6 most expensive supercomputers, which amaze with their power
The first Atlas supercomputer appeared in the early 60s and was installed at the University of Manchester. It was at times less powerful than modern home computers. In our review,…

Continue reading →

5 clear evidence of future death of system units
Apparently, the era of large system units of personal computers and peripheral devices connected to them is being pumped. And this happens not only because of the rapid development of…

Continue reading →

15 little-known facts about Microsoft
When it comes to large technology companies, most people immediately recall Microsoft. Everyone knows that this computer company was founded by Bill Gates - one of the richest people in…

Continue reading →

If you do not have antivirus

On Lifehacker today published an interesting article about how to survive on a computer running Windows, without having in the arsenal of antivirus software. The note is quite interesting and useful, useful even for those who still have antivirus.

I will not retell the essence of the note (read), I will only slightly supplement it with my thoughts about downloading files and working with e-mail, which can help you not to reward your computer with malware, even if there is an antivirus program on it. Anti-virus databases are updated only after the malware is detected, not the other way around.

I would like to add about the opening of questionable files. Many users, getting on the Internet, periodically search for one or another program. Most often used to search either social networks or search engines. If the second option is most preferable, then the first often leads to infection of the computer.

When you search for a program through a search engine, in most cases you will receive a link to the official site of this program in one of the first lines of search results. The safest way to download this or that program is to download it from the official site (it’s impossible to pick up a virus in the distribution package of the program downloaded from the official site if the developer is not suicidal).

When you are looking for a program through various social networks, asking for a link from visitors, then it is likely that instead of a link to the official website, they will link to file sharing sites like Rapidshire, Depositfiles, etc. That’s just on such sites, the probability of downloading the virus is the highest, because the distribution kit is placed there not by the developers, but by hackers, who under the guise of the free version (most likely it is, because they usually add hacked programs to it) add a virus or Trojan there.

As a result, the user gets a free program, and with it, malware, which can easily either bring down the system, or begin to infect other computers on the network, or steal personal data, such as passwords for various resources, credit card numbers, and so on. Or can do all of the above at once.

Regarding reading emails. Never open / run files attached to letters even if the letter was sent by the best friend (unless, of course, you expect a file from it). To make sure that a friend sent you a file, you can call him or reset the sms with the appropriate question whether he really sent something. If he confirms this fact, then you can open. If he is surprised and responds negatively, then there is a virus. This is especially true of empty letters, where in addition to the attached file there is nothing, no accompanying text describing the attachment.

Personalization in Windows 7
In addition to other useful features, Windows 7 operating system has flexible appearance settings - it would seem a trifle, but it's nice that any user can make the system…

...

File systems and their types
Files on storage media (hard drives, flash drives, optical media, etc.) are organized, stored and named according to a certain order, which is called the file system. Different media have…

...

Choosing a processor for a modern computer
The processor is known to be the basis of any personal computer or laptop. The processor performs the tasks of software used on a computer or laptop, processes data and…

...

Smartball - the computer manipulator of the future
Following the rapid development of computer technology, there is also a revolution in interfaces. Including, digital gadgets control devices. An example of this is the concept of a computer manipulator…

...