This is the sonorous name of Athlon
Well, AMD is completely out of control. Rolls new processors out of the cornucopia. Most recently, on February 23, AMD announced two new processors: AMD-K6®-III-400 and AMD-K6®-III-450. By the way,…

Continue reading →

SDRAM PC100
Until recently, the development of new technologies for manufacturing memory components took place in parallel with the development of chipsets manufactured by Intel. But it so happened that in 1998…

Continue reading →

Using Zip
Iomega recommends using a Zip drive for: Extends the computer's memory by 100 MB additionally. Transferring your files to other computers when it is not possible to transfer them over…

Continue reading →

protection

Ways of spreading viruses

How are viruses and, in particular, the Win95.CIH virus spread? It is generally believed that the main path is the Internet. Other viruses cause a lot of controversy about the distribution paths (spread with games, via floppy disks, etc.). In fact, any viruses are highly democratic in their habitat. The main channel for spreading viruses is the channel through which the necessary information is transmitted most intensively. What is this information: games or necessary programs – the virus doesn’t care. Continue reading

“Clicks of Death" - what is it?
This is such a situation when the drive has lost its ability to read the servo track for proper head positioning. At the same time, the drive does not “see”…

...

The Taming of the Shrew CIH
More recently, on April 26, we witnessed the massive destruction of computers (the destruction of CMOS content) and the destruction of information on hard drives. The blow to the pocket…

...

SPD EEPROM Specification
In addition to the description of the transmission interface, I2C information, the PC SDRAM Serial Presence Detect (SPD) Specification specification defines the information recorded in the EEPROM by the manufacturer.…

...

Can I recover information myself?
Of course, in simple cases this is possible. Accidentally destroyed files are recovered by common utilities, usually without any problems. This can be done even by poorly trained users -…

...