Internet and social networks, computer games, security online
Editor's choice
Interesting articles
New
Last modified
2025-06-01 06:06
Optimization of computer games allows the user to "squeeze" everything out of the gameplay. The recently released PUBG game also has such an opportunity. It, like many others, is distinguished by a large number of individual settings that are important to know for optimization
2025-06-01 06:06
You have joined the multi-million army of CS fans, namely version 1.6, and decided to create a server. To do this correctly, you must have a clear, coherent plan of action in front of your eyes. Instructions Step 1 Skip this step if you already have CS 1
2025-06-01 06:06
Stopping and starting Apache on Unix-like systems is done using the command line. As far as Windows is concerned, the server can be stopped using a special graphical or console utility called httpd. If you are using an off-the-shelf XAMPP build, Apache can be disabled through the control panel
2025-06-01 06:06
While browsing the Internet, a computer connects to various network addresses. Sometimes the user has a need to find out with which ip the connection is currently established. This can be done using both the capabilities of the operating system and by installing additional software
2025-06-01 06:06
The installation of certain programs, including anti-virus software, can damage the stable operation of the local network. In such situations, you need to restore its parameters or completely reconfigure the connection to the server. Instructions Step 1 In the event that a local network failure was caused by the installation of a program, be sure to uninstall it
Popular for the month
Almost every day, there are waves of calls to repost on social networks. While this can often be useful, it is much more common for outright fraudulent requests to occur. They can be disguised as a real need for help, and they are given out only by the general slogan:
A Microsoft account (formerly Windows Live ID) is required to access services such as Skype, Windows Phone, OutLook, and the store for products including MS Office suites. A Microsoft account is a combination of an email address registered in any mail system and a password that the user sets himself
There are three ways to recover your Yandex Disk password: using your phone, via e-mail, or by correctly answering the security question. But first, you need to check if everything is in order with the cookies. Checking cookies Before restoring the password for your Yandex Drive account, you should make sure that the password was entered incorrectly
Recently, many social networks are full of ads about quick and easy money. The ads promise good earnings without investment. To make it more convincing, supposedly already successful people attach screenshots of payments from their personal accounts
A home computer is very often used not only by adults, but also by children. To restrict them from visiting certain sites, you can block the URLs of those resources. There are several ways to restrict access to sites. Instructions Step 1 You need to log into the computer with an administrator account
The program "Internet Censor" is used to control access to the Internet. Only those sites that are included in the list of allowed sites will open. This program is convenient and effective, but sometimes the need for it disappears
Sometimes it happens that it is impossible to go to the site address that was blocked by the provider or proxy server. The reasons can be very different: from the fact that the site was blocked on suspicion of inappropriate content and ending with an error in the address of the blocked sites
Finding a hacker means determining his real IP (network address). It should be noted right away that this is very difficult to do in practice. A hacker with at least a little experience always takes measures to hide his true ip, so the search usually ends with nothing
For the correct operation of many browsers today, support for temporary files, the so-called cookies, is required. With their help, you will not need to enter data several times for authorization on sites where authentication is required (social networks, forums, etc
A very unpleasant fact can be that the user's Internet wallet disappeared due to a computer breakdown, hacking, loss of all data about the wallet, etc. However, its restoration under certain conditions is quite feasible. Instructions Step 1 Different payment systems have separate features for wallet recovery
Not only adults, but also children are active Internet users. To protect your child from unwanted information, it is better to deny him access to some sites. It is necessary - plug-in for "Mozilla Firefox"; - "
A lot of programs are running on the computer at any time. In the event that a program connects to the Internet, a specific port is allocated to it. Sometimes the user needs to determine which port a particular program or service occupies. Instructions Step 1 Open the command line:
You clicked on the link in order to pass on the site, say, a psychological test. After answering the last question, you found that you need to send an SMS to get the result. Of course, you will not send it, but the time is still wasted. How do you tell a paid site before you spend time on it, not afterward?
One of the most attacked ports of a personal computer is port 445; it is on this port that various viruses and worms often "break". This is due to the fact that it is used when accessing remote systems to transfer data over the network
If you have forgotten or lost the password for your Yandex mailbox, you should not be upset right away. The procedure for restoring it is quite simple, the main thing is that you have access to the mailbox to which the account is registered in the service
Your Gmail password is not only a key to your mailbox, it is a universal access key to all Google services, from Google+ to Android payment information. If you have a simple password for this mail system, you should think about changing it to a more complex one
Google Chrome supports a large number of functions for working with Internet resources. The capabilities of the browser can also be expanded with all kinds of add-ons, among which you can also find an applet for blocking unwanted resources. Instructions Step 1 Open the Google Chrome window and click on the menu button in the upper right part of it
Often, even a very good and interesting site is impossible to read due to intrusive ads. It interferes with the normal study of the site's content every now and then. There is a way to disable any pop-ups and protect yourself from annoying ads on the web
The most annoying and annoying thing on the Internet is pop-up ads. For site owners, it represents a good income, but for visitors it is a headache. Fortunately, there is a way to get rid of this problem. Instructions Step 1 If you decide to free yourself from annoying and annoying ads for good, then you will need to install a browser called Google Chrome, which has the ability to install additional plugins, including AdBlock
When registering in the Yandex.ru mail domain, in order to be able to safely recover the password in case of its loss, the user is required to select or enter a security question and indicate the answer to it. This is very convenient, but if you suspect that your security question and the answer to it may have become known to someone other than you, it makes sense to change it