Internet and social networks, computer games, security online

Last modified

How To Optimize PUBG

How To Optimize PUBG

2025-06-01 06:06

Optimization of computer games allows the user to "squeeze" everything out of the gameplay. The recently released PUBG game also has such an opportunity. It, like many others, is distinguished by a large number of individual settings that are important to know for optimization

How To Make A Server On CS

How To Make A Server On CS

2025-06-01 06:06

You have joined the multi-million army of CS fans, namely version 1.6, and decided to create a server. To do this correctly, you must have a clear, coherent plan of action in front of your eyes. Instructions Step 1 Skip this step if you already have CS 1

How To Stop Apache

How To Stop Apache

2025-06-01 06:06

Stopping and starting Apache on Unix-like systems is done using the command line. As far as Windows is concerned, the server can be stopped using a special graphical or console utility called httpd. If you are using an off-the-shelf XAMPP build, Apache can be disabled through the control panel

How To See Active Connections

How To See Active Connections

2025-06-01 06:06

While browsing the Internet, a computer connects to various network addresses. Sometimes the user has a need to find out with which ip the connection is currently established. This can be done using both the capabilities of the operating system and by installing additional software

How To Restore The Network

How To Restore The Network

2025-06-01 06:06

The installation of certain programs, including anti-virus software, can damage the stable operation of the local network. In such situations, you need to restore its parameters or completely reconfigure the connection to the server. Instructions Step 1 In the event that a local network failure was caused by the installation of a program, be sure to uninstall it

Popular for the month

How To Block Access To Certain Sites

How To Block Access To Certain Sites

When organizing computer networks or when using a computer at home, sometimes it becomes necessary to block access to certain resources. This function can be implemented in order to protect a network or computer user from visiting a particular site

How To Remove A Ban From A Site

How To Remove A Ban From A Site

Many companies use software that can be used to restrict the sites that employees can view. These programs put a block on a proxy server through which employees of this company access the Internet. There are several ways to get around this limitation

How To Find Out The Secret Code

How To Find Out The Secret Code

In the digital age, almost all personal information is encoded. You even get your salary on a card protected by a secret code. The opportunity to recognize him is given once. Instructions Step 1 First, you will receive an envelope with a card

How To Avoid Installing Unwanted Programs When Downloading Free Software

How To Avoid Installing Unwanted Programs When Downloading Free Software

The internet is littered with pitfalls for novice users. Fake "Download" buttons are actually advertisements. Many users do not know how to avoid unwanted programs when installing software. Instructions Step 1 Fake download links

How To Find Out The Login And Password To The Login

How To Find Out The Login And Password To The Login

If you think your friend is not overly cautious and is overly careless with information, you can easily teach him to be more careful. The most harmless way is to change the password of his mailbox, then return and explain how it was done. Believe me, he will not forget this soon and will continue to be much more careful

How To Remove Winlocker

How To Remove Winlocker

Winlocker is a special type of malicious software from which an inattentive user of a personal computer and network is practically not immune. What is Winlocker? Winlocker is a type of malicious software that blocks the user's operating system

How To Unsubscribe From The Weather Newsletter

How To Unsubscribe From The Weather Newsletter

Mobile operators connect services and subscriptions to their subscribers for advertising purposes. For a certain period of time, the options are provided free of charge, but if you do not disable them, the money on the account starts to melt

How To Remove Sweet-page

How To Remove Sweet-page

Sweet-page.com is a website hijacker that spoofs the home page of browsers and the search engine and collects information about the computer owner's web surfing. How to remove Sweet-page Unfortunately, you cannot remove Sweet-page using the Add / Remove Programs utility from the Control Panel

How To Remember Your Username

How To Remember Your Username

Favorite sites that we visit every day are taking an increasing place in our life. We get used to them, they become a part of life. We enter such sites “automatically” - for a long time, without thinking about what kind of username or password we have there - the system remembers everything

How To Find A Device On The Network

How To Find A Device On The Network

The need to search for network devices can arise in a variety of cases, for example, when setting up a network or checking the security level. Knowing which devices are connected to the network gives the administrator the information he needs to plan future work

How To Block Unwanted Sites

How To Block Unwanted Sites

The Internet is a treasure trove of information, but not all sources broaden the horizons and are useful. There are many sites that are best blocked. And if a child is at the computer, then it is simply necessary to do this. It is necessary - PC with installed Windows operating system and Internet access

How To Install Ssl Certificate

How To Install Ssl Certificate

SSL certificate is used by many websites and servers for security purposes. This technology is compatible with all major browsers and operating systems. The purchased SSL certificate is in the form of a text file with encrypted information that can only be recognized by your server during installation

How To Restore Access To Your Vkontakte Account Using Your Phone

How To Restore Access To Your Vkontakte Account Using Your Phone

Often people lose their passwords to various sites, which leads to the inability to use their data, photos and videos, entrusted to social networks. Thanks to the modern authorization system used in the most popular social networks today, you can easily restore access to your account, which will eliminate the need to create a new profile and start all over again without having access to previously downloaded materials

How To Get Rid Of SMS Spam

How To Get Rid Of SMS Spam

When we use the word "spam", as a rule, we associate it with email spam, but today sms spam is becoming more and more widespread. Moreover, in terms of the amount of unwanted information received via a mobile phone, sms spam can compete with email spam, and getting rid of it is quite difficult

How To Open And Close Ports

How To Open And Close Ports

Opening and closing ports is not difficult. Typically, ports do not need to be opened in the sense that they should open automatically. But when you need to close ports, then in this case you need to think about the security of the operating system

How To View Closed Ports

How To View Closed Ports

When connected to the Internet, the operating system allocates ports to the programs working with the network, through which data is received and sent. The port can be open or closed. Sometimes the user needs to check the status of the ports

How To Recover A Lost Password

How To Recover A Lost Password

With each new registration on a mail domain, in an online store, in social networks, a password is required. Security rules insist - and rightly so - that users should never use the same password for different registrations, and set up a password that does not contain information that may be available to unauthorized persons, for example, your birthday, as well as used in the password upper and lower case, letters and numbers, and sometimes other symbols - dots, dashes, and so

How To Restrict User Access To The Internet

How To Restrict User Access To The Internet

There is useful and necessary information on the Internet, but there is harmful and useless information, especially for children. The child does not understand some things and climbs into forbidden materials. How to make Internet access inaccessible?

Where All The Information Posted On The Internet Is Stored

Where All The Information Posted On The Internet Is Stored

The Internet was once created for military purposes: communications between fire control centers and military bases. Then, as is often the case, military developments began to be used for peaceful purposes, and one day the moment came when most of the world's population gained access to the network

How To Remove Addresses From The Address Bar In "Opera"

How To Remove Addresses From The Address Bar In "Opera"

Any modern browser has the function of remembering already typed URLs and reminding them when you enter new ones. It is often necessary to clear the list of these addresses, for example, for confidentiality purposes. There are two ways to do this in the Opera browser