Internet and social networks, computer games, security online
Editor's choice
Interesting articles
New
Last modified
2025-06-01 06:06
Optimization of computer games allows the user to "squeeze" everything out of the gameplay. The recently released PUBG game also has such an opportunity. It, like many others, is distinguished by a large number of individual settings that are important to know for optimization
2025-06-01 06:06
You have joined the multi-million army of CS fans, namely version 1.6, and decided to create a server. To do this correctly, you must have a clear, coherent plan of action in front of your eyes. Instructions Step 1 Skip this step if you already have CS 1
2025-06-01 06:06
Stopping and starting Apache on Unix-like systems is done using the command line. As far as Windows is concerned, the server can be stopped using a special graphical or console utility called httpd. If you are using an off-the-shelf XAMPP build, Apache can be disabled through the control panel
2025-06-01 06:06
While browsing the Internet, a computer connects to various network addresses. Sometimes the user has a need to find out with which ip the connection is currently established. This can be done using both the capabilities of the operating system and by installing additional software
2025-06-01 06:06
The installation of certain programs, including anti-virus software, can damage the stable operation of the local network. In such situations, you need to restore its parameters or completely reconfigure the connection to the server. Instructions Step 1 In the event that a local network failure was caused by the installation of a program, be sure to uninstall it
Popular for the month
If you like this or that song and you decide to put it on a website, be very careful. This is necessary to avoid allegations of copyright infringement, the protection law of which has recently entered into force. Instructions Step 1 Under copyright law, no one other than copyright holders has the right to publish a new song or movie without permission
There are a large number of services on the Internet that allow you to exchange photos and other images with other users. Each of these resources has certain advantages and disadvantages, and therefore many people have several accounts in one or another photo network
Fast messaging services have long occupied their niche and have earned the steady love of users. But sometimes the desire to start communicating with friends as soon as possible does not allow you to study the manufacturer's instructions. One of these services is Mail
At the moment, there are many social networks operating in the Russian segment of the Internet. "My world" from the mail.ru company is popular with people of different ages and social status. Thanks to its well-developed functionality and attractive design, it is visited by millions of people every day
The popularity of Internet communication is gaining momentum. Online acquaintances, friendships and business conversations are just as productive as personal contacts, but they save a lot of time in everyday busyness and rush. Instructions Step 1 To authorize a person means to add him as a friend or to your contact list, depending on the features of the site
ICQ is becoming more and more popular on the Internet. At the same time, you can use the ICQ number not only in the ICQ 7 program, but also in the software called Miranda or QIP. Instructions Step 1 When using QIP software, users have problems with authorization
The developers of the site VKontakte.ru (now vk.com) regularly introduce innovations that make it easier for their users to communicate. If earlier, in order to share an interesting picture with friends, you had to send a link to it, now images can be attached to personal messages, published both on your wall and on the walls of friends
It is not so easy to promote a group on social networks. If earlier it was enough just to publish interesting content, now the competition has become incredibly strong, and the old ways have lost their relevance. Direct ways Collaborate with administrators of other groups
Yandex is not only a popular search engine, but also a leading IT company in Russia and an Internet portal with many services. According to statistics, Yandex is in 4th place among all search engines in terms of the number of requests from users
The Odnoklassniki social network is quite convenient for communicating with friends and relatives at a distance. If the dialogue with the user on your page bothers you, you can hide it or delete it permanently. Instructions Step 1 Scroll down the open dialogue with the user and find the "
If you have been using your mailbox constantly for quite some time, then the number of letters there is quite large. In fact, it is not very convenient to work with your personal correspondence directly in the mailbox, especially if you do not have unlimited Internet
An e-mail box is the most convenient way to exchange information. With its help, we can exchange letters with family and friends, send data and files, both for work and for fun. For a long time, a mailbox has been used as an identifier for an Internet user
E-mail has a wide functionality and makes it possible to instantly send texts and files of various formats. There are both paid and free services where you can register your mailbox. Instructions Step 1 Choose one of the free servers providing e-mail services
The vastness of the Internet is full of all kinds of resources containing a wide variety of content: from printed texts to multimedia. If you liked a site, you can recommend it to your friends. To do this, you need to send a link. Instructions Step 1 Basically, there can be two cases when you share a link:
There are situations when you need to find out from which IP address you received an email. This information is not secret, and in order to find it, you do not have to be a computer genius. Instructions Step 1 Using the full version of the web interface, go to your mailbox and open the message whose sender's IP address you want to find out
Unlike server-side scripts, scripts executed in the browser (that is, directly on your computer) can potentially be used by attackers to harm you. JavaScript scripts, Java applets, ActiveX controls are able, for example, to collect confidential information and send it to a specified address on the network
If you begin to notice that from time to time you cannot access the Internet, although the connection is active or the pages are loaded extremely slowly, then you need to figure out which programs go online and how much data are downloaded. There are many different programs for this, one of which is Comodo Firewall Pro in Russian
Making money from their websites has become common on the internet. This is done not only by experienced web programmers, but also by people who do not have a professional relationship with site building. This massiveness is explained by the variety of different ways to make money online
The easiest way to redirect traffic is to use the built-in capabilities of the Apache web server, i.e. just apply and manage server settings with htaccess file. You need to put directives in it so that the software redirects visitors to the Internet addresses specified in the file
When using a tariff for the Internet, which calculates the cost for services in the form of payment for the spent traffic, any setting that reduces the amount of downloaded information will be useful. Of course, you can limit yourself exclusively to text sites and avoid sites with pictures, but there are also more comfortable ways to surf the web without fear of the amount of downloaded information