Internet and social networks, computer games, security online
Editor's choice
Interesting articles
New
Last modified
2025-06-01 06:06
Optimization of computer games allows the user to "squeeze" everything out of the gameplay. The recently released PUBG game also has such an opportunity. It, like many others, is distinguished by a large number of individual settings that are important to know for optimization
2025-06-01 06:06
You have joined the multi-million army of CS fans, namely version 1.6, and decided to create a server. To do this correctly, you must have a clear, coherent plan of action in front of your eyes. Instructions Step 1 Skip this step if you already have CS 1
2025-06-01 06:06
Stopping and starting Apache on Unix-like systems is done using the command line. As far as Windows is concerned, the server can be stopped using a special graphical or console utility called httpd. If you are using an off-the-shelf XAMPP build, Apache can be disabled through the control panel
2025-06-01 06:06
While browsing the Internet, a computer connects to various network addresses. Sometimes the user has a need to find out with which ip the connection is currently established. This can be done using both the capabilities of the operating system and by installing additional software
2025-06-01 06:06
The installation of certain programs, including anti-virus software, can damage the stable operation of the local network. In such situations, you need to restore its parameters or completely reconfigure the connection to the server. Instructions Step 1 In the event that a local network failure was caused by the installation of a program, be sure to uninstall it
Popular for the month
To protect the site from automatic multiple registrations using robotic programs, so-called captchas are used. They are images of alphanumeric codes, presented in such a way that it is not easy for a computer to recognize them, but for a person it is easy
Creation of an e-mail box is not difficult, since there is a lot of information on this issue on the Internet. But there is little information and instructions on how to remove e-mail. There are several ways to remove unnecessary email addresses on different servers
They sit in the night at flickering monitors. They go through the keys on the keyboard, typing strange lines of encoded phrases. They seek to gain access to information, hack a server, just joke or commit a crime. These are hackers - geniuses and villains of the computer age
Server protection is one of the main concerns of its owner. Protection against attacks and overheating are the most important parameters for the successful, long and stable operation of the system. To do this, you need to install networking tools, and provide the server with good cooling and a backup power supply
The Internet has recently become an integral part of human life. For some, it is a place of leisure, for others it is work. There is also a group of people, the so-called hackers, who seek to profit from your account by hacking computers over the global network
Mail.ru is the most popular Russian mail server. By registering for Mail, the user gets the opportunity to use a variety of free and paid services, the social network "My World" and e-mail. Instructions Step 1 In order to register Mail, go to the official website of the portal:
There are quite a number of techniques that allow a computer administrator to restrict or deny other users access to the Internet. Most of them use standard Windows operating system tools and do not involve third-party software. Instructions Step 1 Take advantage of one of the simplest options for restricting Internet access provided by the Windows operating system - open the main menu by clicking the "
Sooner or later, some users may have a problem with the start page in the browser, which sometimes cannot be changed using standard tools. Guard.mail.ru Sometimes novice or inexperienced users of personal computers may experience various troubles related to the operation of the browser
There are two main schemes for connecting two computers to an Internet channel. In the first case, you need to use special equipment, for example, a router. The second option involves setting up one of the PCs as a server. Necessary - router
When creating a VKontakte group, the authors of the pages try to attract as many subscribers as possible. However, today the owners of the social network have tightened the screws extremely firmly on this issue, and there are nominally two, but in fact, one “legal” way to attract subscribers
VP in VK is a mutual PR in one of the most popular social networks in Russia. It is a way to exchange members with other groups. It is carried out through the exchange of reposts, which expands the reach of the group. How to make VP Vkontakte?
One of the best ways to lure a customer is by far with a visual demonstration of the product. This is the principle that the developers of computer games, software and site creators are guided by, dividing their own product into "free"
How Aliexpress delivers goods, how long it takes and how much it costs - similar questions are asked by both regular and new customers of one of the largest online stores. All buyers, without exception, have the right to know the subtleties of processing and receiving parcels from Aliexpress
What if you need to quickly find a certain type of file on the Internet and it is desirable to download it without registration? For example, you need to find a table with data in Excel format or a book in TXT text format, or a PowerPoint presentation to write an essay or diploma, or, for example, a musician urgently needs a MIDI file
Sending tax reports, in particular, various declarations via the Internet, saves time, saves nerves and simplifies the process of filling out the document. There is an especially large selection of options for small businesses using a simplified taxation system
Judging by the numerous requests of Internet users, the topic of confidentiality on the VKontakte social network is of concern to a sufficient number of people who ask the question of how to register on the site without specifying their last name
Recently, it has become very popular to send orders for various cosmetics, household appliances, goods for home and family via the Internet. But not every person is able to figure it out on their own and not make mistakes when ordering. Follow some simple tips, and ordering goods via the Internet will not give you any trouble at all
There are few computer users who are not familiar with the password system. Passwords are needed everywhere - both for creating accounts on a computer, and for registering on sites. Sometimes it becomes necessary to send one of the passwords by e-mail
Amazon.com is one of the best shopping sites in the world, where you can buy pretty much anything right now, from the Apple iPad to the stylish NEXT socks. And you can be sure that all products presented on the site are exclusive and of high quality
If you often use the function of exchanging documents on VKontakte, it makes sense to place a link to them in the main menu - so that it is always at hand. It is very easy to do it. Instructions Step 1 To do this, find in the left column of functions ("