Posts

Why slows down the new powerful computer

Why slows down the new powerful computer

Plan to buy a new laptop or desktop PC and think you have provided for everything? I’m not sure, that’s why the “System Administrator Blog” described the main mistake of computer buyers in the last century and little has changed…

Ferrite antenna with amplifier SDR

Ferrite antenna with amplifier SDR

Ferrite antenna is a magnetic antenna with a ferrite core. Due to the high magnetic susceptibility of ferrites, the size of the ferrite antenna is much smaller than the frame antenna, given that the induced electromotive forces in the antenna…

In what program to write music on your computer?

In what program to write music on your computer?

Today we will talk about Digital Audio Workstation (DAW, digital workstation). In short, the program in which we will do the museum and not only. With the appearance and development of such programs to create music has become much easier. To…

How to fix the slow and hanging Internet at home

How to fix the slow and hanging Internet at home

Internet is slow. A few steps away from the room and the speed drops. Irritating. Does this situation look familiar? Coverage area and device support I thought that one router is not enough and started looking for additional. I found…

How to avoid hacker attacks in production

How to avoid hacker attacks in production

Industrial enterprises are regularly targeted by hackers. For example, Kaspersky ICS CERT (Kaspersky Labs project) estimated that last year they blocked malicious objects on almost every second computer of the protected automated process control systems (PCS). In our experience, plant…

TOP 10 gadgets of decade

TOP 10 gadgets of decade

For the last ten years, there have been many changes in the world of gadgets. The brightest novelties of electronic devices, which were created during this time, are remembered by many. This article presents the 10 most popular gadgets of…

Switch from Windows to Linux

Switch from Windows to Linux

How to make a transition from one operating system to another. Given the fact that most users prefer the product from microsoft. Microsoft is famous for being almost the first to create an operating system with a graphical interface. But…

Folder Blaster

Folder Blaster

The commands that we use to create batch files are actually the same commands that were first implemented in MS-DOS (ancient microsoft). These commands DOS(disk operating system) can also be used in a command line window. Whatever your batch file…

Blind zones SSL

Blind zones SSL

Today’s threat landscape requires a comprehensive deep security strategy that often includes interception and inspection of traffic within SSL. Since most attacks use some type of encryption, the ability to log and verify encrypted content is vital. SSL inspection work…

Restore RAID-1 or how to change the wrong drive

Restore RAID-1 or how to change the wrong drive

A disk in the mdadm raid failed on one of the servers in the data center. This is a typical situation that I regularly encounter. I left a request for technical support to replace the disk, indicating the disk to…

The impact of information on people

The impact of information on people

The oldest mechanism of influence is infection, it is a transfer of a certain emotional and psychological mood from one person to another, based on an appeal to the emotional and conscious sphere of the person (infection with panic, irritation,…

Windows: creating the perfect system

Windows: creating the perfect system

Although Windows 10 is far from perfect, it offers a lot of possibilities for customization. We tell you how to change inconvenient system settings even without knowledge of registry functions – just by downloading the necessary command files. Windows 10…

Slow Internet, weak signal. How to fix it

Slow Internet, weak signal. How to fix it

With a high probability in the house all (or almost all) have Wi-Fi. This means that the load on the channel is high. Bottom line: low Internet speed and signal interruptions. Define which channels are free and switch to one…

Rooting Android phone

Rooting Android phone

There are tens of thousands of unique android devices, and almost all of them have a slightly different method of rotation. So, in this article, we will go over everything you need to know about the routing of your android…

Flameshot – screenshoter

Flameshot – screenshoter

flameshot is a screenshot tool that aims to be powerful yet simple-to-use. Its notable features include customizable appearance, in-app screenshot editing, D-Bus interface, experimental GNOME/KDE Wayland support, integration with Imgur and support for both GUI and CLI interface. It works…

Apps that speed up your Wi-Fi

Apps that speed up your Wi-Fi

Working with slow connection speeds, unreliable signals or signals out of range can be a big problem. Whether the business you are in, or just watching Netflix at home, a strong and stable Wi-Fi signal is preferable, but not always achievable. Instead…

Selecting Encrypted Cloud Storage

Selecting Encrypted Cloud Storage

Today I will tell you about some cloud services that support encryption, namely, encryption of the client part. This is very important for confidentiality and overall data security. Encryption of the client part is not provided by such services as…

What’s missing AI?

What’s missing AI?

This is a post-interview, where I tried to formulate the main problems of neural networks, the solution of which can make a breakthrough in AI technology. It is mainly about networks that work with text (GPT, BERT, ELMO, etc.). As…

Automate address configuration in IPv6

Automate address configuration in IPv6

IPv4 has only two options: static address and default gateway configuration or DHCP. Today we will take a closer look at what has replaced the classic DHCP from IPv4, how it works and how to live with it. We have…

Cyberattack map

Cyberattack map

Almost every second, both automated systems and simple IS specialists crack hundreds of servers and devices. These attacks are monitored and the information about them is carefully analyzed. Usually, the collected data are classified, but the harmless part of them…

Do NOT follow this link or you will be banned from the site!