Internet 2024, November
Reinstalling drivers for various devices can result in a large number of non-existent or unused COM ports. Removing such ports does not require special knowledge and does not imply the use of additional special programs. Instructions Step 1 To display all hidden ports, call the main system menu by clicking the "
Is the Internet a bottomless storehouse of useful information or a global trash can? Which side to look at. Fortunately, there are ways to avoid unexpected encounters with the dark side of the web. For example, in the Mozilla Firefox browser, there is an add-on Blocksite for this
If at work an evil system administrator has disabled access to Gmail, do not despair, because there are ways to enter your email inbox differently. Instructions Step 1 Please use a different address. Google mail has many mirror addresses, by going to which, you can safely continue using your mailbox
On many sites, in order to recover or change the password for your account, you need to go through a special procedure, during which the user will be asked to fill in several columns. The answer to the security question is one of the steps. Necessary - computer
ICQ is one of the most popular messaging services. If you are an ICQ user, then you should know that when you reinstall the messenger, the password is reset, and it is difficult to remember it if it is not written down in a safe place. Try to recover the ICQ password
Advertising on the Internet can be not only annoying, but also dangerous, because an ad banner or pop-up window can lead to a malicious or phishing site containing a virus. Blocking programs have been developed specifically to protect against unwanted or intrusive ads
Employees in private companies often face network restrictions. It is expressed in the denial of access to sites that are considered unrelated to the workflow. To remove this restriction, you can use one of the simple options. Instructions Step 1 Use anonymizers
Each person has their own way of creating passwords and encryption, which is based on their personality, mindset, life experience, and other factors. Everything that a person saw or heard is recorded on the biocomputer of the brain - in the subconscious
There is no better way to accustom a person to the greatest responsibility for his carelessness than to make him feel the fear of loss. That is why if you are concerned about the security of your loved one’s mailbox and think that it is not well protected, because it has too simple a secret question, make sure that he changes it to a more complex one
To get the ICQ client on your computer, you just need to download the program installer from any resource on the Internet. It is worth noting that you need to perform a number of specific actions to exclude the possibility of a virus infecting your computer as a result of downloading the application
Of all the types of malware, the WinLocker, a type of Trojan horse, is perhaps the most annoying for the user. They almost completely block the operation of the system, cover the screen with their window and require an SMS to be sent to a paid number in order to receive an unlock code
SSL (Secure Sockets Layer) is a protocol that ensures communication security. In cryptography today it is one of the most popular protocols, the security of the connection in which is achieved due to the "layered environment". How does it work?
For one reason or another, some e-mail boxes lose relevance for their owners. Not all services allow you to delete unwanted mailboxes, but you can at least delete an account from your mail client. For example, one that is built into the Opera browser
Security is very important to users, which is why many sites spend thousands of rubles a month to protect their servers. However, the safety of the data should be thought primarily by the visitors themselves. One of the most reliable helpers in this matter is a password
After entering the account parameters from the e-mail box, their memorization is possible both in cookies and in the settings of the browser itself. If other people use the same computer, you should take steps to prevent them from gaining access to the box
The occasional replacement of the credentials used to enter the site will help protect your account from hacking by ill-wishers. In particular, the login. Necessary - personal computer or telephone with Internet access; - new login
If, when using Internet Explorer, web pages load slowly, and the browser itself stops responding to your requests and displays error messages, then it is recommended that you reset all previously installed settings. After that, Internet Explorer will revert to its original state, and the user will be able to turn on all the necessary settings again
The clock built into the server's motherboard should be set as precisely as possible. This determines, in particular, the accuracy of the indication of the time of sending messages in the forums. You can determine the time on the server remotely
If you are a user of the Windows XP operating system, you probably faced the problem of forgotten password for your account. The situation, to put it mildly, is not the most pleasant, but there is a way out of it. It turns out that the password of any account is stored in a file hidden for the user
Most companies monitor the daily activity of their employees on the Internet. It is common practice to block social networking sites that contain entertainment content. There are several ways to access blocked pages. Instructions Step 1 The simplest is to use an anonymizer
Such people periodically appear on social networks, communication with whom becomes a burden. You can tell them about it directly, or you can simply blacklist the annoying types so they don't bother you anymore. Instructions Step 1 Blacklist "
In order to protect children from dangerous content, the Safe Internet League has created a bill that makes it possible to install mechanisms for blocking pages on the Internet that carry forbidden information. At the beginning of June 2012, a new bill was submitted to the State Duma for consideration, which involves the creation of lists of websites with information prohibited for dissemination, for example, propaganda of war and drugs, encouraging minors to commit s
Currently, password-based access control systems for information resources are the most widespread due to their simplicity and convenience. However, the security of the information that they are designed to protect depends on the reliability of the passwords used
Distributions of the latest versions of Windows (Vista and Seven) have a graphical interface for a utility that allows you to expand existing hard disk partitions. The Disk Management snap-in now has a corresponding function (Extend Volume) designed to carry out exactly this operation
Over time, some users have a desire to delete a page on Odnoklassniki forever due to high employment or a loss of interest in Internet entertainment. In this case, most people are faced with unexpected difficulties: the button "Delete page"
The Odnoklassniki social network has one very useful function that allows you to block access to your page to selected users. It is called the "black list". Instructions Step 1 A user can get into the "black list"
The State Duma of Russia adopted a law on the creation of a unified register of domains and sites with information prohibited for dissemination, that is, the so-called "black list". Owners of their own Internet resources and just fans of "
First, a few rules. Do not leave your email address on public sites, then most spammers will never guess about the existence of your mail. Never open emails with a dubious sender and subject line, because most spam is viruses! Letters from strangers on the topic "
The ping function is used to check the availability of Internet resources by sending a packet of a certain size to the host being used. At the same time, the data return time is measured to determine the connection speed. This feature is disabled by online gamers to reduce latency
The huge number of Internet providers and the tariffs they offer is definitely a plus for all consumers. From all the variety, you can choose exactly what you need. In order not to drown in the ocean of offers and find the most profitable option, use the tariff plan selection algorithm
When using the Internet in the workplace, it is not uncommon to encounter restrictions such as being banned from accessing social networking and entertainment sites. There are several ways to solve this problem. Instructions Step 1 If you need to view a single page of the site, which for some reason is blocked by a filter, you can use the search engine cache
Banner ads fall into several categories. Some open while browsing websites and disconnect as soon as you close a particular page. Others are launched immediately after the operating system boots. Necessary Access to the Internet
Despite the active development of antivirus programs, none of them is able to fully protect your computer. Some viruses have to be removed by yourself. These include banner ads. Necessary - Dr.Web CureIt. Instructions Step 1 There are a lot of methods to disable the ad module
Many programs require opening ports to access the Internet. This should be done with caution, as rogue programs and viruses can gain access to your computer if the ports are not opened correctly. Necessary - router or router, its model name
There are two ways to block a person on Vkontakte. The first is to add a user to the blacklist, the second is to block him by the site administration for violating the rules, when the page is hacked. The Vkontakte site administration offers two ways to block users
Search engine filters are designed to combat low-quality Internet resources. Filters are automatically applied to sites, and this leads to the fact that sometimes high-quality sites also appear under the filter. Search engine filters are the implementation of penalties applied to sites for any violations
The procedure for canceling a request in various applications and services is carried out by different methods, depending on the characteristics of the selected program. There are no universal rules. Consider canceling a request in Visual Studio 2010, canceling a mandatory Windows authorization request, and canceling a friend request on the popular VKontakte service
Curiosity sometimes spurs to look at photos from events visited by a friend or colleague. I'd like to see how a friend behaves at an official meeting or at an informal get-together. Social networks and some forums allow you to see such frames, of course, if the account owner does not prohibit it
TOR is short for The Onion Router. This is a unique proxy server system that allows you to establish an anonymous Internet connection, completely protected from eavesdropping. TOR browser allows you to use this network. Instructions Step 1 TOR is essentially a network of virtual tunnels that allows information to be transmitted in encrypted form
Wikipedia is an open-source online encyclopedia with informative articles in 285 languages. The site is owned by the American non-profit organization Wikimedia Foundation, but has self-governing communities of editors, writers and moderators in different language sections