Bat files, examplesYou can execute all the examples published below not only by creating and running a BAT file containing these commands, but by copying them directly to the command line. To…
5 fashionable ways to hide from face identificationToday, the face recognition algorithm is used everywhere. And not only in professional tracking systems or smart web services, but in various entertainment applications and basic functions like autofocus. Poster…
IT consultingIT consulting refers to the widest range of solutions designed to optimize existing IT resources for the needs of a particular business, its structure and features. Ultimately, its goal is…
Why Kaspersky is not installedThe question of why Kaspersky is not installed is asked by many users. It is no secret to anyone that Kaspersky Anti-Virus is today considered one of the most popular…
Printers, scanners, faxes, multifunction printersFaxes, I start with them, because rarely buy a fax home. A little bit about faxes, in fact it is a mixture of several devices, a printer, a scanner and…
Silent installation of applications (silent install)Silent installation is such a process in which you sit quietly and look at the screen where the software installation process takes place without your participation, provided that it is…