Meeting a snowdrop in February is as difficult as finding a computer that does not have a browser installed.
A browser is a window on the Internet. From this program it will depend on how quickly your windows open, how safe and convenient you are to use the World Wide Web.
I got a computer 12 years ago, I started using the Internet 10 years ago, and since then I have tried all the browsers that were popular at that time.
I offer a small comparative analysis of these programs, namely Mozilla Firefox, Internet Explorer, Opera. Continue reading
It all started with the fact that I connected to the regional fishing net. The speed of 100Mbps was very impressive and pleasantly pleased. The Internet was incredibly bright (especially when you consider that I used to be on a modem connection). But here is a problem, on a stationary computer I sit very rarely, as I got a laptop and now I do all the work on it. Conveniently, the laptop is always with you both at home and at work. The task was to connect the laptop to the Internet through a stationary computer.
The fact is that the main mechanism for identifying users in regional networks is identification by the MAC address of the network card. And if I disconnect the stationary computer from the provider’s network and connect a laptop in its place, I get a “turnaround” from the gate, since the network card on the laptop has a Continue reading
Sometimes it happens that after the boot screen of the Windows operating system, the blue CHKDSK screen pops up with percent calculations instead of the usual desktop boot.
What is this screen reporting about? It tells the user that one or more partitions of the computer’s hard drive is possibly damaged, or the file system is damaged. Next, the verification of volumes for suitability for further work begins. The scan time depends on the size of the partitions being checked and on the processor clock speed, as well as the amount of RAM. Naturally, you can skip this verification screen, and we are informed about this before the start of scanning and verification, but this is not recommended Continue reading