What is a domain controller
A domain controller provides centralized management of network devices, that is, domains. The controller stores all the information from the accounts and parameters of network users. These are security settings,…

Continue reading →

Rules of work and behavior on the Internet
Every Internet user should be clearly aware that the Internet can not only benefit, but also cause considerable harm. To avoid trouble, strictly follow the recommendations and rules listed below.…

Continue reading →

Elastix setup
Elastix today is a universal multifunctional solution with which you can quickly deploy a VoIP service. At the moment, it is he who remains the most convenient and multi-tasking solution.…

Continue reading →

resource

1 2 3 5

How to connect to a remote computer

In this manual, we will consider two solutions to the question “How to connect to a remote computer?” Both options allow you to remotely use PC resources on OC Windows via the Internet. In this case, you can control the computer in the same way as in the case of direct work on it.

Then we will use such definitions as “client” (any PC – desktop, laptop or smartphone) and “server” (remote PC to which we connect). The user will have access to all settings, pre-installed programs, as well as access to files with the ability to view, edit and copy them. Continue reading

What is cms

To better understand what a content management system is, it’s useful to refresh your memory first – and what is a regular HTML site?

What is a static site?
A regular site is a set of HTML pages connected by hyperlinks to general navigation and uploaded to the server of the hosting provider. There the site is unchanged, which is why it is called static.

To make changes and additions to one of the pages of the site, the administrator must edit the page in the HTML editor and rewrite it on the server using the FTP client. Continue reading

Making the internet anonymous: TOR network

Many people are already aware that anonymity on the network is important not only for the reason that you want to visit any resources with impunity. Many users are forced to use the so-called onion network to perform basic work operations or to avoid unnecessary control over their actions. Unfortunately, our life is not as harmonious as we would like, so almost every user has to use the TOR network sooner or later.

For example, a network may be useful to you if you visit an unfamiliar computer where you are afraid to leave your data to strangers. TOR erases all traces of a visit, and also masks the route, so that in the future it becomes simply impossible to find out which computer and who performed any actions. Continue reading

1 2 3 5
How to fix a problem with sound on a computer
If you encounter a lack of sound on the computer, do not rush to immediately run to the service center, in most cases the situation is easy to fix on…

...

What to do if the keyboard does not work on the computer
Why the computer keyboard does not work Each computer user may have a keyboard problem, and in this case, you need to find the answer to the question: why the…

...

Rules of work and behavior on the Internet
Every Internet user should be clearly aware that the Internet can not only benefit, but also cause considerable harm. To avoid trouble, strictly follow the recommendations and rules listed below.…

...

How to connect wifi yourself
Using Wi-Fi at home is very convenient. This allows you to get rid of wires, which cause a lot of inconvenience, and open access to the Internet for any portable…

...