computer problems
Should I use a standard video editor? Windows movie maker
When a large amount of diverse video material is accumulated on the computer of an ordinary user, a definite desire arises (especially given the existence of the Internet and many social networks in it) to share it with as many people as possible.
Home video material such as filming holidays, hiking and other events is calmly laid out on the same YouTube video hosting, some more special shootings can be used to create a variety of video reviews, video blogs and similar Internet hobbies. In any case, the video material that should be posted on the Web often needs some work – if not color correction, then at least cropping unsuccessful fragments. Special programs for such work are video editors (video editors). Continue reading
From Windows to Linux?
I have been repairing and maintaining computers for over 20 years. Started work at MSDOS. Then Windows 3.1; Windows 95, 98; Windows 2000 Finally, Windows XP. And today – Windows 7 and 8.
These operating systems were far from always satisfactory. Firstly – paid and not cheap. Secondly, applications are also mostly paid. The third point is unstable operation, crashes, glitches and, in connection with this, loss of information. Windows is susceptible to viruses. It is necessary to equip the computer with anti-virus applications. At the same time, there is another operating system – Linux, which practically does not have these shortcomings. And most importantly – it’s free. Yes, and almost all software is also free. At the initial stage of development, Linux was difficult for the average user, since Continue reading
What is the Morris Worm?
In early November 1988, the first ever network attack on computers connected to the global network took place. Her culprit was Cornell University graduate student Robert Tappan Morris.
The program, written by Robert Morris, had a small dictionary of the most well-known passwords, which provided it with penetration of 10 percent of computers connected to ARPANET. Once on a foreign computer, the program first checked whether the same program was already installed here. If the computer was still “clean”, the program masked its presence in the system, read a file that contained information about users of the “occupied” system, forwarded this information to the author, and then Continue reading