Internet and social networks, computer games, security online
Editor's choice
Interesting articles
New
Last modified
2025-06-01 06:06
Optimization of computer games allows the user to "squeeze" everything out of the gameplay. The recently released PUBG game also has such an opportunity. It, like many others, is distinguished by a large number of individual settings that are important to know for optimization
2025-06-01 06:06
You have joined the multi-million army of CS fans, namely version 1.6, and decided to create a server. To do this correctly, you must have a clear, coherent plan of action in front of your eyes. Instructions Step 1 Skip this step if you already have CS 1
2025-06-01 06:06
Stopping and starting Apache on Unix-like systems is done using the command line. As far as Windows is concerned, the server can be stopped using a special graphical or console utility called httpd. If you are using an off-the-shelf XAMPP build, Apache can be disabled through the control panel
2025-06-01 06:06
While browsing the Internet, a computer connects to various network addresses. Sometimes the user has a need to find out with which ip the connection is currently established. This can be done using both the capabilities of the operating system and by installing additional software
2025-06-01 06:06
The installation of certain programs, including anti-virus software, can damage the stable operation of the local network. In such situations, you need to restore its parameters or completely reconfigure the connection to the server. Instructions Step 1 In the event that a local network failure was caused by the installation of a program, be sure to uninstall it
Popular for the month
Sometimes in life there are situations when we need to send an MMS message to a mobile phone, but there is no balance on our account. What to do in such situations? The solution is very simple if you have the Internet at hand. You just need to go to the mobile operator's website and send MMS from there
The main advantage of gprs-Internet over other methods of accessing the network is high mobility. You can connect to the network anywhere within the operator's coverage area. However, this method of connecting to the network is distinguished by a relatively low download speed
Often, on most forums, under the posts of many users, you can see various original statements, quotes, and sometimes images. In the Internet environment, these elements, which are automatically added to the end of each message, are called signatures
The exchange of films has become a permanent phenomenon. Most often, users download large files using torrent clients. But the torrenting system requires the user to not only collect, but also give information. Having become the owner of an interesting film, do not skimp and share with others
Surely many have used and are still using icq clients, the so-called Internet messengers. Over time, there is a need for some kind of variety: change the appearance of the program, replace old emoticons with new ones, etc. You can change emoticons in a few minutes
Operating system updates are a good opportunity to upgrade installed programs for free, increase system security and stabilize its operation. So say the developers of one of the most widespread operating systems on earth. Instructions Step 1 But there are times when it is not appropriate to allow the system to communicate with the servers
Agent is an application that is used for urgent communication over the Internet. It is not necessary to install and download the program at all. The web version of the application is configured from the mailbox interface. Necessary - Computer
Proxy servers are computers used as an intermediate link in the transit download of web pages from any site to the user's PC. These servers play the role of intermediaries and allow you to solve many network problems. In particular, by logging out through a proxy, you can remain online as an anonymous user on a website or forum
The Mozilla Firefox browser is one of the most popular browsers on the Internet due to its functionality. The program also supports blocking unwanted websites. To use this feature, you will have to install special extensions in the add-on manager
Currently, there is a large selection of browsers for convenient work on the Internet, Opera is one of the leading. Many sites are dynamic and the readings on the page change. To see the changes, you need to refresh the page. Instructions Step 1 Most modern web pages are designed to be automatically refreshed, meaning you don't need to refresh the page manually
Today, many Internet users know perfectly well that it is best to download files from it through peer-to-peer networks, i.e. using torrent kdients. Unfortunately, in the vastness of torrent trackers there are far from all the necessary files - they are in file-sharing networks, from which it sometimes becomes difficult to download
Users of the Mail.ru mail service are well aware of the situation when, having entered their page on the "My World" network, "Mail.ru Agent" automatically appears in the lower right corner of the screen. For whom it is very convenient, but for someone such an intrusive service may be unnecessary
Mozilla Firefox is a good browser, but sometimes you want to try something new. Moreover, in any popular browser there is a function of painless reception of bookmarks from the "fire fox". Instructions Step 1 Mozilla to Mozilla
Today the Skype program has become as famous as ICQ in its time. The functions of this program have been expanded, and now it is not just a tool for messaging, but also a product for transmitting audio and video streams. It also allows dialing up to cellular subscribers
What if you suddenly lost contact with those people with whom you once studied together, served or even just worked? With the advent of various useful Internet services, finding the people you need becomes much more efficient and convenient
There are a variety of reasons for blocking a mailbox: both long-term non-use of e-mail, and the desire to change the username, and hacking of the mailbox by spammers. After blocking the mailbox, you will no longer be able to use your mailings, subscriptions and mail services
Social networks are gaining more and more popularity. For example, such a famous site as VKontakte already has 100 million registered users. And most of them look through several dozen pages of acquaintances and strangers every day. Necessary - computer
Remote access to the desktop allows the system administrator, without leaving his computer, to correct errors in the work of other computers. An interesting feature of remote access is the simultaneous display of the actions being performed, both on the computer of the system administrator and on the computer of another network user
Mobile Internet from Utel is an excellent choice for those who have to use mobile Internet on the road, in the office and during leisure. With it, you can access the Internet anywhere within the coverage area of the network. You can use one of several simple methods to optimize your internet connection to increase speed
Very often, mms come to the phone from strangers, it is risky to open such a message on your phone, since the message can be encoded with a virus. Sometimes it is banal that the mms service is not connected to the phone, and instead of a multimedia message, a notification about it comes