Network security
Last modified: 2025-06-01 06:06
Finding a hacker means determining his real IP (network address). It should be noted right away that this is very difficult to do in practice. A hacker with at least a little experience always takes measures to hide his true ip, so the search usually ends with nothing
Last modified: 2025-01-23 15:01
Sometimes it happens that it is impossible to go to the site address that was blocked by the provider or proxy server. The reasons can be very different: from the fact that the site was blocked on suspicion of inappropriate content and ending with an error in the address of the blocked sites
Last modified: 2025-01-23 15:01
The program "Internet Censor" is used to control access to the Internet. Only those sites that are included in the list of allowed sites will open. This program is convenient and effective, but sometimes the need for it disappears
Last modified: 2025-01-23 15:01
A home computer is very often used not only by adults, but also by children. To restrict them from visiting certain sites, you can block the URLs of those resources. There are several ways to restrict access to sites. Instructions Step 1 You need to log into the computer with an administrator account
Last modified: 2025-01-23 15:01
Recently, many social networks are full of ads about quick and easy money. The ads promise good earnings without investment. To make it more convincing, supposedly already successful people attach screenshots of payments from their personal accounts
Last modified: 2025-01-23 15:01
There are three ways to recover your Yandex Disk password: using your phone, via e-mail, or by correctly answering the security question. But first, you need to check if everything is in order with the cookies. Checking cookies Before restoring the password for your Yandex Drive account, you should make sure that the password was entered incorrectly
Last modified: 2025-01-23 15:01
A Microsoft account (formerly Windows Live ID) is required to access services such as Skype, Windows Phone, OutLook, and the store for products including MS Office suites. A Microsoft account is a combination of an email address registered in any mail system and a password that the user sets himself
Last modified: 2025-01-23 15:01
Almost every day, there are waves of calls to repost on social networks. While this can often be useful, it is much more common for outright fraudulent requests to occur. They can be disguised as a real need for help, and they are given out only by the general slogan:
Last modified: 2025-01-23 15:01
To catch a virus is always frustrating, be it the flu or the Trojan horse. Despite the fact that most computers are now protected by various antivirus programs, cunning virus creators are improving their skills every day. Computer viruses come in many different types, but in today's article we will talk about only one of them - advertising banners that block your browser and require money to cancel
Last modified: 2025-01-23 15:01
Modern technologies are developing by leaps and bounds and the Internet is part of this great process of technological evolution. To secure the work of users on the Internet, we came up with two words familiar to each user of the network: login (username) and password
Last modified: 2025-01-23 15:01
The computer has more than 65,000 ports, each of which can be used to interact with the Internet. If some ports on the computer are open - that is, they are used by certain programs - you can try to connect to them from a remote computer. Instructions Step 1 You must know the ip address of the computer you want to connect to
Last modified: 2025-01-23 15:01
In order to respect the inviolability of your privacy, sometimes you need to delete all or part of the sites that were viewed by the user for a certain period of time. In addition, deleting Internet pages from memory will clear some of the occupied memory, which will speed up your computer
Last modified: 2025-01-23 15:01
If you want to make a good joke on a close friend with an excellent sense of humor, then perhaps the most interesting joke that does not require much effort will be to change the password on his email. This will take very little time, but your friend will remember this event for a very long time
Last modified: 2025-01-23 15:01
Termination of access to any site may be necessary in different cases. For example, parents may want to restrict the download of some resources for their child, or the employer may want to block access to social networks for employees in the office
Last modified: 2025-01-23 15:01
When working on the Internet, many users are faced with the problem of accessing certain sites. When you try to open them, a page appears with information that the site is blocked. There are several options for this behavior. As a rule, antivirus activity is one of the most common reasons for blocking websites
Last modified: 2025-01-23 15:01
It will not be possible to convert the asterisks that you see in the browser to passwords for the simple reason that the passwords are not there. The browser makes a request for the page to the server, receives in response the source code of the page and displays everything sent
Last modified: 2025-01-23 15:01
Today it is no secret to anyone that the apparent anonymity on the Internet is very conditional. Yes, when visiting sites and forums, you will not be asked for your passport name or real address of residence. There is no need for this, your IP will say everything for you
Last modified: 2025-01-23 15:01
Several years ago, doctors and psychologists from the United States agreed that one more should be added to the list of diagnoses: password fatigue, literally "password fatigue." Indeed, in order to remember all the numbers of passwords, logins, UINs, a well-developed memory is needed
Last modified: 2025-01-23 15:01
Banner advertising has flooded the Internet. And there is, perhaps, not a single site that does not contain this advertisement. Banners pop up regardless of whether you want it or not, which greatly interfere with the Internet. In addition, they take up quite a lot of time and constantly distract attention, irritating the brain
Last modified: 2025-01-23 15:01
Today, each user has the ability to change his username and password in almost any Internet service where he is registered. Changing such data requires user authorization on the resource itself and takes no more than five minutes. It is necessary Internet access, computer
Last modified: 2025-01-23 15:01
One of the social networks that are currently popular is the "My World" project from mail.ru. Its uniqueness lies in the fact that with one login and password you simultaneously get access to both mail and your page on the social network
Last modified: 2025-01-23 15:01
You can remove (delete, remove) a user's password in the Microsoft Windows operating system in several ways of varying degrees of complexity. The choice depends on the version of the OS installed, the user's computer skills and the degree of access to computer resources
Last modified: 2025-06-01 06:06
When you work on the Internet, your computer connects to a wide variety of network resources. In some cases, the user needs to view the current network connections - for example, if he suspects the presence of Trojans in the system. Instructions Step 1 To control network connections in the Windows operating system there is a standard utility netstat
Last modified: 2025-01-23 15:01
A virus designed for VKontakte users is located in the system as vkontakte.exe or vk.exe, but it can also have a different file name. It gets on the computer when downloading small programs, the author of which is unknown. When you install it, a black window appears for a moment, which quickly disappears
Last modified: 2025-06-01 06:06
Thanks to the presence in the tray of an icon in the form of two computers, the user can generally judge the network activity of his machine. In the event that even an idle computer actively communicates with the Internet, there is a need for more complete traffic control
Last modified: 2025-01-23 15:01
In order to easily and conveniently travel across the vastness of the network, any user of a personal computer should get an email address. The email address is used to receive letters: from friends, relatives, acquaintances, letters from forum users or just people who want to get to know you
Last modified: 2025-01-23 15:01
If you have children who can already use the Internet, you probably have more than once the need to deny access to certain sites. Denying access by modifying the hosts file can be viewed as a universal way of partial control over your children's travels across the Internet
Last modified: 2025-01-23 15:01
The Windows operating system constantly monitors all events occurring in the system, writing them to a log file. This information can help in configuring the system, identifying the causes of failures. Nevertheless, there are users who never look at the logs, so the event log can be disabled on their computers
Last modified: 2025-01-23 15:01
Advertising windows of one format or another are present on many Internet sites. Pop-up banners are especially uncomfortable. Fortunately, this type of ad is the easiest to block. It is necessary - AdBlockPlus; - Dr. Web CureIt
Last modified: 2025-01-23 15:01
Linux is a modern fast-growing operating system. It is highly stable and safe. Linux has flexible user management settings and extensive console management capabilities. It is necessary A computer with a linux operating system
Last modified: 2025-01-23 15:01
If you have registered on a dating site, but for some reason do not want to use its services anymore, you can unsubscribe from the mailing list or disconnect your account. And moms and dads who do not want their children to grow up too early can turn off access to unwanted resources through Parental Control
Last modified: 2025-01-23 15:01
You do not need to find out someone else's payment password. And outsiders may need such information only for criminal purposes. But if you have forgotten your own payment password, the system interface will allow you to recover it. To do this, you will need to bind a mobile phone number to your wallet, which can be done at any time and for free
Last modified: 2025-01-23 15:01
The Internet is a worldwide network that allows you to use various information servers and e-mail. By setting a password to log on to the network, you restrict access for everyone else. When there is a suspicion that the Internet is still being used, it is better to change the password
Last modified: 2025-01-23 15:01
Every ordinary web surfer has to use his code name and password so many times in any month of using the network, how, apparently, the most secret spy does not do this in his entire career. Therefore, the choice of logins and passwords is a very urgent task on the Internet, as the most democratic space for information exchange
Last modified: 2025-01-23 15:01
The use of the resources of the general network should not bring negative consequences, for example, threaten the security of your computer. Internet browser Mozilla Firefox provides high protection for your PC while working on the network by blocking some malicious sites
Last modified: 2025-01-23 15:01
Often many Internet users forget their email passwords. The problem might seem quite large, if not for the useful function of the mailer, which allows you to easily restore the user's access to his mailbox. It is necessary Computer, internet access
Last modified: 2025-01-23 15:01
If you suspect someone has cracked your wireless password, or just feel like it's time to change your password, then this article is for you. Instructions Step 1 Define the interface of the router (router) and enter it in any browser
Last modified: 2025-01-23 15:01
Computer viruses often block the Internet. There are malicious programs that can block the operating system. Banners are the most common. It's easier to get it than to remove it. Just in case, you need to have a couple of anti-virus applications that can remove the threat
Last modified: 2025-01-23 15:01
There are many reasons to visit a blocked page: VKontakte users complain about blocking pages for sending spam or viral activity; management of organizations restricts user access to non-core sites, providers block pages of potentially dangerous sites, etc
Last modified: 2025-01-23 15:01
Hash is a fixed-length code string obtained by hashing (encrypting) the original data string. Hashing is commonly used to encrypt sensitive data, using different encryption algorithms. Sometimes it may be necessary to decrypt the hash - for example, if you forgot your password







































