Zip Technologies: Pros and Cons
Since the creation of the FDD 3.5 "1.44 MB high-density, a lot of time has passed and this type of media has not undergone any changes during this period, while…

Continue reading →

Our tips
Tip 1 Turn on the Zip drive only for the duration of discarding information with constant monitoring of its operation, so that when clicks appear, inspect the drive in a…

Continue reading →

Can I recover information myself?
Of course, in simple cases this is possible. Accidentally destroyed files are recovered by common utilities, usually without any problems. This can be done even by poorly trained users -…

Continue reading →

disks infected

How to recover information

Since when a file is deleted, it is not physically destroyed from the disk, it can be restored. As well as recovering all files in the case of, for example, accidentally formatting a disk. If the FAT file allocation table is intact, then you can easily find the first cluster that belongs to the file. However, the remaining clusters may lie anywhere on the disk. To restore a file, it is necessary not only to find all the clusters belonging to the file, but also to correctly determine the order of their sequence. Continue reading

Almost everything about SPD-EEPROM ...
To this day, there are still SDRAM DIMMs operating at 66 MHz frequencies that are not equipped with the SPD-EEPROM chip, which contains the most important time parameters and data…

...

How did the action of the Win95.CIH virus manifest on April 26, 1999 in Kiev
Naturally, the consequences of the virus will for a long time be generalized at different levels. However, the first victim of this virus brought his computer to the EPOS service…

...

DIMM EEPROM test program dimm.exe
A quick analysis of the type of DIMM module installed in the system unit can also be done with dimm_id.exe. The program is subject to all the restrictions discussed above:…

...

Can I recover information myself?
Of course, in simple cases this is possible. Accidentally destroyed files are recovered by common utilities, usually without any problems. This can be done even by poorly trained users -…

...