Internet and social networks, computer games, security online
Editor's choice
Interesting articles
New
Last modified
2025-06-01 06:06
Optimization of computer games allows the user to "squeeze" everything out of the gameplay. The recently released PUBG game also has such an opportunity. It, like many others, is distinguished by a large number of individual settings that are important to know for optimization
2025-06-01 06:06
You have joined the multi-million army of CS fans, namely version 1.6, and decided to create a server. To do this correctly, you must have a clear, coherent plan of action in front of your eyes. Instructions Step 1 Skip this step if you already have CS 1
2025-06-01 06:06
Stopping and starting Apache on Unix-like systems is done using the command line. As far as Windows is concerned, the server can be stopped using a special graphical or console utility called httpd. If you are using an off-the-shelf XAMPP build, Apache can be disabled through the control panel
2025-06-01 06:06
While browsing the Internet, a computer connects to various network addresses. Sometimes the user has a need to find out with which ip the connection is currently established. This can be done using both the capabilities of the operating system and by installing additional software
2025-06-01 06:06
The installation of certain programs, including anti-virus software, can damage the stable operation of the local network. In such situations, you need to restore its parameters or completely reconfigure the connection to the server. Instructions Step 1 In the event that a local network failure was caused by the installation of a program, be sure to uninstall it
Popular for the month
Communication on the Internet has recently taken on a variety of forms. It takes place on forums, blogs, or simply by email. For users, ample opportunities have opened up in the design of text messages. It is necessary Computer, internet access
The network address (also called the MAC address of a computer) can be found in several common ways. The easiest way, of course, is to find out the network address of a computer by looking at the sticker or packaging of the network card. In the case when we are dealing not with a computer, but with a laptop, it is necessary to pay attention to the bottom of the device - there should be a sticker on which the MAC address of all network interfaces is indicated
In some cases, an Internet user is faced with the task of finding out his own IP address. He may have several such addresses: inside the local network, external, assigned by the provider, and sometimes the one located behind the proxy server
To exchange information over a network, the TCP transport protocol establishes communication between applications running on computers. The address field of each data packet includes a numeric identifier that indicates which application will process the information
The overwhelming majority of sites can be accessed by entering a convenient domain name into the browser line, and not the corresponding ip-address. This opportunity exists thanks to DNS servers (from the English Domain Name System), which store the necessary information
Internet users access the network through a provider. The provider owns a certain range of ip-addresses; when connecting to the network, the user is allocated one of the addresses in this range. The presence of an ip-address allows, if necessary, to easily identify the provider
Internet Protocol Address (abbreviated as ip address) is a personalized address of a computer that connects to the Internet or a local network. Usually the address is permanent and assigned by the network administrator. How do I make it float (dynamic)?
IP addresses are unique. They are 4 bytes long and are written as four groups of numbers from 0 to 255, separated by dots. Each group designates a network, a group of nodes, and an identifying node. Instructions Step 1 Look at the first group of numbers on the left
Delta Search is a virus-like search engine that is tricked into the computers of gullible users and replaces the beloved Google, Yandex and even the impudent Mail.ru Search. Removing Delta Search is possible, albeit difficult. This task will take a lot of time and patience
Login and password are always unique and secure. They are needed to keep the privacy of correspondence, confidentiality of information and protect yourself from fraudsters. Instructions Step 1 It seems that it is already difficult to choose your own unique one from the billions of logins of network users
Often, many users of the Vkontakte social network are faced with the situation of losing their password from their account. This can happen for various reasons: a computer crash, a virus infection, or just simply forgot your password. It is possible to recover your password, knowing your username, if you follow certain instructions
Despite the fact that advertising has become a familiar attribute of modern life, sometimes it becomes too much and it becomes difficult to make out everything else behind bright colors and obsessive flickering. Do not tolerate this, because to get rid of ads in the browser, you just need to tweak your computer a little
On the websites of mobile operators there are pages for sending SMS messages over the Internet. This is beneficial to the sender, but the recipient often does not receive any information about who sent the message. Instructions Step 1 The easiest way to catch an anonymous sender is if you use the services of the MTS operator
If you are not the only computer user, you need to ensure that your personal data is not available to third parties. To do this, it is worth clearing the history of the pages you viewed and saved passwords in the browser. You can delete history in the Opera browser either completely or partially
The fight against unauthorized pop-up windows is developing according to the same scenario as the fight against Internet viruses - browser manufacturers are honing their techniques for fighting pop-up windows, encouraging window builders to introduce new technologies
Many users of the Opera browser actively use the function of saving passwords. It is very convenient and saves a lot of time. But let's imagine the situation. You constantly visit the site using a password that was saved in your browser for a long time, but now you need to go to the same site from another browser, computer or phone, and you cannot remember the password in any way
When working on the Internet, the user is sometimes faced with a situation of uncontrolled traffic consumption. To understand which application uses the Internet, you should use the capabilities of the operating system or special programs. Instructions Step 1 If the computer actively interacts with the network while it is idle without updating the operating system files or anti-virus databases, you need to find a program that uses traffic
Any Internet user is interested in an important question - how to make your online experience as comfortable as possible, and how to optimize your computer in the best possible way, so that the Internet is pleasant and safe. An important security factor when working with Internet sites is the timely deletion of the browsing history in the browser
Any of the modern browsers has both functions for remembering logins and passwords, and options for clearing lists with saved authorization data. But a total cleanup is not always required - quite often it is necessary to selectively delete some logins and their corresponding passwords, while preserving the rest of the list
There are several ways to remove a banner from the browser. Quite often, the reason for the appearance of a banner is that the browser has not been updated for a long time, and, accordingly, its outdated technologies cannot cope with banners and other advertisements