Internet and social networks, computer games, security online
Editor's choice
Interesting articles
New
Last modified
2025-06-01 06:06
Optimization of computer games allows the user to "squeeze" everything out of the gameplay. The recently released PUBG game also has such an opportunity. It, like many others, is distinguished by a large number of individual settings that are important to know for optimization
2025-06-01 06:06
You have joined the multi-million army of CS fans, namely version 1.6, and decided to create a server. To do this correctly, you must have a clear, coherent plan of action in front of your eyes. Instructions Step 1 Skip this step if you already have CS 1
2025-06-01 06:06
Stopping and starting Apache on Unix-like systems is done using the command line. As far as Windows is concerned, the server can be stopped using a special graphical or console utility called httpd. If you are using an off-the-shelf XAMPP build, Apache can be disabled through the control panel
2025-06-01 06:06
While browsing the Internet, a computer connects to various network addresses. Sometimes the user has a need to find out with which ip the connection is currently established. This can be done using both the capabilities of the operating system and by installing additional software
2025-06-01 06:06
The installation of certain programs, including anti-virus software, can damage the stable operation of the local network. In such situations, you need to restore its parameters or completely reconfigure the connection to the server. Instructions Step 1 In the event that a local network failure was caused by the installation of a program, be sure to uninstall it
Popular for the month
Outgoing e-mail server is the ability to implement a variety of e-mail notification functions. Thanks to this, users will always be aware of changes in certain sites. And for administrators, this is the ability to warn site owners with automatic notifications about administrative problems that have arisen
Deeper and deeper embraces the Internet with its networks. Most users have their own email address. Nowhere without it - registration on any resource requires the presence of this important element, and it seems that this is a kind of passport of a citizen of the country
Login and password are concepts that are increasingly faced by many Internet users. But, unfortunately, not everyone knows exactly how to create a username and password to protect your account from hacking. Instructions Step 1 When registering on many sites, you at least once, but will face such a problem as "
If there are several thousand messages in an e-mail inbox, it makes no sense to try to find the right one among them manually. In this case, the web interfaces of the mail services are equipped with the function of automatic search of letters by keywords
A person who is just starting to get acquainted with the Internet can find it difficult to navigate the variety of resources that offer many services and services. There are postal services for the exchange of information. The user starts a mailbox and gets the opportunity to exchange texts, graphics, music with other users
Usually, the name of a mailbox is its login. Login is the name or name of the account. It is quite easy and simple to come up with a new login if you connect your imagination or use special services for generating names. Necessary Any internet browser
For convenience, most Internet users use the web interface of their email inbox, the name of which is almost impossible to change. When using mail programs, for example, Outlook, the user has such an opportunity. Necessary Microsoft Outlook software
The Internet is spreading more and more in all areas, including in document flow. It is often easier and faster to send a document by email than other methods. How to send the report by email correctly? Necessary - scanner; - computer
Today, for many people, an address is not just a house or a street, but also email. Most postal services on the Internet are free and available to everyone. The user has the right to choose any postal service and any name for his e-mail. Instructions Step 1 When registering an account on the mail server, the system will automatically offer you several options
Do you receive unknown messages from various e-mail addresses, allegedly from some action or your old friend? Before opening, you need to carefully study the information about who this box is registered to. Necessary - the Internet
We all face the need to use email services. We use email as a secure method of communication with our friends, acquaintances, relatives and colleagues. But it is protected only by our username and password, and sometimes it happens that ill-wishers take over our mailbox, and in this case we need to get our mail back as soon as possible in order to minimize possible damage
Hacker attacks, spamming and other troubles - all this is not new enough and sooner or later it can affect the e-mail of any person. Therefore, there are various ways to provide maximum protection against such problems. Necessary - access to the Internet
Sooner or later, even the most careless owner of an e-mail box, after reading pseudo-hacker stories, begins to think about the security of his e-mail. Keeping your email secure is not that difficult, especially since email services do the bulk of the work for you
Many Internet users constantly send emails by e-mail, because it is very fast and convenient. Some postal services offer services such as sending notification emails. If the recipient received the letter, then he must confirm it. Instructions Step 1 Note that such a service as "
As a rule, users, registering on different mail resources, come up with complex logins and passwords to log into the account. Often people set the same password on web resources in order not to forget it. But this is wrong, because for security reasons, you need to pay more attention to your accounts
The password in the mail system is used to protect the user's personal information from access to them by unauthorized persons. But if the owner of the mailbox forgets his password, he also cannot access the server until he can restore it in some way
How many of us have not received an e-mail in an unreadable encoding at least once? In such a situation, do not rush to ignore the message or scold the sender. Recode the text and you can read it. Instructions Step 1 Copy the text of the message to the clipboard
Now almost everyone exchanges certain information via the Internet, including the media. After the holidays, interesting trips or just a great day that they managed to capture on camera, Internet users throw off happy moments to each other through various Internet services
Email has become an integral part of modern life. The principles of its work are similar to regular mail: to send a letter, you need to know the recipient's address and write the text of the letter itself. Its advantages are that the speed of delivery of letters is much higher than that of regular mail
Email programs or online services do not support sending entire folders of information. But it is very inconvenient to add files one at a time, and the recipient has to manually collect them later in one folder. The way out is to send an archive with several documents