Pull to refresh

My feed

Type
Rating limit
Level of difficulty
Warning
To set up filters sign in or sign up
Article

How to Disable Password Request or Account Password in Windows 10, 8 or 7

Reading time 6 min
Views 13K
Read this article to learn how to disable password request when booting Windows 10, 8 or 7. How to remove an account password and have Windows boot automatically and right to the desktop screen, without having to enter logins and passwords.

image
Read more →
Total votes 4: ↑0 and ↓4 -4
Comments 0
Article

Kaspersky Removed an Important File, What To Do?

Reading time 11 min
Views 4.6K
Read this article to find out what to do if an antivirus removed important files and how to recover them. What is a quarantine and how to configure exclusions for an antivirus? Learn more about causes of data loss and available effective methods to restore missing user files.

image
Total votes 4: ↑0 and ↓4 -4
Comments 0
Article

The true cost of free labour — and how startup founders can find their way around it

Reading time 4 min
Views 1.3K

Starting a startup can be tricky. To make money, you need clients. To attract clients, you need a portfolio. To have an attractive portfolio, you need to… Well, you see where I’m going with this. A lot of founders offer their services for free to escape this cycle. However, there are plenty of issues with this approach. It’s certainly not the silver bullet it might seem. Here we are discussing this topic in detail.

Continue Reading
Total votes 4: ↑3 and ↓1 +2
Comments 0
Article

How to Start Reverse Engineering in 2021

Reading time 4 min
Views 53K

Reverse engineering might seem so complex, that not everyone has the bravery required to tackle it. But is it really that hard? Today we are gonna dive into the process of learning how to reverse engineer.

First of all, try to answer yourself, what are you hoping to achieve with reverse engineering? Because reverse engineering is a tool. And you should choose the right tool for your task. So when reverse engineering might be useful?

Read more
Total votes 3: ↑3 and ↓0 +3
Comments 0
Article

2020 Network Security and Availability Report

Reading time 9 min
Views 955

By the beginning of 2021, Qrator Labs filtering network expands to 14 scrubbing centers and a total of 3 Tbps filtering bandwidth capacity, with the San Paolo scrubbing facility fully operational in early 2021;

New partner services fully integrated into Qrator Labs infrastructure and customer dashboard throughout 2020: SolidWall WAF and RuGeeks CDN;

Upgraded filtering logic allows Qrator Labs to serve even bigger infrastructures with full-scale cybersecurity protection and DDoS attacks mitigation;

The newest AMD processors are now widely used by Qrator Labs in packet processing.

DDoS attacks were on the rise during 2020, with the most relentless attacks described as short and overwhelmingly intensive.

However, BGP incidents were an area where it was evident that some change was and still is needed, as there was a significant amount of devastating hijacks and route leaks.

In 2020, we began providing our services in Singapore under a new partnership and opened a new scrubbing center in Dubai, where our fully functioning branch is staffed by the best professionals to serve local customers.

Read more
Total votes 17: ↑17 and ↓0 +17
Comments 0
Article

BIOS Beep Codes for Troubleshooting

Reading time 6 min
Views 43K
In this article, we collected the most widespread BIOS signals (beepcodes) used for troubleshooting in case of any PC issues. Yet if your computer gives a sound signal which is not listed below, consult the motherboard / PC user manual to identify what kind of hardware error it is.

image
Read more →
Total votes 2: ↑0 and ↓2 -2
Comments 1
Article

Gyrators

Reading time 13 min
Views 3K


Gyrators are impedance converters usually used to simulate inductance in circuits. Though they are rarely used in discrete electronics, they are interesting circuits looking like pole dancers in pictures. There are studies on gyrators, but still something is missing, so it is interesting to do another one.
Read more →
Total votes 4: ↑4 and ↓0 +4
Comments 0
Article

Example of How New Diagnostics Appear in PVS-Studio

Reading time 4 min
Views 564

PVS-Studio new C++ rule


Users sometimes ask how new diagnostics appear in the PVS-Studio static analyzer. We answer that we draw inspiration from a variety of sources: books, coding standards, our own mistakes, our users' emails, and others. Recently we came up with an interesting idea of a new diagnostic. Today we decided to tell the story of how it happened.

Read more →
Rating 0
Comments 0
Article

How to Restore Hard Disk Capacity and Recover Missing Space

Reading time 18 min
Views 4.1K
If the disk space in your computer is incorrectly displayed, or free disk space decreases, or the overall disk performance deteriorates, all that may happen for a number of reasons. Read this article to find out how to restore original capacity of a hard disk and recover the missing disk space.

image
Total votes 5: ↑0 and ↓5 -5
Comments 0
Article

How to Recover Data from RAID 5, 1, 0 on Linux

Reading time 5 min
Views 6.5K
In this article, you will find a detailed tutorial on data recovery from RAID 0, 1 or 5. The array we have been testing was built on Linux, and the methods described here will help you recover your files even if one or several disks break down.

image
Total votes 2: ↑1 and ↓1 0
Comments 0
Article

SmartTraits or lets add «multiple inheritance» to C#

Reading time 13 min
Views 1.4K


One of our clients, a developer who used to work with php technologies for quite some time, frequently complained that with the transition to C# and .Net stack, he misses one of his favorite features from the php world — traits and he would like it very much to be able to use such functionality in .Net.

At one point, we decided to make him a present and implemented a proof of concept of similar functionality for C#.

To our surprise, it was quite easy to implement the PoC and the process of development was a lot of fun.
Read more →
Rating 0
Comments 0
Article

Architecting Architecture: Makers and Takers

Reading time 12 min
Views 1.6K

The step has been made. Not sure where to, but for sure from the point of no return. Keep calm and keep walking. It is about time to look around and understand the smelly and slippery route before you. And what are those noisy creatures swarming around our fishy “innovative” design we called Mandelbrot blueprint? You don't get a buzzing noise like that, just buzzing and buzzing, without its meaning something.

Read more
Total votes 4: ↑4 and ↓0 +4
Comments 1
Article

How to Recover Data From a Hikvision DVR

Reading time 5 min
Views 24K
From this article, you will learn how to recover data from DVR and NVR video recorders. We will explore the peculiarities of how they store video files, why such files can be lost, and how they can be recovered. In the process, we’ll be using a IP network video recorder Hikvision DS-7104NI-Q1/4P.

image
Total votes 14: ↑3 and ↓11 -8
Comments 4
Article

Data Recovery from LVM Volumes in Linux

Reading time 5 min
Views 11K
Would you like to know how to use the LVM technology in Linux? How to create an LVM volume, how to configure and mount it in your operating system, how to add and remove disks, and how to recover the information you have accidentally deleted? In today’s article, you will find all of that – and even more.

image
Total votes 15: ↑3 and ↓12 -9
Comments 7
Article

How to Make Your Windows 10 Laptop Work Better

Reading time 12 min
Views 11K
Read this article to find out how to get your laptop ready for all kinds of tasks without paying extra. And how to configure Windows 10 in the best way. We will explore how to maintain Windows 10, configure system security and laptop power settings, what software to install and how to connect peripherals. Here is the best all-round guide for you!

image
Read more →
Total votes 29: ↑6 and ↓23 -17
Comments 10