Information Disaster April 26
In April, the biggest problem of the month related to computers can rightly be considered the epidemic of the Win95.CIH virus - Chernobyl. Everyone is used to the presence of…

Continue reading →

DIMM EEPROM test program dimm.exe
A quick analysis of the type of DIMM module installed in the system unit can also be done with dimm_id.exe. The program is subject to all the restrictions discussed above:…

Continue reading →

Design Features of the Zip Drive Head Drive
Unlike HDDs, the Zip drive uses a linear drive with a moving coil. There are two types of drive mechanisms for moving coil heads: linear and rotary. These types differ…

Continue reading →

frequencies

SPD EEPROM Specification

In addition to the description of the transmission interface, I2C information, the PC SDRAM Serial Presence Detect (SPD) Specification specification defines the information recorded in the EEPROM by the manufacturer. The need for such a specification was caused by the fact that the main problems when installing SDRAM in computer systems are associated with incorrect interaction between the BIOS on the motherboard and the EEPROM on the memory module.

The fact is that many Taiwanese motherboard manufacturers using the Intel 440BX chipset install their own BIOS, which has the function of disabling the reading of information from the EEPROM. In this case, the system parameters are set manually when entering SETUP, or the BIOS itself sets the system parameters for working with standard memory. Continue reading

SDRAM PC100

Until recently, the development of new technologies for manufacturing memory components took place in parallel with the development of chipsets manufactured by Intel. But it so happened that in 1998 an advance was formed in the technology of manufacturing chipsets, and memory manufacturers lagged behind. No one could have imagined that a 100 MHz bus would powerfully clear its way. Continue reading

Intranet no problem
Out of the scope of the article, issues of software selection and technical details of network configuration deliberately remained. These issues must always be addressed specifically for a particular customer.…

...

How to recover information
Since when a file is deleted, it is not physically destroyed from the disk, it can be restored. As well as recovering all files in the case of, for example,…

...

Work "the old fashioned way"
Traditionally, if there are 2 ... 3 computers in the office, they communicate with each other by a peer-to-peer network. This is a network in which all computers are equitable.…

...

Golden Disks and IDE
The problem of recording "golden" discs has already been covered on our website (as well as in the journal CHIP, No. 8, 1999). However, the problems continue. Only, if earlier…

...