Gentlemen's set for office local area network
The composition of the computer equipment used in the office is traditional and is determined by the typical tasks facing employees. Modern business requires the automation of accounting and warehouse…

Continue reading →

Ways of spreading viruses
How are viruses and, in particular, the Win95.CIH virus spread? It is generally believed that the main path is the Internet. Other viruses cause a lot of controversy about the…

Continue reading →

IDE Interface Features
The main requirement of the recording device to the interface is the ability to continuously transmit data to it during the recording process. Requirements for the speed of receipt of…

Continue reading →

reason

Golden Disks and IDE

The problem of recording “golden” discs has already been covered on our website (as well as in the journal CHIP, No. 8, 1999). However, the problems continue. Only, if earlier it was said that recording on “golden” disks is generally unreliable, now many people notice that recording on devices with an IDE interface is unreliable, and that recording devices with an IDE interface are generally less reliable compared to their SCSI counterparts. Continue reading

The Iron Problem of 2000

The 2000 issue is already becoming a hot topic. Moreover, a little more than 200 days remain before its onset. The point is that, for a number of reasons, in computer systems the abbreviated designation of the year is very widely used – in the form of two digits. Until now, this has not led to confusion: the first two digits of the year have always been “19”. With the advent of 2000, there will inevitably be confusion in the interpretation of the meaning of the year. Continue reading

Excellent coprocessor (FPU)
This time it turned out with a floating point. In time, apparently, they lured the team of Dirk Meyer, one of the creators of Alpha 21264. Now the floating point…

...

Checking the status of the Zip drive
TIP.EXE is a Zip disk surface quality test. The principle of the program is as follows: this program reads each sector of data from the disk, enters them into the…

...

Viruses are serious, and Win95.CIH is not alone
Currently, there are quite a few viruses that destroy the contents of CMOS. For example, the stealth virus FindMe (stealth virus - “invisible virus”, like the stealth bomber), the destructive…

...

Operating system role
The operating system is the ultimate authority in resolving hardware problems associated with the change of centuries. It is the operating system in most cases that tells applications the current…

...