Internet and social networks, computer games, security online
Editor's choice
Interesting articles
New
Last modified
2025-06-01 06:06
Optimization of computer games allows the user to "squeeze" everything out of the gameplay. The recently released PUBG game also has such an opportunity. It, like many others, is distinguished by a large number of individual settings that are important to know for optimization
2025-06-01 06:06
You have joined the multi-million army of CS fans, namely version 1.6, and decided to create a server. To do this correctly, you must have a clear, coherent plan of action in front of your eyes. Instructions Step 1 Skip this step if you already have CS 1
2025-06-01 06:06
Stopping and starting Apache on Unix-like systems is done using the command line. As far as Windows is concerned, the server can be stopped using a special graphical or console utility called httpd. If you are using an off-the-shelf XAMPP build, Apache can be disabled through the control panel
2025-06-01 06:06
While browsing the Internet, a computer connects to various network addresses. Sometimes the user has a need to find out with which ip the connection is currently established. This can be done using both the capabilities of the operating system and by installing additional software
2025-06-01 06:06
The installation of certain programs, including anti-virus software, can damage the stable operation of the local network. In such situations, you need to restore its parameters or completely reconfigure the connection to the server. Instructions Step 1 In the event that a local network failure was caused by the installation of a program, be sure to uninstall it
Popular for the month
ICQ is a messenger program, that is, a program for communication between users located anywhere in the world. Its functions include chat, video calls and phone calls, the use of animated pictures and so on. The number of ICQ users is over a million, so the developers of the program made sure that if you lose your password, you can easily recover or replace it
Almost every owner of a personal computer has access to the World Wide Web. When you surf the Internet, there is a great danger of "infecting" your PC with malware. Instructions Step 1 The virus that blocks the operating system of a personal computer and causes a malicious banner to appear is called “Trojan
Advertisements on websites are often a source of inconvenience and annoyance for users. Sometimes the creators and owners of the resource abuse advertising so much that the page becomes impossible to use. To solve the problem, special programs have been created that filter the advertising stream and make browsing sites much more convenient and fast
Computer viruses are very insidious and, like their biological counterparts, constantly mutate. Therefore, it is very important to clear the system of them in time. Very often, due to viruses, access to the Internet is unavailable, and the work of network connections is disrupted
Antivirus software is an integral part of the safe and complete operation of your personal computer. But the antivirus needs to be updated in a timely manner. Instructions Step 1 If your personal computer does not have an Internet connection, you still need to update the antivirus
Virus writers often use the following scheme. The program blocks access to some sites or to the Internet in general. Until the user sends a message to the specified number, the virus will not stop interfering with work. Although this is only in words - in practice, even after sending a message, access to the Internet is not returned
A large number of users are faced with viral banners that in all possible ways block access to the operating system or its individual elements. To quickly delete them, you need to enter the desired code. Necessary Windows 7 disk, mobile phone
You can find a lot of interesting things on the Internet, but you can also easily pick up a virus. It is to this category that SMS banners belong. An unnecessary detail of considerable size may appear at the bottom of your browser. There will be indecent pictures and an inscription on it
To create your own wireless network, usually routers or routers are used. But to save money, you can also get by with a Wi-Fi adapter that supports the creation of a wireless access point. Necessary - Wi-Fi adapter. Instructions Step 1 Purchase a suitable Wi-Fi adapter
The user's access to the personal page is carried out only after filling out a special form indicating the username and password, with the help of which the site is entered. For the convenience of customers, most of the services offer an autosave function for accounts
There are many ways to get rid of an advertising viral banner. Some of them are purely individual, others are suitable for most computers and operating systems. Necessary - Dr. Web CureIt. Instructions Step 1 Use your mobile phone or other computer to find the ad virus disable code
ICQ authorization is necessary in order to distinguish necessary useful contacts from accidentally added ones. It allows you to see the personal status of the virtual interlocutor ("online" / "offline"), find out what he is doing at the moment and whether he is ready to respond to your messages
Configuring MAC filtering is the first line of defense against unwanted or malicious traffic and implements hardware-level wireless security. Instructions Step 1 Call the main menu of the Windows XP system by clicking the "
A banner that blocks access to the operating system is one of the most unpleasant types of computer viruses. Many antivirus software developers provide codes on their websites to unblock such banners. Necessary Windows 7 installation disc Access to the Internet Instructions Step 1 To get the virus banner unlock code, you will need Internet access
The active life on the Internet leads to the fact that the mailbox is more and more filled with unnecessary information, which is called "spam". Getting rid of it makes life and communication easier. Necessary - computer with Internet access
Currently, the number of theft of icq numbers has become more frequent on the network. Some people believe that after losing access to this service, it is impossible to restore it. In fact, you can get your icq number back in several ways. Instructions Step 1 Restore access through your mailbox
The Security Center is designed to monitor the status of the system. With its help, the core of the system is not disturbed, due to the constant monitoring of the actions of users of operating systems of the Windows family. Necessary Windows operating system
If children have access to your home computer, especially in those moments when you are not at home, then you may have encountered their visit to "unwanted" sites. In order to close such sites for viewing, use one of the simple methods
Many people have repeatedly come across the fact that they received all sorts of advertising mailings by e-mail, even if they never subscribed to them. Spam comes in ICQ messages and on social networks. And even site owners suffer from this
The procedure for exporting (transferring) passwords is directly related to the settings of the browser used. In this case, we are considering Internet Explorer 9, because it does not have a built-in password export mechanism and, therefore, the task becomes more interesting