From Windows to Linux?
I have been repairing and maintaining computers for over 20 years. Started work at MSDOS. Then Windows 3.1; Windows 95, 98; Windows 2000 Finally, Windows XP. And today - Windows…

Continue reading →

What is a "computer generation"? Generation "2" and the following
“If the aviation industry had developed as rapidly as the computing industry in the past 25 years, now a Boeing 767 would cost $ 500 and fly around the globe…

Continue reading →

How to replace a computer mouse? The future is now!
While corporations are creating the future, I will offer a fairly simple “innovative” solution that helps with computer work. All that is needed is to replace the mouse-type manipulator with…

Continue reading →

most obvious

Why and how to solve Web-Quest?

According to my observations, after the advent of various technologies in our lives, for example, computers, the older generation increasingly begins to spy on children: “Why did we buy a computer for you? For study or for toys? ” And it’s really funny, in the eyes of caring parents, their child instead of studying is sitting at the next shooter, killing scary monsters for hours.

On the other hand, few adults can come up with an interesting use of the computer for educational purposes – well, unless options slip in the form of typing into a test editor or printout of a report on any subject. At school, the computer is used in almost the same way – the student is given the standard task, he sits at the computer for the whole lesson, and with a ringing under a funny boom, he rushes for a break, shaking out the particles of knowledge he got from his head. What interest in learning can we talk Continue reading

What is the Morris Worm?

In early November 1988, the first ever network attack on computers connected to the global network took place. Her culprit was Cornell University graduate student Robert Tappan Morris.

The program, written by Robert Morris, had a small dictionary of the most well-known passwords, which provided it with penetration of 10 percent of computers connected to ARPANET. Once on a foreign computer, the program first checked whether the same program was already installed here. If the computer was still “clean”, the program masked its presence in the system, read a file that contained information about users of the “occupied” system, forwarded this information to the author, and then Continue reading

How to keep your computer healthy?

A computer is a universal tool that allows you to work, relax, chat, or shop. At the same time, even without visiting malicious sites, you cannot be sure of protecting your computer, as the search for vulnerabilities in the IT industry is always ahead of the development of protection. Thus, you should independently worry about the safety of your data with the help of an antivirus.

What is it and why is it necessary? The comfort of using a particular system is inversely related to security. This rule has some derogations, but in general terms it looks just like that. Therefore, no matter how comfortable it is to work, one must assume the possibility of hacking. Even by accessing regular pages and not clicking any unnecessary links, you can get malware onto your computer if the page you Continue reading

How does a person control a computer? Present and future
What devices do we use to control computers with? At first there were the tumblers, then the electric typewriters. The technique developed, color video monitors appeared, various new devices appeared…

...

How to keep your computer healthy?
A computer is a universal tool that allows you to work, relax, chat, or shop. At the same time, even without visiting malicious sites, you cannot be sure of protecting…

...

How to get a Turing Award?
The most famous scientific award in the world is undoubtedly the Nobel Prize. It was founded by the famous industrialist and inventor Alfred Nobel (Alfred Bernhard Nobel; 1833 - 1896).…

...

Who are the first hackers?
Interestingly, modern schoolchildren and students of technical universities realize that the history of computers did not begin with Bill Gates, and the first hackers did not hack servers, and wrote…

...