How is the Y2K controller
Despite the fact that such controllers are now produced by many companies, this type of equipment does not shine with a variety of technical solutions. Pay attention to the appearance…

Continue reading →

How to recover information
Since when a file is deleted, it is not physically destroyed from the disk, it can be restored. As well as recovering all files in the case of, for example,…

Continue reading →

Excellent coprocessor (FPU)
This time it turned out with a floating point. In time, apparently, they lured the team of Dirk Meyer, one of the creators of Alpha 21264. Now the floating point…

Continue reading →

fax

Internet integration

Now business is inconceivable without close integration with the Internet. As a rule, several employees of the office need Internet access, and there is only one communication line with the provider. To increase the efficiency of office employees, a proxy server must be installed on the same LAN server. Modern versions of proxy-servers have quite powerful means of protecting the local network, which in itself is important. Continue reading

How is the Y2K controller
Despite the fact that such controllers are now produced by many companies, this type of equipment does not shine with a variety of technical solutions. Pay attention to the appearance…

...

The Taming of the Shrew CIH
More recently, on April 26, we witnessed the massive destruction of computers (the destruction of CMOS content) and the destruction of information on hard drives. The blow to the pocket…

...

Z-tracks
In devices with a moving coil there are no pre-fixed positions. Instead, they use a special guidance system (positioning), which accurately brings the heads to the desired track. The system…

...

Ways of spreading viruses
How are viruses and, in particular, the Win95.CIH virus spread? It is generally believed that the main path is the Internet. Other viruses cause a lot of controversy about the…

...