Skip to main content

Posts

Showing posts from July, 2020

Kyvistar and Vodafone agree on network sharing

Kyvistar and Vodafone agree on network sharing Ukrainian mobile operators Kyivstar and Vodafone have signed a memorandum of understanding to share the passive and active infrastructure of their mobile networks. This reconciliation will prevent duplication in the construction of networks and accelerate the distribution of 4G in rural areas and highways. Kyivstar press service stated that this will enable the acceleration of LTE technology coverage in Ukraine while maintaining planned investment volumes. Kyivstar President Aleksander Komarov said: “Our company has once again launched an initiative aimed at improving the competitive environment for the entire telecom market. Partnership and collaboration in mobile networks will enable mobile operators to speed up the closure of the digital gap between megacities and villages and to meet the investments despite the reduction in market revenues. ” He also stressed his agreement with Vodafone. “We suggested that all mobile operators in Ukrai

What is Cyber ​​Security?

What is Cyber ​​Security? Cyber ​​Security is a technological method that includes a special computing ability that expresses the protection of confidential data by ensuring the security of institutions or international organizations, from information security to computer systems and operational security. This system, also known as information technology and electronic information security, is valid at various stages from businesses to mobile computing, but it forms the basis of many categories. It adapts a cybersecurity circle, such as network security, application security, information security, operational security, and maintaining the continuity of the current process in extraordinary situations to the technological process. Cybersecurity, which contains multiple layers of protection, acts as an effective defense mechanism against many situations from cyber crimes to cyber attacks. The fact that the critical functions of the institutions, organizations, and users are available in t

What are Network Solutions?

What are Network Solutions? We offer solutions that will simplify the management of the dispersed infrastructure by controlling the costs, increasing the security by closing the distance between the local and remote points of the companies with HPE Aruba, DELL and Cisco products such as Packet Tracer . Our solution ► Structural / Intelligent Cabling ► (LAN) Local Area Networks ► (WLAN) Wireless Networks ► Audio and Video Transmission over Communication Networks (IP Telephony Solutions) ► End to End Corporate Information Security Solutions Follow me on MolenCommunity: Community

What is Moz?

What is Moz? Moz or formerly SEOmoz is a digital agency founded in Seattle in 2004. Moz is known for its premium and powerful SEO tools services for web users. Moz Rank Moz Rank is the link popularity score. The important thing in Moz Rank is that a website has been able to get quality link exits. The website, which has higher quality and number of links, has a higher Moz Rank score. In the Moz Rank algorithm, values ​​are expressed as a number between 0 and 10. Increasing the Moz Rank value from 3 to 4 is quite simple while increasing your value from 8 to 9 is quite difficult. According to this algorithm, the Moz Rank value of many sites with normal and partially high-quality link networks is around 3. How to Increase Moz Rank? As you can understand from the algorithm, for Moz Rank to be higher, it is necessary to get a link output from high-popularity sites and pages. For your rating to be much higher, you need to get quality links and get lots of links in a balanced way. To learn yo

A new claim for MacBooks with ARM CPUs!

A new claim for MacBooks with ARM CPUs! Apple, which organized the WWDC 2020 event on June 23, brought many innovations. In addition to the new iOS 14 and iPadOS, MacBook models with ARM processors also aroused excitement. Although there is no product yet, we can see two models during the year according to the leaks. In addition to models with an ARM processor, the 14-inch MacBook model is also among the leaks. In 2020, 2 new ARM processor MacBook models may come Apple has stated that it will switch the entire Mac series from Intel processors to its ARM64 architecture. The first ARM processor Macs will have the same industrial design as the Intel processor Mac models. According to the leaks, two new ARM processor models are expected to arrive this year. These will most likely be MacBook Pro and MacBook Air models. The MacBook Pro 13 inch model, which is planned to come for a year and is expected to be ARM-based, will have a similar design with the previous models. It is also stated tha

List of 66 apps that Google has blocked this year

List of 66 apps that Google has blocked this year For Android users, Google made a name for itself with the apps it blocks. Applications identified to leak any personal information and data were removed from the Google Play Store. Warning messages are also given in the APK installation of some applications manually. During the year, the names of many applications were mentioned with such news. Android users also had a curiosity about the applications. In this article, you can review the applications blocked by the company. Google is on the agenda with the applications it blocks The company, which wanted to make Android models safer, prevented dozens of applications as a result of the studies. Blocked apps include popular apps with a high number of uses. It seems that there will be an increase in the number of applications that the firm has blocked. War has been launched, especially for applications that violate personal security. In some of the apps listed below, it is stated that some

What is VSync we see in games, what does it do?

What is VSync we see in games, what does it do? What is VSync, which we do not know exactly what we see in every game, what is it? Can VSync be the culprit of the low FPS we get from the games? Let's answer these questions with our article about how VSync technology works with you. VSync option, which we often encounter in games, can confuse what it does because it is not explained in the game. In today's article, we will take a closer look at exactly what VSync technology is, what it does, and how it works. We will try to eliminate the question marks in the minds as much as possible. VSync technology, which was originally developed to give gamers a smoother gaming experience, can also negatively affect the gaming experience in some cases. In our article, we will also touch on the disadvantages of this technology. Next, we will explain how the G-Sync and FreeSync technologies differ from VSync in the words "G-Sync supported" or "FreeSync supported" added to

The first information about Samsung Galaxy S21 has arrived

The first information about Samsung Galaxy S21 has arrived The first information about the features of Samsung's new model Galaxy S21 started to come. Leak information was shared about some features of the series, which is expected to meet with users after the Galaxy S20 and Note 20 series. Information about the processor and display of the new model may not meet users' expectations. Because it is stated that the model can be released without the Snapdragon processor and the screen features may also be reduced. Galaxy S21 features are revealed While preparations for Note 20 continue on the Samsung side, news for the new Galaxy model has started to come. IceUniverse, which was previously on the agenda with leaking news, also shared some information for this model. It is stated that the series may be more affordable than previous models. However, it was said that some prominent features should be waived. In the news for the new model Galaxy S21 features, there is information that

The highly anticipated feature has been removed from Android 11

The highly anticipated feature has been removed from Android 11 The feature that many users have been waiting for has been removed from Android 11. The statement came from Dan Sandler in the Android engineering team. News from the new operating system Android 11, which the US-based technology company Google has been working on for some time, did not like users very much. It turned out that the ability to take screenshots in the development versions of Android 11 will not be included in your final version. Dan Sandler, an engineering team that developed Android 11, underlined that they made the decision not to include the feature in the final version on the social media platform Reddit due to the user experience. WHAT'S NEW IN FUTURE WITH ANDROID 11? With the release of beta versions, the features that will come with Android 11 have also started to become official. If you look at the beta version, media played through apps like YouTube and Spotify will have a special section in '

Basic File Systems on Linux: ext2, ext3, ext4, jfs & xfs

Basic File Systems on Linux: ext2, ext3, ext4, jfs & xfs The original Linux system uses a simple file system that is similar in functionality to the Unix file system. In this article, we will discuss the basic file systems used in Linux. Ext File System This file system, which goes into use with the Linux operating system, is called extended filesystem or ext. It provides a Unix-like file system for Linux, virtual directories are used to process physical devices, and data is stored in blocks of a certain length on physical devices. The ext file system uses a system called inode, which provides trace information about files stored in the virtual directory. The inode system creates a separate table on each physical device to store file information, and this is called the inode table. Each file stored in the virtual directory has an entry in the inode table. The extended word in the name of this file system type is due to the additional data listed in each file, listed below: Filenam

What is a Monitor? What are the types?

What is a Monitor? What are the types? The monitor is the name given to electronic or electro-mechanical tools used to create images. It is an output device of many electronic devices, especially television and computer. We can think of the computer case as the brain and the monitor as the eye. It is an essential and indispensable part of the reflection of the transactions and information to the external environment. It is the most important output device of many electronic devices, primarily television and computer. The monitor is an important part that is kept in a plastic form, forming pictorial shapes with the necessary electronic circuits and power transformers. The dimensions of the monitor are expressed in an "inch" size. The criterion that creates this size is called "inch" from the corner of the monitor screen to its distance with its opposite cross corner. Monitor Types Monitors are usually of two types. CRT, which is old type use and can be as big as tele

What is IMAP Mail? Advantages and Disadvantages

What is IMAP Mail? Advantages and Disadvantages IMAP is one of the most known email protocols. TCP IP number 143 allows IMAP emails to work with Porto to be received over the server. It is necessary to use any e-mail client to use e-mail with IMAP Protocol (Outlook, Apple Mail, Outlook Express, Mozilla Thunderbird; Hotmail and Gmail web interfaces, etc.) Most of the internet usage is email communication. In this context, protocols such as SMTP IMAP and POP3 are required for e-mail exchange on the internet. SMTP Protocol is designed to send mail. IMAP, on the other hand, ensures that emails are received through the server. When connecting to the E-Mail server with IMAP, it brings only the header information of the e-mails accumulated in the box to the client. POP3 draws all messages to the client. Many servers that provide e-mail functionality have IMAP protocol support. So, with which option should we use our e-mails IMAP or POP3? The answer to this question is based on the purpose an

What is the HDD (Hard Disk)? What does it do? What are their types and differences?

What is the HDD (Hard Disk)? What does it do? What are their types and differences? You need the information and downloads to use your computer. This information is kept in a storage device called an HDD. We have prepared a comprehensive article about HDD. What is HDD (Hard Disk) in this article? What does HDD (Hard Disk) do? What are the HDD operating principles? What are the HDD (Hard Disk) types? What to consider when buying HDD (Hard Disk)? How Hard Disk Works? What is the Latest Hard Disk Technology HARM? What is an SSD? What are the differences between HDD and SSD? What are the advantages of using an SSD disk? We will convey the answers to your questions. The storage unit used to permanently store our data on the computer is called HDD (Hard Disk). The device called hard disk; it consists of several parts lined up on a rotating shaft. These; plates made of plastic or metal and covered with the magnetic layer are formed by the read/write heads on the upper and lower parts of the p

What are MAC and IP Addresses?

What are MAC and IP Addresses? Difference Between Mac and IP Addresses Mac and IP addresses identify the device connected to the network. Mac is the physical address of the computer like our home address. Thus, in a network , various devices can be identified using a Mac address. The IP address identifies the network connection by giving a number. In the Mac and IP Addresses article, both addresses are important for connecting the device to the network. The Mac address is given to the device and is specific to the network card in the device. The IP address recognizes the connection from computer to computer and from network to network . The manufacturer assigns a number to the NIC (Network Interface Controller) in the computer's hardware component. This number is called the Mac address. The Mac address controls the data received from the device received by the network. Devices connect to the Internet via Ethernet or Wi-Fi and they use Mac addresses on the network. 12 digits hexadec

What is a WPS connection

What is a WPS connection WPS, which stands for "Wi-Fi Protected Setup", is a network security standard for creating a wireless home network. With the spread of wireless networks, the internet has become an indispensable part of our daily lives. However, although wireless networks provide ease of connection, it raises some security concerns. If you have a supporting modem, you have wondered what the WPS button on the modem is. In this content, we will share the answers to questions such as what is WPS and how to use it. WHAT IS WPS Abbreviated for the term "Wi-Fi Protected Setup", WPS stands for protected wireless setup. This feature, which was first developed in 2006, allows more inexperienced internet users to use the internet safely over the wireless network. With WPS, you can easily upgrade the security of the network without having to perform complex security steps for a more secure network connection. You can enable wireless devices such as routers and printer

Simple GCC Usage

Simple GCC Usage The name GCC consists of the initials of the words " GNU Compiler Collection ". It takes its real name from the words GNU C Compiler. The reason for this change is that the GCC package used to consist only of the C compiler. Other languages ​​were later added to the GCC family. A visit to http://en.wikipedia.org/wiki/GNU_Compiler_Collection can be made for information on this subject. You can follow the latest versions of the GCC package at http://gcc.gnu.org/. To find out the version of GCC you are using; # gcc -v You can use the command. Returning result in my system: # gcc -v Reading specs from /usr/lib/gcc-lib/i386-slackware-linux/3.2.2/specs Configured with: ../gcc-3.2.2/configure --prefix = / usr --enable-shared --enable-threads = posix --enable -__ cxa_atexit --disable-checking --with-gnu-ld --verbose --target = i386-slackware-linux --host = i386-slackware-linux Thread model: posix gcc version 3.2.2 In order for the compiler to compile applications cor

Downloading Windows 10 and Making Bootable USB

Downloading Windows 10 and Making Bootable USB In this article, we have prepared a guide on how to download Windows 10 and Boot USB. You will be able to format your computer with the guide we have prepared completely safe and legal. We have prepared this article in response to the question of how to download and boot Windows 10, which has been frequently asked by many of our users recently. First of all, we will make the Windows 10 download method, which we will explain, completely legally, with the tool offered by Microsoft. We will also explain the process of windows formatting with USB memory Download Windows 10 First, we will need the operating system's installation files. With a tool released by Microsoft in recent years, we can easily obtain official Windows 10 files. With this tool, we can download Windows 10 Disc Image (ISO File) completely safely. We download the tool name from the MediaCreationTool tool official site, where we will get the disk image. When we download the