Internet and social networks, computer games, security online
Editor's choice
Interesting articles
New
Popular for the month
Scanning files for viruses, Trojans, worms and other malicious programs is associated with any user choosing and installing an antivirus program on a computer. However, not everyone knows that there are a number of online services on the Internet that allow you to download suspicious files, check them with several antiviruses at once and get a detailed report
In today's world, many people use instant messaging. The most popular network is ICQ. Due to this popularity, there is also an interest in hacking and reselling various numbers. Many users ask themselves questions about how to protect their ICQ number
Any server can be subject to a ddos hacker attack. And the higher the level of organization of the attack, the more complex and expensive methods are needed to protect the server. Instructions Step 1 Contact an experienced specialist who administers sites and is faced with the need to repel ddos attacks
ICQ is a great program for communicating with friends and colleagues. If you have lost or forgotten your login password, do not despair, you can easily change it and enjoy communication again. It is necessary - computer with internet access Instructions Step 1 If you decide to change your password, while you have access to your account, select the "
Every person who spends a sufficient amount of time on the Internet sooner or later faces the need to protect personal data from fraudsters or unauthorized persons. Think about how much information about yourself you leave on various sites. Moreover, we are talking not only about social networks, although for the most part it is social networks that are the main "
In early summer, there was the alarming news that the Internet would be disconnected on July 9. This statement was officially made by the US Federal Bureau of Investigation, and this disconnection to a certain extent could have affected the Runet
To disable the viral banner blocking access to the operating system, you must use a set of measures. You can choose the manual option to uninstall the module or use anti-virus utilities. It is necessary - Windows installation disc
The Opera browser has been one of the most popular among Internet users for many years. It was in it that for the first time there was a free opportunity to visit the Internet through additional VPN protection. This feature has only increased the popularity of the browser
Currently, there is a lot of not only useful information on social networks, but also harmful information, which, at best, will not affect your computer in any way, and at worst, will lead to its breakdown. And everything can happen because of ordinary spam, which spreads very well and quickly on the Internet, and especially on the VKontakte website
Various advertising banners strongly hinder users from wandering around the Internet. Sometimes such advertising windows interfere with the stable operation of the operating system or some of its components. It is necessary AdBlockPlus, FireWall
In today's world, more and more information is stored and transmitted digitally. This provides quick access to data, but at the same time, the question of how to prevent their theft and abuse arises. The World Congress on Internet Security (WorldCIS) is devoted to the latest research on the theory and practice of computer security, primarily in the development of ways to protect against new Internet threats and on information confidentiality
Recently, users of the VKontakte social network have access to additional options for the convenience of communication. One of them is the mention of a person with a link to his page in various publications. Instructions Step 1 Find out the person's account ID to make a mention
World Congress on Internet Security WorldCIS 2012 was held from June 10 to 12, 2012 in Canada, at the University of Guelph exhibition complex. The main purpose of the congress was to discuss the threats facing the world community in the field of computer technologies
VPN is a device that allows you to provide one or more network connections over another network. In other words, provide anonymity for the user, hide the history of visited sites from the provider. The choice of many subscribers often falls on the use of a VPN, however, connection problems may arise
Nowadays, quite often it becomes necessary to find a person from a photo in VK in order to find out more about him and, if possible, get acquainted. If you happen to have a photo of a stranger, and you are wondering if he is registered on the VKontakte social network, you can check this in several available ways
Raidcall is a computer program designed for voice communication over the Internet. First of all, this program was designed for people playing multiplayer games, but it can also be used wherever voice communication and coordination of a large number of people are needed
Communicating on the forum, users leave dozens or even hundreds of messages every day. To find your message, sometimes you have to rummage through almost the entire forum. Note that finding your messages can be greatly simplified. It is necessary Computer, internet access
World leaders exchange missile strikes and argue over who has the most nuclear potential. Vital resources, such as fresh water, are dwindling and there are more people. Glaciers continue to melt, changing sea levels and climate. New diseases appear, and bacteria no longer die from antibiotics
In the summer of 2012, Russia approved a law to block websites harmful to children. Since it caused an ambiguous reaction in society and among representatives of the Runet, it was decided to make the necessary changes to it. Despite the protests of Runet representatives, the law “On the protection of children from information harmful to their health and development” was adopted and should come into force as early as November 1, 2012
Buying on AliExpress is convenient. This is a platform that hosts an incredible variety of products. But what if you were deceived: they did not send the goods or embezzled money for express delivery? Let's analyze all the possible options. Situation 1