Directory of RSS feeds
Statistics

RSS feeds in the directory: 2799

Added today: 0

Added yesterday: 0

Hi-Tech / Hardware

SvensIT

SvensIT.com - news and events in the IT world

Found 7 items

MINI-FP54.01 — portable fiscal printer with the control tape in electronic form and integrated GSM/GPRS modem. Has an Ethernet port for a wired connection to the Internet. Works with a large base of products. Fiscal Registrar MINI-FP54.01 has a control tape in electronic form (CSEF, CLAP) and meets all the requirements of the legislation of Ukraine to the RRO, including the latest changes for 2015. Ethernet and built-in GSM/GPRS modem (optional) transmits the data through wired or wireless communication channels. Fiscal Registrar MINI-FP54.01 has small dimensions, reliability and broad functionality that allow using application software, which is available for free download at our website: the monitoring of the state fiscal register and the integrated...

Very often we have to produce any actions on the file system, and for this we need to have full access to this file for the possibility of modifying it. Here's what we'll do now. But first we need to create a system restore point to roll back in case of failure. So there you go! First, for convenience, we will create item in Explorer context menu, from which we will modify the necessary access rights to the files. For this I give you the text you need to copy and save under a filename, for example, access. reg, these files are designed to make changes in the system registry. Copy this text: Windows Registry Editor Version 5.00 [HKEY_CLASSES_ROOT\*\shell\runas] @=”Set full dostup” “NoWorkingDirectory”=”” [HKEY_CLASSES_ROOT\*\shell\runas\command] @=”cmd.exe...

In today's article I want to tell you about such useful features as you add applications to the context menu of Windows 7. This allows us to save some space on your Desktop and always have at hand the desired application. For this there are two ways: Create cascading menu on the shortcut and add labels. Adding functionality to the shortcuts by using their registration. now, we consider the first method, namely, create a context menu and adding shortcuts. To do this, we open the registry editor and go to branch HKEY_CLASSES_ROOT\Directory\Background\shell. Then we need to create the registry key under “ Shell ”. Press the right button of the mouse on the created key and select new – > Key . Can assign any unique name. we Then select the key you just created...

Product Keys are valuable for a user who uses a licensed version of the software. But the problem is that very few people have backups of the keys. the method Described below will allow you to reserve the keys of their programs before the computer crashes. Personally, I suggest you quickly make backups of the keys before it's too late. so the first thing we need to do is copy the files you need. in order to recover your keys from a broken computer, we need to restore some files from the hard drive. To connect the drive, can pull it and connect to another computer, or to use the station SATA USB connection, similar to the one shown below. If you have no way to connect a hard drive to another computer, or no station, you will be able to recover the files...

Create an access point Wi-Fi on laptop *Command: netsh wlan set hostednetwork mode=allow ssid=”WiFi” key=”password” keyUsage=persistent” – the creation of a network; “netsh wlan start hostednetwork” – start; “netsh wlan stop hostednetwork” – stop. PS There is also a useful program connectify

Very often and suddenly there is a major fault in the operating system Windows, which allows you to boot the system and forces the user to look for ways to solve this problem. the Most effective way to resolve the problem is to completely reinstall Windows, but that's quite a long and uncomfortable process. In addition, the reinstallation of the system and is not needed, because there are ways of Troubleshooting and to save your user programs and settings. How to repair Windows system files? now we will try to answer this question. Windows operating system is composed of a built-in utility called Sfc, which is intended to be system file checker the system and correct problems with data files. Start the utility from the command line, it is also important to...

Making an attack on the program a hacker uses a first memory area where program codes are executed. In Windows use the functions of protection called ASLR and DEP, which should interfere with this. But the company Secunia indicates that these technologies are not supported by all applications. And with the help of professional utility, EMET users can make support the desired applications. the blocking of the memory access In the Windows family of operating systems starting with Windows XP SP2 uses a technology called Data Execution Prevention (DEP), which allows the processor to mark as "inactive" - defined memory space. If an attacker tries to run your code in one of the areas of memory, the operating system receives a message from the processor and...