Internet and social networks, computer games, security online
Editor's choice
Interesting articles
New
Last modified
2025-06-01 06:06
Optimization of computer games allows the user to "squeeze" everything out of the gameplay. The recently released PUBG game also has such an opportunity. It, like many others, is distinguished by a large number of individual settings that are important to know for optimization
2025-06-01 06:06
You have joined the multi-million army of CS fans, namely version 1.6, and decided to create a server. To do this correctly, you must have a clear, coherent plan of action in front of your eyes. Instructions Step 1 Skip this step if you already have CS 1
2025-06-01 06:06
Stopping and starting Apache on Unix-like systems is done using the command line. As far as Windows is concerned, the server can be stopped using a special graphical or console utility called httpd. If you are using an off-the-shelf XAMPP build, Apache can be disabled through the control panel
2025-06-01 06:06
While browsing the Internet, a computer connects to various network addresses. Sometimes the user has a need to find out with which ip the connection is currently established. This can be done using both the capabilities of the operating system and by installing additional software
2025-06-01 06:06
The installation of certain programs, including anti-virus software, can damage the stable operation of the local network. In such situations, you need to restore its parameters or completely reconfigure the connection to the server. Instructions Step 1 In the event that a local network failure was caused by the installation of a program, be sure to uninstall it
Popular for the month
Reinstalling drivers for various devices can result in a large number of non-existent or unused COM ports. Removing such ports does not require special knowledge and does not imply the use of additional special programs. Instructions Step 1 To display all hidden ports, call the main system menu by clicking the "
Is the Internet a bottomless storehouse of useful information or a global trash can? Which side to look at. Fortunately, there are ways to avoid unexpected encounters with the dark side of the web. For example, in the Mozilla Firefox browser, there is an add-on Blocksite for this
If at work an evil system administrator has disabled access to Gmail, do not despair, because there are ways to enter your email inbox differently. Instructions Step 1 Please use a different address. Google mail has many mirror addresses, by going to which, you can safely continue using your mailbox
On many sites, in order to recover or change the password for your account, you need to go through a special procedure, during which the user will be asked to fill in several columns. The answer to the security question is one of the steps. Necessary - computer
ICQ is one of the most popular messaging services. If you are an ICQ user, then you should know that when you reinstall the messenger, the password is reset, and it is difficult to remember it if it is not written down in a safe place. Try to recover the ICQ password
Advertising on the Internet can be not only annoying, but also dangerous, because an ad banner or pop-up window can lead to a malicious or phishing site containing a virus. Blocking programs have been developed specifically to protect against unwanted or intrusive ads
Employees in private companies often face network restrictions. It is expressed in the denial of access to sites that are considered unrelated to the workflow. To remove this restriction, you can use one of the simple options. Instructions Step 1 Use anonymizers
Each person has their own way of creating passwords and encryption, which is based on their personality, mindset, life experience, and other factors. Everything that a person saw or heard is recorded on the biocomputer of the brain - in the subconscious
There is no better way to accustom a person to the greatest responsibility for his carelessness than to make him feel the fear of loss. That is why if you are concerned about the security of your loved one’s mailbox and think that it is not well protected, because it has too simple a secret question, make sure that he changes it to a more complex one
To get the ICQ client on your computer, you just need to download the program installer from any resource on the Internet. It is worth noting that you need to perform a number of specific actions to exclude the possibility of a virus infecting your computer as a result of downloading the application
Of all the types of malware, the WinLocker, a type of Trojan horse, is perhaps the most annoying for the user. They almost completely block the operation of the system, cover the screen with their window and require an SMS to be sent to a paid number in order to receive an unlock code
SSL (Secure Sockets Layer) is a protocol that ensures communication security. In cryptography today it is one of the most popular protocols, the security of the connection in which is achieved due to the "layered environment". How does it work?
For one reason or another, some e-mail boxes lose relevance for their owners. Not all services allow you to delete unwanted mailboxes, but you can at least delete an account from your mail client. For example, one that is built into the Opera browser
Security is very important to users, which is why many sites spend thousands of rubles a month to protect their servers. However, the safety of the data should be thought primarily by the visitors themselves. One of the most reliable helpers in this matter is a password
After entering the account parameters from the e-mail box, their memorization is possible both in cookies and in the settings of the browser itself. If other people use the same computer, you should take steps to prevent them from gaining access to the box
The occasional replacement of the credentials used to enter the site will help protect your account from hacking by ill-wishers. In particular, the login. Necessary - personal computer or telephone with Internet access; - new login
If, when using Internet Explorer, web pages load slowly, and the browser itself stops responding to your requests and displays error messages, then it is recommended that you reset all previously installed settings. After that, Internet Explorer will revert to its original state, and the user will be able to turn on all the necessary settings again
The clock built into the server's motherboard should be set as precisely as possible. This determines, in particular, the accuracy of the indication of the time of sending messages in the forums. You can determine the time on the server remotely
If you are a user of the Windows XP operating system, you probably faced the problem of forgotten password for your account. The situation, to put it mildly, is not the most pleasant, but there is a way out of it. It turns out that the password of any account is stored in a file hidden for the user
Most companies monitor the daily activity of their employees on the Internet. It is common practice to block social networking sites that contain entertainment content. There are several ways to access blocked pages. Instructions Step 1 The simplest is to use an anonymizer