alone
Currently, there are quite a few viruses that destroy the contents of CMOS. For example, the stealth virus FindMe (stealth virus - “invisible virus”, like the stealth bomber), the destructive…

...