Internet and social networks, computer games, security online
Editor's choice
Interesting articles
New
Last modified
2025-06-01 06:06
Optimization of computer games allows the user to "squeeze" everything out of the gameplay. The recently released PUBG game also has such an opportunity. It, like many others, is distinguished by a large number of individual settings that are important to know for optimization
2025-06-01 06:06
You have joined the multi-million army of CS fans, namely version 1.6, and decided to create a server. To do this correctly, you must have a clear, coherent plan of action in front of your eyes. Instructions Step 1 Skip this step if you already have CS 1
2025-06-01 06:06
Stopping and starting Apache on Unix-like systems is done using the command line. As far as Windows is concerned, the server can be stopped using a special graphical or console utility called httpd. If you are using an off-the-shelf XAMPP build, Apache can be disabled through the control panel
2025-06-01 06:06
While browsing the Internet, a computer connects to various network addresses. Sometimes the user has a need to find out with which ip the connection is currently established. This can be done using both the capabilities of the operating system and by installing additional software
2025-06-01 06:06
The installation of certain programs, including anti-virus software, can damage the stable operation of the local network. In such situations, you need to restore its parameters or completely reconfigure the connection to the server. Instructions Step 1 In the event that a local network failure was caused by the installation of a program, be sure to uninstall it
Popular for the month
The one who owns information, owns everything, this old truth is relevant to this day. In order to draw correct conclusions, it is necessary to organize the collection of information. Searching for the necessary information on the Internet has its own characteristics that must be taken into account
Normal operation of a computer, provided that it is connected to the Internet, is impossible without a constantly updated antivirus program, the subscription to which must be regularly renewed. Instructions Step 1 Free antivirus programs such as AVIRA (http:
The network password serves as a security measure when using Wi-Fi wireless Internet access technology. If you set a password that is too simple and short, it will most likely be easy for unauthorized people to use it. Necessary - browser
On July 18, 2012, the Federation Council approved a package of laws that form in Russia a list of sites prohibited for children. The introduction of a blacklist may require additional investments from Russian operators, which will affect the cost of Internet access services
The Trojan has many functions, such as controlling a remote computer, obtaining other people's Internet accounts, hacking, and more. Most often, people themselves do not suspect that this program exists on their computer, since they download it themselves, mistaking it for harmless, and sometimes useful
With the widespread use of computers and the emergence of an increasing number of Internet users, one big problem has arisen - hacking directly into computers and accounts on all kinds of resources. For an ordinary user, these actions do not bring much trouble, the maximum is an unpleasant aftertaste on the soul
After visiting certain resources on the Internet, banners containing obtrusive advertisements, for example, of a pornographic nature, may "take root" on your computer. Of course, they interfere with work and cause a sea of negative emotions
In order to delimit access to one computer for several users, there is a special tool - accounts. Very often it becomes necessary to delete accounts due to the decrease in the number of computer users. How can this be done? Instructions Step 1 Remember that it is not possible to delete the administrator account
It is often necessary to protect your own children from unsafe Internet content. To do this, you need to use special filter programs that allow you to control the content of sites that your child visits. They will help ensure safe surfing and filter out unwanted content
Modern technologies make it possible to distribute the Internet to several computers at once, connecting to only one provider and not entangling the entire room with wires. This can be done using a router. However, in order for your Internet connection to remain fast and secure, you need to password protect the access point
For the anti-virus to work correctly, it requires constant updating of its signature databases. They are the key to the security of the computer and the information that is in it. Kaspersky Anti-Virus provides the user with proactive protection against viruses, Trojans and spyware, as well as unknown threats
E-mail is the oldest method of communication on the Internet. To this day, email boxes remain the repository of personal information and important data that we need. On many sites, they are used as the primary identifier for the account owner
Computers and computer networks are complex tools, the interaction of which may not always affect the way their creators intended. No, we are not talking about the uprising of machines, but the loss of even one document as a result of a hardware error can lead to serious problems, say, for the accounting department of a company
Viruses on the site are not uncommon. Often, the owner does not even suspect that there are malicious programs on his resource that infect users. To avoid this situation, you need to constantly check the site for viruses. First of all, try to access your site from various search engines
The majority of users create their own local networks to open Internet access to several devices at once. To achieve this goal, you must be able to set the correct parameters for all computers or laptops. Necessary network cable, network adapter
The ICQ communication program or simply ICQ has become a part of our life. But sooner or later, the user is faced with the question of changing the password of his favorite program. It doesn't matter what caused such a desire - a security requirement or the dictates of the left heel, but if you want to change the password, then you need to change it
Signing applications with a personal certificate is standard for Nokia smartphones. There is a fairly large selection of programs designed to perform this procedure, differing only in design. In this case, the SignTool program is considered
There are several different ways to block access to websites. For example, you can solve this problem using the tools that Windows has. But we must admit that such methods are more suitable for advanced PC users. However, there is one simple and quick method for shutting down a specific group of sites
Crimes in the form of theft of mailbox accounts, social media profiles and even entire websites are very common nowadays. That is why the developers of this or that resource offer a special set of measures to return the stolen goods. Instructions Step 1 Try to regain control of the lost account on your own
Recently, more and more users are faced with such a problem as the appearance of an advertising banner on the computer desktop. It is quite difficult to remove it, and its developers, in order to unlock the PC, offer to send a paid SMS message to a short number