Almost everything about SPD-EEPROM ...
To this day, there are still SDRAM DIMMs operating at 66 MHz frequencies that are not equipped with the SPD-EEPROM chip, which contains the most important time parameters and data…

Continue reading →

Ways of spreading viruses
How are viruses and, in particular, the Win95.CIH virus spread? It is generally believed that the main path is the Internet. Other viruses cause a lot of controversy about the…

Continue reading →

Operating system role
The operating system is the ultimate authority in resolving hardware problems associated with the change of centuries. It is the operating system in most cases that tells applications the current…

Continue reading →

Our tips

Tip 1
Turn on the Zip drive only for the duration of discarding information with constant monitoring of its operation, so that when clicks appear, inspect the drive in a timely manner and prevent a possible malfunction that occurs in the device or cartridge itself.

The zip drive is very sensitive to both the number of on-offs and the time the heads are above the disk. Zip internal drives are better protected from external influences, and, thanks to the SCSI or IDE interface, they have several times faster information exchange, which means less load on the write-read node.

Tip 2
Before using Zip, lift the protective shutter on the front panel of the Zip drive and see what condition the heads are in. In good condition, they will look the same as in fig. 5. It will not be very simple, but the inspection will make sure that before starting work with an unknown disk, your drive was working. It is advisable to do the same procedure at the end of work with the cartridge.
If you suspect that the heads are not positioned correctly on the parking mat, contact (before it is too late) specialists.

Tip 3
If you suspect that your diskette is “infected”, in no case try to read it using another drive. This can lead to its failure.

Work "the old fashioned way"
Traditionally, if there are 2 ... 3 computers in the office, they communicate with each other by a peer-to-peer network. This is a network in which all computers are equitable.…

...

Intranet no problem
Out of the scope of the article, issues of software selection and technical details of network configuration deliberately remained. These issues must always be addressed specifically for a particular customer.…

...

Viruses are serious, and Win95.CIH is not alone
Currently, there are quite a few viruses that destroy the contents of CMOS. For example, the stealth virus FindMe (stealth virus - “invisible virus”, like the stealth bomber), the destructive…

...

Auto Head Parking
Fall to the surface with a characteristic "crackle". At the same time, they tear off microscopic particles from the surface, consisting of particles of the working layer of the carrier.…

...