Internet and social networks, computer games, security online

Last modified

How To Optimize PUBG

How To Optimize PUBG

2025-06-01 06:06

Optimization of computer games allows the user to "squeeze" everything out of the gameplay. The recently released PUBG game also has such an opportunity. It, like many others, is distinguished by a large number of individual settings that are important to know for optimization

How To Make A Server On CS

How To Make A Server On CS

2025-06-01 06:06

You have joined the multi-million army of CS fans, namely version 1.6, and decided to create a server. To do this correctly, you must have a clear, coherent plan of action in front of your eyes. Instructions Step 1 Skip this step if you already have CS 1

How To Stop Apache

How To Stop Apache

2025-06-01 06:06

Stopping and starting Apache on Unix-like systems is done using the command line. As far as Windows is concerned, the server can be stopped using a special graphical or console utility called httpd. If you are using an off-the-shelf XAMPP build, Apache can be disabled through the control panel

How To See Active Connections

How To See Active Connections

2025-06-01 06:06

While browsing the Internet, a computer connects to various network addresses. Sometimes the user has a need to find out with which ip the connection is currently established. This can be done using both the capabilities of the operating system and by installing additional software

How To Restore The Network

How To Restore The Network

2025-06-01 06:06

The installation of certain programs, including anti-virus software, can damage the stable operation of the local network. In such situations, you need to restore its parameters or completely reconfigure the connection to the server. Instructions Step 1 In the event that a local network failure was caused by the installation of a program, be sure to uninstall it

Popular for the month

How To Unblock A Page On Odnoklassniki

How To Unblock A Page On Odnoklassniki

Recently, cybercriminals are increasingly trying to guess passwords to people's accounts on social networks in order to send spam, malicious links, files, receive valuable information, and spy on someone. Therefore, users complain about the pages, which is why the administration blocks them

How To Control Traffic

How To Control Traffic

Working on the Internet, especially with a high connection speed, requires adherence to certain security measures. In particular, you need to monitor traffic and prevent uncontrolled network activity on your computer. Instructions Step 1 When a computer is connected to the network, a connection icon appears in the system tray in the form of two connected computers

How To Choose A Login

How To Choose A Login

Login is a username, unique for a particular site, under which he logs into an account on this resource. Often the login is the same as the user's nickname. When choosing a login, the user must be guided by a number of rules so that the name does not become a burden or a reason for ridicule from other users

How To Remove Firewall

How To Remove Firewall

A computer that is not protected by a firewall is open to hacker attacks. A properly configured firewall, also known as a firewall, is designed to give the user complete control over network traffic and computer ports. In OS Windows there is a firewall, but when installing a third-party firewall, it is recommended to disable the regular one

How Hackers Crack Passwords

How Hackers Crack Passwords

Most Internet users have experienced account theft - many hackers are doing this on a really huge scale. However, few people know how the hacking process takes place. Instructions Step 1 The most common option is to brute-force common passwords

How To Turn Off The Popup

How To Turn Off The Popup

Despite the constant improvement of anti-virus software products and the replenishment of their databases with new entries, some viruses and malware can still penetrate the computer. If we are talking about advertising windows that pop up on top of all other windows in the system, interfering with the work with the PC, it is necessary to delete the files causing them as soon as possible

How To Update Doctor Web Without The Internet

How To Update Doctor Web Without The Internet

Updating the Dr.Web anti-virus program on a computer that does not have Internet access turns out to be quite feasible provided that at least one computer in the organization using the anti-virus is connected to the Internet. This operation will require certain computer skills and administrator access to computer resources from the user

How To Remove A Filter On A Website

How To Remove A Filter On A Website

Most companies monitor the activity of their employees on the Internet. They keep logs of sites that were visited during the working day, and also block those sites that, in their opinion, should not be visited during business hours - social networks, sites with video and entertainment content

How To Create A Blacklist Of Sites

How To Create A Blacklist Of Sites

Sometimes it becomes necessary to blacklist a website. The main reason for this is to prevent your child from viewing unwanted resources. And this can help "Parental Control" in the "Control Panel". Instructions Step 1 There is this function on the computer so that the child on the Internet visits only good sites and does not look at resources that are intended for adults

How To Remove Spam From A Page

How To Remove Spam From A Page

Social networks have become a favorite area of activity for malware creators. Trojans steal personal data of users, viruses block surfing on the Internet and direct visitors to duplicates of popular sites. Spam is sent from an infected computer with an invitation to visit an interesting resource or admire photographs

How To Enter A Blocked Site

How To Enter A Blocked Site

According to the famous psychotherapist and blogger Mark Sandomirsky, social networks for most users are a form of traditional psychotherapy and a way to get rid of stress. Therefore, the fact that many employees relieve stress during working hours by visiting Odnoklassniki or Vkontakte sites is not surprising

How To Leave Access To Only One Site

How To Leave Access To Only One Site

For parental control over children's computer use, it is often necessary to leave access to only one or a specific group of sites. If the child does not have a separate computer, first make it so that he only logs in with his own account. Instructions Step 1 If you are using Internet Explorer, go to Internet Properties, click the "

How To Remove The Restriction On The Internet

How To Remove The Restriction On The Internet

Most companies use a proxy server through which employees access the Internet. In order to filter sites that are open to visitors, a ban is placed on visiting sites such as social networks, file sharing and sites with entertainment content. In order to remove this restriction on the Internet, you need to use one of the methods by which you can visit any site

How To Lock A Hard Drive

How To Lock A Hard Drive

Hard drives can be locked in Windows without the involvement of additional software by standard means of the system itself. This operation increases the security level of your computer and excludes the possibility of making changes to the files of locked drives

How To Quickly Change Ip

How To Quickly Change Ip

When surfing the web, it is often necessary to quickly change the ip-address. To do this, you can use a number of methods, among which one can distinguish both the use of specialized software and work with the corresponding web services. Instructions Step 1 The easiest and fastest way to change the ip-address is to work with applications like the Hide my Ip program

What Is Ddos attack

What Is Ddos attack

DDoS attack is an abbreviation for Distributed Denial of Service, which translates to Distributed Denial of Service. This term means denial of service to a resource as a result of continuous requests. In other words, it is an attack on a system that aims to disable it

How To Remove A Filter From The Internet

How To Remove A Filter From The Internet

Sometimes, when browsing the Internet, we can come across an inscription indicating that the site of interest to us is blocked. This means that our provider or proxy server administrator considered the content on this site to be inappropriate for viewing and blocked it

How To Find Out Your Password On Rambler

How To Find Out Your Password On Rambler

E-mail occupies an important part of both the personal and business life of a modern person. It is not surprising, because there you can also combine all important contacts, carry on correspondence and save the necessary messages. All personal information is securely password protected

How Not To Leave Traces On The Internet

How Not To Leave Traces On The Internet

Thanks to the Internet, you can find a lot of useful information, meet old and make new friends. However, as in real life, an attacker can sit at the next monitor, who will use your frivolously left data or obtain it in a clever way. It is necessary - Anonymizer

How To Open A Port In A Firewall

How To Open A Port In A Firewall

A firewall, also known as a firewall and firewall, serves both to prevent penetration of the computer from the outside, and to prevent attempts by Trojans that have entered the system to transmit the collected information. In order for user programs to access the network without hindrance, the firewall must be configured correctly