Review Lenovo ThinkPad L390 Yoga: Great feature, affordable

Lenovo's ThinkPad series is the best laptop on the market. No matter which model you buy, you can be sure that you are getting one of the best laptop keyboards and a solid overall build quality. They are quite expensive, so the decision will be a little difficult. Many people choose the ThinkPad X1 Yoga, but if you don't want to spend that much money, choose the ThinkPad L390 Yoga. [Read More]

Tips play Domination Mode Call Of Duty Mobile effectively

Domenation Mode, also known as Pirates, is a very interesting game mode in Call Of Duty Mobile. Pirates mode is integrated on maps such as Crossfire, Fries Range, Standoff, Takeoff, Raid, Hijacked, Crash, Natuown. Domination is different from the other modes in Call of duty mobile, the goal of both teams is to collect as many points as possible. Specifically, players need to stand in the circle at point B marked for at least 10 seconds without being attacked by enemies. [Read More]

Top 10 websites to create beautiful infographics

Here is a list of 10 beautiful infographic creation websites for you to choose from! 1. Canva Canva is a website that specializes in design and has a collection of modern designs that catch the latest "trends" on the market. You can create an Infographic template from a blank page with drawings, sample images on Canva or can be creative based on the Infographic templates available on Canva to design. [Read More]

Turn your Raspberry Pi into an ad blocker

While there are many ad-blockers that can remove ads from your computer, they rarely work on other devices, such as smartphones or tablets. This article will show you how to convert a Raspberry Pi into an ad blocker all over the network, using Pi-Hole. Once completed, you will be able to block ads on laptops, computers, smartphones, tablets and any other devices connected to the network. Block ads for the whole network with Raspberry Pi Things to prepare Install Pi-Hole on Raspberry Pi Choose a DNS provider Which blacklist should Pi-Hole use? [Read More]

Backup and restore passwords on Google Chrome

You all know the password storage and management functionality on Google Chrome. You use the password saving function of Google Chrome browser, so you often don't remember your password. So when you log into another computer, it will be difficult to remember the password. Google Chrome has built in a convenient function to manage passwords that have been memorized in the browser, all user passwords are saved into a file, you can backup this file to a safe location to Use when needed. [Read More]

Bill Gates mocked the $ 100 laptop project

Bill Gates, yesterday (March 15), voiced a derision for Google's $ 100 laptop production project and its partners. This is a project to produce cheap laptops for people in developing countries. This project is being implemented at the Massachusetts Institute of Technology with support from Google. However, cheap laptops like this lack a lot of features compared to typical personal computers. By design, these computers will not have hard drives and software. [Read More]

Browse the web anonymously with the Tor Browser

Instead of having to manually change the IP address on your computer or use hidden IP software to browse the web anonymously with regular web browsers. You can use the Tor Browser web browser directly to browse the web anonymously. Tor Browser full name is Tor Browser Bundle is a web browser similar to Internet Explorer, Google Chrome or FireFox but it is different from normal web browsers that you can browse anonymously effectively, access Facebook or blocked websites. [Read More]

Businesses choose Office 2010 or Google Apps?

Microsoft Office 2010 and Google Apps both offer a wide range of office processing applications. However, to choose deployments for businesses, you need to consider many factors mentioned in the following article. If users are interested in free use of the product, Google Docs / Apps is a valuable alternative to Office 2010, but for businesses it doesn't. Users will decide which application is dependent on their own business needs, the budget as well as the types of content you want to create and share with colleagues. [Read More]

CREATE LOGIN command in SQL Server

The CREATE LOGIN command is used to create a login account (Login) connecting to SQL Server. The login account will then be mapped to the user account (so before creating the user in SQL Server you must create a login account first). There are 4 types of login accounts in SQL Server. Login account uses Windows Authentication authentication. Login account using SQL Server Authentication authentication. Account login from certification. Account login asymmetric keywords. [Read More]

How to edit videos in Google Photos

Perhaps you are too familiar with the Google Photos photo storage application, but its excellence is not just about storage. In addition to providing a variety of photo editing options, it also provides users with some handy video editing features. This article will introduce you to some video editing features on Google Photos. 22 tips to help you master Google Photos How to get the embed code on Google Photos How to create and manage shared albums on Google Photos How to cut videos in Google Photos Step 1 . [Read More]