Internet and social networks, computer games, security online

Last modified

How To Optimize PUBG

How To Optimize PUBG

2025-06-01 06:06

Optimization of computer games allows the user to "squeeze" everything out of the gameplay. The recently released PUBG game also has such an opportunity. It, like many others, is distinguished by a large number of individual settings that are important to know for optimization

How To Make A Server On CS

How To Make A Server On CS

2025-06-01 06:06

You have joined the multi-million army of CS fans, namely version 1.6, and decided to create a server. To do this correctly, you must have a clear, coherent plan of action in front of your eyes. Instructions Step 1 Skip this step if you already have CS 1

How To Stop Apache

How To Stop Apache

2025-06-01 06:06

Stopping and starting Apache on Unix-like systems is done using the command line. As far as Windows is concerned, the server can be stopped using a special graphical or console utility called httpd. If you are using an off-the-shelf XAMPP build, Apache can be disabled through the control panel

How To See Active Connections

How To See Active Connections

2025-06-01 06:06

While browsing the Internet, a computer connects to various network addresses. Sometimes the user has a need to find out with which ip the connection is currently established. This can be done using both the capabilities of the operating system and by installing additional software

How To Restore The Network

How To Restore The Network

2025-06-01 06:06

The installation of certain programs, including anti-virus software, can damage the stable operation of the local network. In such situations, you need to restore its parameters or completely reconfigure the connection to the server. Instructions Step 1 In the event that a local network failure was caused by the installation of a program, be sure to uninstall it

Popular for the month

How To Decrypt A Password

How To Decrypt A Password

You can decrypt a password, for example, from icq, by overlaying a specially generated line that includes the UIN information - the password and the CryptIV value. When decrypting, consider the reverse order of data storage in memory. It is necessary - Hex editor Instructions Step 1 Launch any Hex editor such as HexWorkshop

How To Remove Old Passwords And Logins

How To Remove Old Passwords And Logins

Most sites and email accounts require registration to protect personal information and maintain privacy. At the same time, Internet browsers offer the function of saving a password and then automatically logging into frequently visited pages

How To Remember Login And Password

How To Remember Login And Password

When registering on various sites every day, many users set the same login and password on all resources so as not to forget them. This is wrong - more attention should be paid to account security. It is necessary Computer, notebook

What Free Antivirus Can Be Downloaded On A Laptop

What Free Antivirus Can Be Downloaded On A Laptop

It is very important to observe basic safety principles when working on a computer / laptop, especially with constant access to the Internet. One of the most important points of this is the installation of antivirus (a special program to protect against malicious viruses, spam and hackers)

How To Change Your Username And Password

How To Change Your Username And Password

The second and already firmly established reality in our life is social networking sites. We go there so often that we get used to log in without hindrance, without thinking about logins and passwords. If, for some reason, you want to change your username and password, let's see how this can be done

What Is Authentication

What Is Authentication

Authentication is a procedure that allows you to verify the authenticity of the data specified by the user. After successfully passing the authentication, the user is given access to classified information on the Internet resource. Principle of operation To pass authentication, the user is prompted to enter a combination of certain data, for example, the login and password of the account used

How To Open Incognito Mode By Default In Google Chrome

How To Open Incognito Mode By Default In Google Chrome

If your computer is being used by others, your online privacy may be one of your top priorities. Google Chrome incognito mode does not contain any browsing or downloading activity records. While it's easy to switch to incognito mode in Google Chrome, you can forget, thereby violating your privacy

How To Block Traffic

How To Block Traffic

Network traffic blocking is often used to keep your computer and data safe. Traffic is the flow of information passing through your network equipment. It is necessary - firewall program; - Internet connection. Instructions Step 1 Use a special firewall program to block Internet traffic

How To Check Browser Settings

How To Check Browser Settings

For stable work on the Internet, you need to monitor the functions that your browser is capable of supporting. In most cases, the standard settings are configured by default, but in some cases user intervention may be required. It is necessary - A computer

How To Prevent The Password From Being Displayed

How To Prevent The Password From Being Displayed

Most of the sites on the network offer the user, once entering their credentials required to enter the page, remember them using a special autosave function. However, this option is not always the case. In particular, when several people use one computer

How To Recover A Forgotten Login

How To Recover A Forgotten Login

Social networks are taking up more and more place in our daily life. We visit our favorite resource every day and log into our account automatically. And suddenly some kind of failure occurs, you try to enter the site and find that the settings are knocked down, and you have forgotten your username

How To Block The Installation Of Programs

How To Block The Installation Of Programs

If someone elusive is constantly cluttering the hard drive with unnecessary and system-loading programs, it is not at all necessary to ambush it. By configuring Windows in a certain way, you can prevent the installation of programs as such. Instructions Step 1 Press the key combination Win + R

How To Allow Uploading

How To Allow Uploading

Allowing a user to download ActiveX controls or simply individual files is one of the security settings for a Windows computer that uses Internet Explorer. The first problem is solved by changing the settings of the browser itself, and the second will require editing the system registry entries

How To Disable The Subscription On The Site

How To Disable The Subscription On The Site

The system of mass transmission of messages containing advertising information (spam) is a frequent occurrence on the Internet. You can encounter it when using a publicly posted email address on the Internet or frequent registration on sites

What Is A Blacklist Of Sites

What Is A Blacklist Of Sites

Internet visitors are often annoyed by the dominance of unwanted emails (spam), viruses, advertisements and pornography. In order to somehow cope with malicious content, many network services began to create lists of sites containing it - blacklists, otherwise blacklists (from the English blacklist)

How To Remove Viruses That Block Sites

How To Remove Viruses That Block Sites

One of the fraudulent schemes used by the authors of viruses looks like this. The program blocks access to certain or any sites or does not allow the use of the computer at all until the user sends an expensive SMS message. Don't waste your last money on enriching criminals - cure your computer for free

How To Unblock A Page On Odnoklassniki

How To Unblock A Page On Odnoklassniki

Recently, cybercriminals are increasingly trying to guess passwords to people's accounts on social networks in order to send spam, malicious links, files, receive valuable information, and spy on someone. Therefore, users complain about the pages, which is why the administration blocks them

How To Control Traffic

How To Control Traffic

Working on the Internet, especially with a high connection speed, requires adherence to certain security measures. In particular, you need to monitor traffic and prevent uncontrolled network activity on your computer. Instructions Step 1 When a computer is connected to the network, a connection icon appears in the system tray in the form of two connected computers

How To Choose A Login

How To Choose A Login

Login is a username, unique for a particular site, under which he logs into an account on this resource. Often the login is the same as the user's nickname. When choosing a login, the user must be guided by a number of rules so that the name does not become a burden or a reason for ridicule from other users

How To Remove Firewall

How To Remove Firewall

A computer that is not protected by a firewall is open to hacker attacks. A properly configured firewall, also known as a firewall, is designed to give the user complete control over network traffic and computer ports. In OS Windows there is a firewall, but when installing a third-party firewall, it is recommended to disable the regular one