Internet and social networks, computer games, security online
Editor's choice
Interesting articles
New
Last modified
2025-06-01 06:06
Optimization of computer games allows the user to "squeeze" everything out of the gameplay. The recently released PUBG game also has such an opportunity. It, like many others, is distinguished by a large number of individual settings that are important to know for optimization
2025-06-01 06:06
You have joined the multi-million army of CS fans, namely version 1.6, and decided to create a server. To do this correctly, you must have a clear, coherent plan of action in front of your eyes. Instructions Step 1 Skip this step if you already have CS 1
2025-06-01 06:06
Stopping and starting Apache on Unix-like systems is done using the command line. As far as Windows is concerned, the server can be stopped using a special graphical or console utility called httpd. If you are using an off-the-shelf XAMPP build, Apache can be disabled through the control panel
2025-06-01 06:06
While browsing the Internet, a computer connects to various network addresses. Sometimes the user has a need to find out with which ip the connection is currently established. This can be done using both the capabilities of the operating system and by installing additional software
2025-06-01 06:06
The installation of certain programs, including anti-virus software, can damage the stable operation of the local network. In such situations, you need to restore its parameters or completely reconfigure the connection to the server. Instructions Step 1 In the event that a local network failure was caused by the installation of a program, be sure to uninstall it
Popular for the month
Many Internet users are aware of the problem of having a huge amount of advertisements on websites. She often turns out to be unpleasant and intrusive. Fortunately, you can get rid of it quite easily, the main thing is to know the correct sequence of actions
A large amount of advertising on sites today is one of the main disadvantages of the Internet. Ads can be in the form of banners, text, pop-ups, opening tabs - all of which are annoying. There are different ways to fix this problem for each browser
Almost all sites on the Internet today contain advertisements. It comes in the form of banners and text. Many users, due to ignorance, click on ads and get viruses, Trojans and the like on their computers. Let's take a look at a number of measures to get rid of ads in Chrome, a browser from Google
Like any other, the profession of a game designer includes many features and subtleties. The tips listed below will be useful primarily for beginners in game development. Play a lot It's not enough to play only games of your favorite genre
The Internet has become an integral part of our life. We shop online, pay bills, communicate and work, but if you surf the web thoughtlessly, you run the risk of getting a virus on your computer, losing important data or money. To significantly reduce the risks, it is enough to follow simple rules of a safe Internet
For the second month in a row, Pokemon Go has been driving millions of smartphone users crazy. The developers of this application really did their best. After all, they were able to combine the virtual and real world in the game. The user just needs to wander around the city, collect quest items and hunt for unusual creatures - Pokemon
Now a new type of addiction has emerged - addiction to social networks. Unfortunately, people forget about it and spend all their free time on social networks. Addiction to social networks is still a disease, like alcoholism or drug addiction
Making money on the Internet is becoming more and more important. Everyone who has free time and a desire to raise their income level rushes in search of an additional source of their finances. As a rule, these are schoolchildren and students, mothers on maternity leave, freelancers and even advanced retirees
Electronic money has become quite popular at the moment. As a result, it is useful to know how to use them. After all, most enterprises already use electronic money payment. Instructions Step 1 Electronic money is slowly entering our lives
Internet users are used to finding the information they need through search engines, but the information does not always look like a text phrase. Sometimes it becomes necessary to find a picture on the Internet. Why image search is needed The location of the picture is being clarified for several reasons
After adding a new contact in the instant messaging service, you found that instead of a person, you were answered by an automaton that requires you to answer a simple question to make sure that you are not a spam robot. What is the answer to the automaton?
Users of the VKontakte social network take an active part in various discussions, express their emotions and experiences in statuses, and reflect the latest events from their own lives in personal photos and videos. However, the moment comes when you want to hide from prying eyes and everyone's attention
Emoticons on the VKontakte social network have become one of the most anticipated updates that users have been looking for. There is an opportunity not only to use them in messages, but also to put emoticons in the VKontakte status. Instructions Step 1 Check out the list of available VKontakte emoticons by clicking on the icon with a smiling face next to the button for sending messages to other users or on the wall
It often happens that users of the "Sprashivai.ru" social network lose their password for the page. More often than not, this happens simply because he is forgotten. However, it will not be difficult to restore access. To recover the password from your page on "
ICQ is a centralized instant messaging network on the Internet. It contains a list of contacts. Also, in the dialog box, you can see the status of the user. The basic state of the user serves as an indicator of his presence in the ICQ system
Anonymous messages are mysterious. You always want to guess who wrote the unsigned letter, why he chose to remain anonymous? This can be done in several ways. Instructions Step 1 If you cannot understand who is writing, read the letter carefully
Many WhatsApp users are interested in privacy issues, and many are not interested in the protection of correspondence, but in how to read someone else's correspondence in WhatsApp remotely. What are the ways to read the correspondence and what is it for?
Quite often, journalists or students are required to transcribe an audio recording on their own. Unfortunately, the decryption process is very laborious and can take a long time. Fortunately, you no longer need to sit at a dictaphone with a piece of paper and a pen all day long - you can simply upload an audio track to Youtube and copy the finished text in a couple of seconds
Today it is hard to imagine yourself without virtual communication - all kinds of text services, chats, e-mail. Sad as it is to admit it, we often get spam in our messages, most often sent by the program. But sometimes even spam needs to be recovered
Decorative stone is well suited for cladding metal, concrete, wood and brick surfaces. It can be installed seamlessly or with jointing. And the work must be carried out at a temperature of at least 5 degrees Celsius. Necessary - decorative rock