Solving an iron problem is very simple
The solution to the 2000 problem related to incorrect BIOS operation is based on the standard and mandatory ability of any computer to check a specific address area when booting…

Continue reading →

How to avoid network downtime?
A network of any company or organization is created to provide users with easy access to information, applications and network services. However, both company’s productivity and revenues can suffer significantly…

Continue reading →

How to recover information
Since when a file is deleted, it is not physically destroyed from the disk, it can be restored. As well as recovering all files in the case of, for example,…

Continue reading →

system

The Taming of the Shrew CIH

More recently, on April 26, we witnessed the massive destruction of computers (the destruction of CMOS content) and the destruction of information on hard drives. The blow to the pocket of computer owners was quite tangible. The virus was made Win95.CIH. The next awakening of this virus (more precisely, its two varieties: CIH.1010.B and CIH.1019) is expected on June 26. But how many of us made the right conclusions from what happened on April 26? And what, in fact, need to draw conclusions? Continue reading

The Iron Problem of 2000

The 2000 issue is already becoming a hot topic. Moreover, a little more than 200 days remain before its onset. The point is that, for a number of reasons, in computer systems the abbreviated designation of the year is very widely used – in the form of two digits. Until now, this has not led to confusion: the first two digits of the year have always been “19”. With the advent of 2000, there will inevitably be confusion in the interpretation of the meaning of the year. Continue reading

Processor performance
You can still praise the advantages of technical solutions of the processor. Moreover, the “stone” turned out to be really successful. But many are probably most interested in the end…

...

Work "the old fashioned way"
Traditionally, if there are 2 ... 3 computers in the office, they communicate with each other by a peer-to-peer network. This is a network in which all computers are equitable.…

...

Gentlemen's set for office local area network
The composition of the computer equipment used in the office is traditional and is determined by the typical tasks facing employees. Modern business requires the automation of accounting and warehouse…

...

SPD EEPROM: Functioning Algorithm
With the advent of the new SDRAM standard, a new I2C interface has also appeared. The interface was developed by Philips and is used as an internal auxiliary bus of…

...