Network security 2024, November
The Internet is a worldwide network that allows you to use various information servers and e-mail. By setting a password to log on to the network, you restrict access for everyone else. When there is a suspicion that the Internet is still being used, it is better to change the password
You do not need to find out someone else's payment password. And outsiders may need such information only for criminal purposes. But if you have forgotten your own payment password, the system interface will allow you to recover it. To do this, you will need to bind a mobile phone number to your wallet, which can be done at any time and for free
If you have registered on a dating site, but for some reason do not want to use its services anymore, you can unsubscribe from the mailing list or disconnect your account. And moms and dads who do not want their children to grow up too early can turn off access to unwanted resources through Parental Control
Linux is a modern fast-growing operating system. It is highly stable and safe. Linux has flexible user management settings and extensive console management capabilities. It is necessary A computer with a linux operating system
Advertising windows of one format or another are present on many Internet sites. Pop-up banners are especially uncomfortable. Fortunately, this type of ad is the easiest to block. It is necessary - AdBlockPlus; - Dr. Web CureIt
The Windows operating system constantly monitors all events occurring in the system, writing them to a log file. This information can help in configuring the system, identifying the causes of failures. Nevertheless, there are users who never look at the logs, so the event log can be disabled on their computers
If you have children who can already use the Internet, you probably have more than once the need to deny access to certain sites. Denying access by modifying the hosts file can be viewed as a universal way of partial control over your children's travels across the Internet
In order to easily and conveniently travel across the vastness of the network, any user of a personal computer should get an email address. The email address is used to receive letters: from friends, relatives, acquaintances, letters from forum users or just people who want to get to know you
Thanks to the presence in the tray of an icon in the form of two computers, the user can generally judge the network activity of his machine. In the event that even an idle computer actively communicates with the Internet, there is a need for more complete traffic control
A virus designed for VKontakte users is located in the system as vkontakte.exe or vk.exe, but it can also have a different file name. It gets on the computer when downloading small programs, the author of which is unknown. When you install it, a black window appears for a moment, which quickly disappears
When you work on the Internet, your computer connects to a wide variety of network resources. In some cases, the user needs to view the current network connections - for example, if he suspects the presence of Trojans in the system. Instructions Step 1 To control network connections in the Windows operating system there is a standard utility netstat
You can remove (delete, remove) a user's password in the Microsoft Windows operating system in several ways of varying degrees of complexity. The choice depends on the version of the OS installed, the user's computer skills and the degree of access to computer resources
One of the social networks that are currently popular is the "My World" project from mail.ru. Its uniqueness lies in the fact that with one login and password you simultaneously get access to both mail and your page on the social network
Today, each user has the ability to change his username and password in almost any Internet service where he is registered. Changing such data requires user authorization on the resource itself and takes no more than five minutes. It is necessary Internet access, computer
Banner advertising has flooded the Internet. And there is, perhaps, not a single site that does not contain this advertisement. Banners pop up regardless of whether you want it or not, which greatly interfere with the Internet. In addition, they take up quite a lot of time and constantly distract attention, irritating the brain
Several years ago, doctors and psychologists from the United States agreed that one more should be added to the list of diagnoses: password fatigue, literally "password fatigue." Indeed, in order to remember all the numbers of passwords, logins, UINs, a well-developed memory is needed
Today it is no secret to anyone that the apparent anonymity on the Internet is very conditional. Yes, when visiting sites and forums, you will not be asked for your passport name or real address of residence. There is no need for this, your IP will say everything for you
It will not be possible to convert the asterisks that you see in the browser to passwords for the simple reason that the passwords are not there. The browser makes a request for the page to the server, receives in response the source code of the page and displays everything sent
When working on the Internet, many users are faced with the problem of accessing certain sites. When you try to open them, a page appears with information that the site is blocked. There are several options for this behavior. As a rule, antivirus activity is one of the most common reasons for blocking websites
Termination of access to any site may be necessary in different cases. For example, parents may want to restrict the download of some resources for their child, or the employer may want to block access to social networks for employees in the office
If you want to make a good joke on a close friend with an excellent sense of humor, then perhaps the most interesting joke that does not require much effort will be to change the password on his email. This will take very little time, but your friend will remember this event for a very long time
In order to respect the inviolability of your privacy, sometimes you need to delete all or part of the sites that were viewed by the user for a certain period of time. In addition, deleting Internet pages from memory will clear some of the occupied memory, which will speed up your computer
The computer has more than 65,000 ports, each of which can be used to interact with the Internet. If some ports on the computer are open - that is, they are used by certain programs - you can try to connect to them from a remote computer. Instructions Step 1 You must know the ip address of the computer you want to connect to
Modern technologies are developing by leaps and bounds and the Internet is part of this great process of technological evolution. To secure the work of users on the Internet, we came up with two words familiar to each user of the network: login (username) and password
To catch a virus is always frustrating, be it the flu or the Trojan horse. Despite the fact that most computers are now protected by various antivirus programs, cunning virus creators are improving their skills every day. Computer viruses come in many different types, but in today's article we will talk about only one of them - advertising banners that block your browser and require money to cancel
Almost every day, there are waves of calls to repost on social networks. While this can often be useful, it is much more common for outright fraudulent requests to occur. They can be disguised as a real need for help, and they are given out only by the general slogan:
A Microsoft account (formerly Windows Live ID) is required to access services such as Skype, Windows Phone, OutLook, and the store for products including MS Office suites. A Microsoft account is a combination of an email address registered in any mail system and a password that the user sets himself
There are three ways to recover your Yandex Disk password: using your phone, via e-mail, or by correctly answering the security question. But first, you need to check if everything is in order with the cookies. Checking cookies Before restoring the password for your Yandex Drive account, you should make sure that the password was entered incorrectly
Recently, many social networks are full of ads about quick and easy money. The ads promise good earnings without investment. To make it more convincing, supposedly already successful people attach screenshots of payments from their personal accounts
A home computer is very often used not only by adults, but also by children. To restrict them from visiting certain sites, you can block the URLs of those resources. There are several ways to restrict access to sites. Instructions Step 1 You need to log into the computer with an administrator account
The program "Internet Censor" is used to control access to the Internet. Only those sites that are included in the list of allowed sites will open. This program is convenient and effective, but sometimes the need for it disappears
Sometimes it happens that it is impossible to go to the site address that was blocked by the provider or proxy server. The reasons can be very different: from the fact that the site was blocked on suspicion of inappropriate content and ending with an error in the address of the blocked sites
Finding a hacker means determining his real IP (network address). It should be noted right away that this is very difficult to do in practice. A hacker with at least a little experience always takes measures to hide his true ip, so the search usually ends with nothing
For the correct operation of many browsers today, support for temporary files, the so-called cookies, is required. With their help, you will not need to enter data several times for authorization on sites where authentication is required (social networks, forums, etc
A very unpleasant fact can be that the user's Internet wallet disappeared due to a computer breakdown, hacking, loss of all data about the wallet, etc. However, its restoration under certain conditions is quite feasible. Instructions Step 1 Different payment systems have separate features for wallet recovery
Not only adults, but also children are active Internet users. To protect your child from unwanted information, it is better to deny him access to some sites. It is necessary - plug-in for "Mozilla Firefox"; - "
A lot of programs are running on the computer at any time. In the event that a program connects to the Internet, a specific port is allocated to it. Sometimes the user needs to determine which port a particular program or service occupies. Instructions Step 1 Open the command line:
You clicked on the link in order to pass on the site, say, a psychological test. After answering the last question, you found that you need to send an SMS to get the result. Of course, you will not send it, but the time is still wasted. How do you tell a paid site before you spend time on it, not afterward?
One of the most attacked ports of a personal computer is port 445; it is on this port that various viruses and worms often "break". This is due to the fact that it is used when accessing remote systems to transfer data over the network
If you have forgotten or lost the password for your Yandex mailbox, you should not be upset right away. The procedure for restoring it is quite simple, the main thing is that you have access to the mailbox to which the account is registered in the service