Internet and social networks, computer games, security online
Editor's choice
Interesting articles
New
Last modified
2025-06-01 06:06
Optimization of computer games allows the user to "squeeze" everything out of the gameplay. The recently released PUBG game also has such an opportunity. It, like many others, is distinguished by a large number of individual settings that are important to know for optimization
2025-06-01 06:06
You have joined the multi-million army of CS fans, namely version 1.6, and decided to create a server. To do this correctly, you must have a clear, coherent plan of action in front of your eyes. Instructions Step 1 Skip this step if you already have CS 1
2025-06-01 06:06
Stopping and starting Apache on Unix-like systems is done using the command line. As far as Windows is concerned, the server can be stopped using a special graphical or console utility called httpd. If you are using an off-the-shelf XAMPP build, Apache can be disabled through the control panel
2025-06-01 06:06
While browsing the Internet, a computer connects to various network addresses. Sometimes the user has a need to find out with which ip the connection is currently established. This can be done using both the capabilities of the operating system and by installing additional software
2025-06-01 06:06
The installation of certain programs, including anti-virus software, can damage the stable operation of the local network. In such situations, you need to restore its parameters or completely reconfigure the connection to the server. Instructions Step 1 In the event that a local network failure was caused by the installation of a program, be sure to uninstall it
Popular for the month
Through the Internet, people communicate with friends, conduct business negotiations, work, shop and pay their bills. The more active a person is on the Internet, the more damage hacking any of his accounts will bring him. Therefore, it is better to take care of your safety in advance
If, in the midst of work, at the bottom of the browser, a banner with indecent pictures suddenly appeared from nowhere, do not be alarmed. As a rule, it says something like the following: “you subscribed to our advertisement for 1 month, but you can unsubscribe from it by sending an SMS to a short number”
Since August 2012, Belarusian users can no longer access a number of sites. Providers had to block access to several servers by the decision of the authorities of the republic. The list includes both sites that, according to the government, pose a threat to the country's security, and completely innocent pages
It happens that, through their own negligence, Internet users go to dubious sites, after which spam appears on the computer: as a rule, this is a fairly large banner of a pornographic nature. It covers almost half of the browser window. Instructions Step 1 First of all, keep in mind that in no case should you follow the instructions written on this banner
ICQ is an instant messaging system used by Internet users. In addition, it is a popular social network on the Internet. In this regard, hackers are showing great interest in cracking the program. Users try to reliably protect ICQ from hacking
Internet communication has become commonplace for many people. And one of the most popular methods is the ICQ program, or "ICQ". It is popular, in demand, and often attracts unwanted scammers' attention. If you were able to register your original ICQ number, it automatically becomes a potential victim of theft
For many years, the ICQ program has remained one of the users' favorite means of online communication. If you have been using it for a long time and have a large list of contacts, it will be inconvenient to create a new account due to a forgotten password
ICQ is a messenger program, that is, a program for communication between users located anywhere in the world. Its functions include chat, video calls and phone calls, the use of animated pictures and so on. The number of ICQ users is over a million, so the developers of the program made sure that if you lose your password, you can easily recover or replace it
Almost every owner of a personal computer has access to the World Wide Web. When you surf the Internet, there is a great danger of "infecting" your PC with malware. Instructions Step 1 The virus that blocks the operating system of a personal computer and causes a malicious banner to appear is called “Trojan
Advertisements on websites are often a source of inconvenience and annoyance for users. Sometimes the creators and owners of the resource abuse advertising so much that the page becomes impossible to use. To solve the problem, special programs have been created that filter the advertising stream and make browsing sites much more convenient and fast
Computer viruses are very insidious and, like their biological counterparts, constantly mutate. Therefore, it is very important to clear the system of them in time. Very often, due to viruses, access to the Internet is unavailable, and the work of network connections is disrupted
Antivirus software is an integral part of the safe and complete operation of your personal computer. But the antivirus needs to be updated in a timely manner. Instructions Step 1 If your personal computer does not have an Internet connection, you still need to update the antivirus
Virus writers often use the following scheme. The program blocks access to some sites or to the Internet in general. Until the user sends a message to the specified number, the virus will not stop interfering with work. Although this is only in words - in practice, even after sending a message, access to the Internet is not returned
A large number of users are faced with viral banners that in all possible ways block access to the operating system or its individual elements. To quickly delete them, you need to enter the desired code. Necessary Windows 7 disk, mobile phone
You can find a lot of interesting things on the Internet, but you can also easily pick up a virus. It is to this category that SMS banners belong. An unnecessary detail of considerable size may appear at the bottom of your browser. There will be indecent pictures and an inscription on it
To create your own wireless network, usually routers or routers are used. But to save money, you can also get by with a Wi-Fi adapter that supports the creation of a wireless access point. Necessary - Wi-Fi adapter. Instructions Step 1 Purchase a suitable Wi-Fi adapter
The user's access to the personal page is carried out only after filling out a special form indicating the username and password, with the help of which the site is entered. For the convenience of customers, most of the services offer an autosave function for accounts
There are many ways to get rid of an advertising viral banner. Some of them are purely individual, others are suitable for most computers and operating systems. Necessary - Dr. Web CureIt. Instructions Step 1 Use your mobile phone or other computer to find the ad virus disable code
ICQ authorization is necessary in order to distinguish necessary useful contacts from accidentally added ones. It allows you to see the personal status of the virtual interlocutor ("online" / "offline"), find out what he is doing at the moment and whether he is ready to respond to your messages
Configuring MAC filtering is the first line of defense against unwanted or malicious traffic and implements hardware-level wireless security. Instructions Step 1 Call the main menu of the Windows XP system by clicking the "