Jump to content
Facebook Twitter Youtube

Angrry.exe™

Banned
  • Posts

    3,580
  • Joined

  • Last visited

  • Days Won

    15
  • Country

    Algeria

Everything posted by Angrry.exe™

  1. Many Don't know how to make a profile video This helps you a lot 

     

    Tutorial Profile Video

     

    1. Show previous comments  1 more
    2. Angrry.exe™

      Angrry.exe™

      your problem solved by : Angrry.exe 

    3. meekal }>D3@d z()Mb!3<{

      meekal }>D3@d z()Mb!3<{

      Thank You Very Much Bro ? ?

    4. Witch @CsBlackDevil

      Witch @CsBlackDevil

      hay angrry can you also set my profile video its not showing its totally blank ? 

    • Angrry.exe JOINED November 3, 2013
    • SKYFALL JOINED : November 5,2013 

    What were you doing two days ago ? 

    1. Show previous comments  1 more
    2. Angrry.exe™

      Angrry.exe™

      Why all this love . BABY ?

    3. SKYFALL

      SKYFALL

      LOVE IS IN THE AIRRRRR! ❤️ :)))))

    4. Cola™
  2. Topic Closed. Reason: Inactivity If you want to reopen your topic, contact me or any moderator or global moderator
  3. A computer (or a computing system) can be defined as an electronic data-processing machine, based on a program. Computer programs are instruction sets written using a programming language that transcribe an algorithm. The programming language is a language that is accessible to both the human operator and the technical equipment. An algorithm is a method of solving a problem through a finite number of steps. One step is an operation that can be performed by an operator. Data is information passed on a support. Configuring a system is the list of components of that system. architecture of a system is the configuration along with the relationships between the elements. A computing system is a set of two components: HARDWARE - is a term that covers all the electronic and mechanical components of the computing system (the physical part); SOFTWARE - is a term that covers all the programs used in a computing system. Within the software component is distinguished an element that ensures the interconnection of all components of the computing system, transforming them into an entity - the computer and ensuring its interconnection with the external environment. This software item is called operating system HARDWARE COMPONENTS The core of a PC is composed of 8 major elements: Motherboard - represents the physical and logical support for the other components, being the hardware component that ensures the physical interconnection of all elements in the configuration of a computing system; microprocessor - on most current computers, this is an INTEL microprocessor, or one of the INTEL compatible processors produced by other companies; Input / output equipment set - including keyboard, mouse, scanner, CD-ROM or bar code readers as input devices. The most common output devices are printers and monitors; A set of fast memory and slower storage devices - to save and retrieve data and programs; A bus / bus set - to connect the microprocessor to memory or adapters that make it possible to attach other devices through their ports or extension connectors. Buses can be thought of as electronic highways interconnecting the hard components of a PC; Set of adapters - enabling the microprocessor to control and communicate with I / O and storage devices. These adapters are circuit assemblies that attach to the system bus and convert each bus into an interface port that accepts the connection of certain I / O equipment. For example, a serial port adapter connects to a computer bus and creates a COM port on which a modem can be connected. The adapter is therefore the bridge between the computer buses and the devices that need to be connected to it; Ports - are hard interfaces (physical connectors) that enable a wide range of adapters to be attached to the computer buses during production or later; Slow Storage Devices - where data and programs are kept in the long run. These include non-volatile (magnetic or optical) storage media such as CD-URIs and floppy disks.
  4. VPN Virtual Private Network * * VPN - A virtual private network (VPN), extends a private network over a public network such as the Internet. Allows a computer or a network-connected device to send and receive data over public or shared networks as if it were connected to the private network while benefiting from functionality, security, and public network policies. VPN traffic messages can be transmitted through the infrastructure of a public data network (eg Internet) using standard protocols, or via a private network of the Internet Service Provider (ISP) made available to the public. These types of connections offer a low-cost alternative to dedicated private WAN networks, offering the possibility of connecting the telecommunication switches to a cable, xDSL, or dial-up company's internal network. VPN connections are easy to deploy over existing public infrastructures, and offer an alternative compared to dedicated private networks such as Frame Relay or ATM, which are generally more expensive. VPNs offer several advantages: low implementation / running / management / maintenance prices, increased IT security (almost as traditional private networks), scalability, simplified access and, finally, compatibility with high speed public networks . VPN architecture (virtual private network) For those who want to establish a VPN connection, several methods (based on Levels 2 and 3 of the OSI Model) are available along with those technologies. The VPN network can be set up and managed at the customer's premises or by the telecoms service provider. Also, to meet special requirements, there is also the possibility to combine several of these methods with each other. Types of VPNs (virtual private network) * Secure VPNs (virtual private network) use encrypted tunneling protocols. These are cryptic (encoded) protocols that ensure confidentiality (blocking intruders), authenticity of the sender, and message integrity. If properly chosen, deployed and used, such techniques can ensure secure communications even within an unreliable network. Because such choice, implementation, and use are not simple tasks, there are many unreliable (unsatisfactory) VPN schemes available on the market. Secure VPN (Virtual Private Networking) technologies can also be used to increase security in network infrastructure. Examples of secure VPN (virtual private network) protocols: 1.IP security (IPsec) - used on IPv4, and partly mandatory on IPv6. 2.Secure Sockets Layer (SSL / TLS) - used either for the entire network, such as the OpenVPN project, or for securing a web proxy. It was built by companies like Aventail and Juniper that provide remote access to VPN capabilities. 3.Point-to-Point Tunneling Protocol (PPTP), created by a group of companies, including Microsoft. 4.Layer 2 Tunneling Protocol (L2TP), created through cooperation between Microsoft and Cisco. 5.Layer 2 Tunneling Protocol, version 3 (L2TPv3), recently launched. VPN-Q 6.Multi Path Virtual Private Network (MPVPN). MPVPN is a registered trademark of Ragula Systems Development Company. See Trademark Applications and Registrations Retrieval (TARR). There are companies on the market that manage the VPN server, a service offered to their customers if they do not want to do it themselves. Reliable VPNs do not use cryptographic tunnels, instead rely on the security of a single network distributor that will provide secure traffic: 1. Multi-Protocol Label Switching (MPLS) is often used to build a reliable VPN. 2.Layer 2 Forwarding (L2F), designed by Cisco.
  5. You want to win 1000 points and earn VIP grade? Check @Mr.Love's topic!

     

     

    1. Desire-

      Desire-

      All know ?

    2. lonut gfx

      lonut gfx

      I Knoooow ? I reverted a nice video on this occasion

  6. Quote

    <22:17:30> "kenveloo-": ooo nice 
    <22:18:00> "kenveloo-": 6 years on CSBD ?
    <22:18:11> "! Angrry.exe": yeap
    <22:18:16> "kenveloo-": wow
    <22:18:38> "kenveloo-": Do I understand it's like a family for you?
    <22:19:21> "! Angrry.exe": They are originally my second family

     

  7.                                          6 years on CSBD ? ❤️

    1. Ntgthegamer

      Ntgthegamer

      no  you have been here for 5 years and 5 months ?

    2. [X]pErT-

      [X]pErT-

      Mee to 6Years is Complete

    3. [A]Sweety^ x CSBD

      [A]Sweety^ x CSBD

      angry for fk founder only !

  8. Topic Closed due to lack of interest & inactivity.
  9. I Don't want to see more messages . if you are really interested in buying our accessories. You can contact this person. Also if you do not have a partner you can search for it and then make your request. contacts to buy server. Payment method: - Western Union - Money gram - Bank Transfer @Mr.Love 24/24 - Ts.CsBlackDevil.Com ! - Skype: Love_cs16 - Steam: Love_csblackdevil - Personal message via forum @Sethhh. - Skype: amon_cs16 - Steam: Sethhh. @ www.csblackdevil.com - Personal message via forum
  10. I will introduce you 5 small 'tricks' that you can use when your computer moves very hard. 1. Desinfect: When a computer starts hard for no reason, the first thing you should do is install an antivirus or anti-malware and start a scan. Viruses and malicious programs steal from operating system resources and consume internet, in which case your system will go very hard and the Internet will not run properly. I recommend Microsoft Security Essentials, besides it I recommend you also use Malwarebytes. 2. Configure Startup: If you wait long until the icons appear on the desktop or the computer starts very hard, it means there is a long list of programs that automatically start with the windows. To change the list, go to: Start -> Run, type msconfig and click enter, a window will appear where you select the Startup tab and you can uncheck programs that you no longer want to start with windows. 3. Clean the Desktop: If your desktop is full of icons and files, you should do some cleaning. Delete what you do not use anymore, and move the files to partition D. A loaded desktop is eating from computer resources and slows down the operating system. If you want to gain more memory, use a background color instead of a picture. 4. Clean the Hard Disk: With your daily work, your computer creates a lot of temporary files that take up a lot of memories on the hard drive. You will not believe it, but even a few GBs can accumulate in a single month. By deleting these files, you can recover your lost lost memory. To delete them, use Disk Cleanup Tool in Windows: Start -> Programs -> Accessories -> Disk Cleanup, or download Ccleaner from the Internet. 5. Defragment the Hard Disk: Defragmenting is one of the best tricks to make your computer run faster. The hard disk is like an organized library, with all the files sorted and categorized. If after a while there is no order, everything will be harder to find. The same is true with windows. If you delete and create files, the system will put them where they are. And when you go to them, they will be troubled if they do not have them ordered. For this reason, a defragmentation is one of the best ways to speed up the operating system's speed.
  11. Stop making multiple accounts This is not your benefit You will lose your account Only your entire account will be deleted and be warned again

    1. Show previous comments  1 more
    2. Wassim™

      Wassim™

      @Angrry.exe™ good u Continue until you become Administrators ?❤️ 

    3. #king 0F DARK

      #king 0F DARK

      Blue idiots from Egypt ?

    4. Cor[T]eX™✘
  12. Welcome back GUCCI

    1. GUCCI™

      GUCCI™

      Thank You broo ??

WHO WE ARE?

CsBlackDevil Community [www.csblackdevil.com], a virtual world from May 1, 2012, which continues to grow in the gaming world. CSBD has over 70k members in continuous expansion, coming from different parts of the world.

 

 

Important Links