Tuesday, August 20, 2019

1G→2G→3G→4G→5G, a great history of communication changes

With the official freeze of the first full version of the 5G standard, the communications industry has entered a new phase of full sprint. The 5G era is coming, and it is...

What is XSS attack and more about it.

About XSS attack cross-site scripting attack, when users browse the web, the embedded script code is executed, thus achieving the purpose of attacking users, common vulnerability pages, website search Page, message board. To...

What is the difference between the sata2 and sata3 interfaces? Sata2 and sata3 interface...

SATA2 and SATA3 motherboard hard disk interface appearance is basically the same, but many low-end motherboards still use sata2 and sata3 dual interface hybrid mode, like AMD platform A75, Intel platform...

How to set up Win7 printer in just few steps

PS - Win7 system computer and XP system computer can not share the print, but after the following small test found that Win7 and Win7 computer between the Win7 and XP can...

Google launches AutoDraw Black Technology Soul Painter saved

Google has come up with a new "toy", a " black technology " named "AutoDraw ." It is said to be able to save a group of hand-scarred people who can't paint. To tell the truth, based on...

Let’s Encrypt finally released the Wildcard certificate

As the title, Let's Encrypt finally released the Wildcard (general domain name) certificate after several rounds of jump tickets, the folk called: wild card Let's Encrypt is a digital certificate authority launched in...

Software and hardware differences

The essence of software and its implication was once a cultural literacy possessed by computer professionals. With the advancement of software status, it is now a cultural literacy that has an...

Top 10 common hacking techniques you should know

"With simple hacking, hackers can understand unauthorized personal information that you may not want to disclose. Learn about these common hacking techniques, such as phishing, DDoS, clickjacking, etc., to facilitate your personal...

What is EDR?

EDR (Enhanced data rate) is an abbreviation of the enhanced rate in Bluetooth technology. It is characterized by greatly improving the data transmission rate of Bluetooth technology, reaching 2.1Mbps, which is...

What’s the Difference between SeedBox vs VPN?

Why do you expect Security? I cannot use my online functionality with maximum security. One report and I will lose my account and all information. Another reason for IP recognition is...