DIMM EEPROM test program dimm.exe
A quick analysis of the type of DIMM module installed in the system unit can also be done with dimm_id.exe. The program is subject to all the restrictions discussed above:…

Continue reading →

Zip Drive Frequently Asked Questions
What are the models of Zip drives? Currently, there are 2 main types of Zip drives: Zip-100 (100 MB removable disk capacity) and Zip-250 (250 MB removable disk capacity). Zip-100…

Continue reading →

The Taming of the Shrew CIH
More recently, on April 26, we witnessed the massive destruction of computers (the destruction of CMOS content) and the destruction of information on hard drives. The blow to the pocket…

Continue reading →

develops

How to recover information

Since when a file is deleted, it is not physically destroyed from the disk, it can be restored. As well as recovering all files in the case of, for example, accidentally formatting a disk. If the FAT file allocation table is intact, then you can easily find the first cluster that belongs to the file. However, the remaining clusters may lie anywhere on the disk. To restore a file, it is necessary not only to find all the clusters belonging to the file, but also to correctly determine the order of their sequence. Continue reading

Internet integration
Now business is inconceivable without close integration with the Internet. As a rule, several employees of the office need Internet access, and there is only one communication line with the…

...

“Clicks of Death" - what is it?
This is such a situation when the drive has lost its ability to read the servo track for proper head positioning. At the same time, the drive does not “see”…

...

How did the action of the Win95.CIH virus manifest on April 26, 1999 in Kiev
Naturally, the consequences of the virus will for a long time be generalized at different levels. However, the first victim of this virus brought his computer to the EPOS service…

...

Solving an iron problem is very simple
The solution to the 2000 problem related to incorrect BIOS operation is based on the standard and mandatory ability of any computer to check a specific address area when booting…

...