Zip Drive Frequently Asked Questions
What are the models of Zip drives? Currently, there are 2 main types of Zip drives: Zip-100 (100 MB removable disk capacity) and Zip-250 (250 MB removable disk capacity). Zip-100…

Continue reading →

Solving an iron problem is very simple
The solution to the 2000 problem related to incorrect BIOS operation is based on the standard and mandatory ability of any computer to check a specific address area when booting…

Continue reading →

Operating system role
The operating system is the ultimate authority in resolving hardware problems associated with the change of centuries. It is the operating system in most cases that tells applications the current…

Continue reading →

purchase equipment

Processor performance

You can still praise the advantages of technical solutions of the processor. Moreover, the “stone” turned out to be really successful. But many are probably most interested in the end result. I hasten to immediately assure that the Athlon really surpasses the P-III in all respects. It is no accident, apparently, this time AMD performed almost all the performance tests familiar and unfamiliar to us. Continue reading

“Clicks of Death” – what is it?

This is such a situation when the drive has lost its ability to read the servo track for proper head positioning. At the same time, the drive does not “see” where its heads are and interrupts the operation of writing / reading data. Then the heads are removed from the cartridge and a click is heard. In such a situation, the Iomega strategy involves repeating attempts to read data, having previously wiped the heads and returned them to their original position at the zero point. Continue reading

How to choose additional equipment

An important place in the LAN of the office is occupied by the wiring closet. The cabinet itself does not directly participate in the work of the LAN, but it allows you to protect the active and passive equipment that is installed in it from the playful pens of curious employees, dust, electromagnetic fields, temperature changes and mechanical influences. If you are seriously worried about the security of information stored on the server, and you want to restrict access to it by unauthorized persons, then a server should also be installed in a lockable cabinet of a suitable size. Continue reading

Viruses are serious, and Win95.CIH is not alone
Currently, there are quite a few viruses that destroy the contents of CMOS. For example, the stealth virus FindMe (stealth virus - “invisible virus”, like the stealth bomber), the destructive…

...

Viruses are serious, and Win95.CIH is not alone
Currently, there are quite a few viruses that destroy the contents of CMOS. For example, the stealth virus FindMe (stealth virus - “invisible virus”, like the stealth bomber), the destructive…

...

But this is not Intel at all!
The ways of AMD and Intel, from our point of view, have long diverged. If earlier it was possible to install at least Intel or at least AMD into the…

...

How to recover information
Since when a file is deleted, it is not physically destroyed from the disk, it can be restored. As well as recovering all files in the case of, for example,…

...