Internet and social networks, computer games, security online

Last modified

How To Optimize PUBG

How To Optimize PUBG

2025-06-01 06:06

Optimization of computer games allows the user to "squeeze" everything out of the gameplay. The recently released PUBG game also has such an opportunity. It, like many others, is distinguished by a large number of individual settings that are important to know for optimization

How To Make A Server On CS

How To Make A Server On CS

2025-06-01 06:06

You have joined the multi-million army of CS fans, namely version 1.6, and decided to create a server. To do this correctly, you must have a clear, coherent plan of action in front of your eyes. Instructions Step 1 Skip this step if you already have CS 1

How To Stop Apache

How To Stop Apache

2025-06-01 06:06

Stopping and starting Apache on Unix-like systems is done using the command line. As far as Windows is concerned, the server can be stopped using a special graphical or console utility called httpd. If you are using an off-the-shelf XAMPP build, Apache can be disabled through the control panel

How To See Active Connections

How To See Active Connections

2025-06-01 06:06

While browsing the Internet, a computer connects to various network addresses. Sometimes the user has a need to find out with which ip the connection is currently established. This can be done using both the capabilities of the operating system and by installing additional software

How To Restore The Network

How To Restore The Network

2025-06-01 06:06

The installation of certain programs, including anti-virus software, can damage the stable operation of the local network. In such situations, you need to restore its parameters or completely reconfigure the connection to the server. Instructions Step 1 In the event that a local network failure was caused by the installation of a program, be sure to uninstall it

Popular for the month

How To Organize The Collection Of Information

How To Organize The Collection Of Information

The one who owns information, owns everything, this old truth is relevant to this day. In order to draw correct conclusions, it is necessary to organize the collection of information. Searching for the necessary information on the Internet has its own characteristics that must be taken into account

How To Renew Your Antivirus Subscription

How To Renew Your Antivirus Subscription

Normal operation of a computer, provided that it is connected to the Internet, is impossible without a constantly updated antivirus program, the subscription to which must be regularly renewed. Instructions Step 1 Free antivirus programs such as AVIRA (http:

How To Change The Network Password

How To Change The Network Password

The network password serves as a security measure when using Wi-Fi wireless Internet access technology. If you set a password that is too simple and short, it will most likely be easy for unauthorized people to use it. Necessary - browser

How Will The Introduction Of A "black List" Of Sites Affect The Cost Of Internet Access?

How Will The Introduction Of A "black List" Of Sites Affect The Cost Of Internet Access?

On July 18, 2012, the Federation Council approved a package of laws that form in Russia a list of sites prohibited for children. The introduction of a blacklist may require additional investments from Russian operators, which will affect the cost of Internet access services

How To Detect Trojan

How To Detect Trojan

The Trojan has many functions, such as controlling a remote computer, obtaining other people's Internet accounts, hacking, and more. Most often, people themselves do not suspect that this program exists on their computer, since they download it themselves, mistaking it for harmless, and sometimes useful

How To Protect Yourself From Being Hacked

How To Protect Yourself From Being Hacked

With the widespread use of computers and the emergence of an increasing number of Internet users, one big problem has arisen - hacking directly into computers and accounts on all kinds of resources. For an ordinary user, these actions do not bring much trouble, the maximum is an unpleasant aftertaste on the soul

How To Find A Banner

How To Find A Banner

After visiting certain resources on the Internet, banners containing obtrusive advertisements, for example, of a pornographic nature, may "take root" on your computer. Of course, they interfere with work and cause a sea of negative emotions

How To Remove An Account

How To Remove An Account

In order to delimit access to one computer for several users, there is a special tool - accounts. Very often it becomes necessary to delete accounts due to the decrease in the number of computer users. How can this be done? Instructions Step 1 Remember that it is not possible to delete the administrator account

How To Deny Access To The Site

How To Deny Access To The Site

It is often necessary to protect your own children from unsafe Internet content. To do this, you need to use special filter programs that allow you to control the content of sites that your child visits. They will help ensure safe surfing and filter out unwanted content

How To Put A Password On An Access Point

How To Put A Password On An Access Point

Modern technologies make it possible to distribute the Internet to several computers at once, connecting to only one provider and not entangling the entire room with wires. This can be done using a router. However, in order for your Internet connection to remain fast and secure, you need to password protect the access point

How To Activate Kaspersky Anti-Virus On The Internet

How To Activate Kaspersky Anti-Virus On The Internet

For the anti-virus to work correctly, it requires constant updating of its signature databases. They are the key to the security of the computer and the information that is in it. Kaspersky Anti-Virus provides the user with proactive protection against viruses, Trojans and spyware, as well as unknown threats

How To Remove A Password From Mail

How To Remove A Password From Mail

E-mail is the oldest method of communication on the Internet. To this day, email boxes remain the repository of personal information and important data that we need. On many sites, they are used as the primary identifier for the account owner

What Is Web Vulnerability Scanner

What Is Web Vulnerability Scanner

Computers and computer networks are complex tools, the interaction of which may not always affect the way their creators intended. No, we are not talking about the uprising of machines, but the loss of even one document as a result of a hardware error can lead to serious problems, say, for the accounting department of a company

How To Check A Website For Viruses

How To Check A Website For Viruses

Viruses on the site are not uncommon. Often, the owner does not even suspect that there are malicious programs on his resource that infect users. To avoid this situation, you need to constantly check the site for viruses. First of all, try to access your site from various search engines

How To Open Internet Access

How To Open Internet Access

The majority of users create their own local networks to open Internet access to several devices at once. To achieve this goal, you must be able to set the correct parameters for all computers or laptops. Necessary network cable, network adapter

How To Change The ICQ Password

How To Change The ICQ Password

The ICQ communication program or simply ICQ has become a part of our life. But sooner or later, the user is faced with the question of changing the password of his favorite program. It doesn't matter what caused such a desire - a security requirement or the dictates of the left heel, but if you want to change the password, then you need to change it

How To Sign A Personal Certificate

How To Sign A Personal Certificate

Signing applications with a personal certificate is standard for Nokia smartphones. There is a fairly large selection of programs designed to perform this procedure, differing only in design. In this case, the SignTool program is considered

How To Block An Address

How To Block An Address

There are several different ways to block access to websites. For example, you can solve this problem using the tools that Windows has. But we must admit that such methods are more suitable for advanced PC users. However, there is one simple and quick method for shutting down a specific group of sites

How To Get A Stolen Account Back

How To Get A Stolen Account Back

Crimes in the form of theft of mailbox accounts, social media profiles and even entire websites are very common nowadays. That is why the developers of this or that resource offer a special set of measures to return the stolen goods. Instructions Step 1 Try to regain control of the lost account on your own

How To Get Rid Of A Banner On Your Computer

How To Get Rid Of A Banner On Your Computer

Recently, more and more users are faced with such a problem as the appearance of an advertising banner on the computer desktop. It is quite difficult to remove it, and its developers, in order to unlock the PC, offer to send a paid SMS message to a short number