How to choose an antivirus
If important files disappeared without a trace from the computer, some programs began to work incorrectly, and when turned on, the system reports that the PC is completely blocked, there…

Continue reading →

How to find out a password from someone else's Wi-Fi: ways
So, you want to get on the Internet, but using other people's wireless networks, but this does not work, because these networks are password protected. Of course, you have a…

Continue reading →

How to find out a password from someone else's Wi-Fi: ways
So, you want to get on the Internet, but using other people's wireless networks, but this does not work, because these networks are password protected. Of course, you have a…

Continue reading →

special services

1 2 3 7

Why slows down video on a computer

Most often, malfunctions in the operating systems of Windows XP, Windows 7, Windows 8 are the result of hardware violations or software failures. The most common problem that users face is incorrect display and slowdown when playing videos. In this article we will talk about this problem and find out why the video slows down on the computer.

This is manifested in fading and jerking, and often extraneous “artifacts” appear on the screen. Sound in this case can be ahead of the picture or vice versa late. This problem is observed regardless of the quality of the video being played, whether it be HD or the simplest and most common SD quality format. Continue reading

Making the internet anonymous: TOR network

Many people are already aware that anonymity on the network is important not only for the reason that you want to visit any resources with impunity. Many users are forced to use the so-called onion network to perform basic work operations or to avoid unnecessary control over their actions. Unfortunately, our life is not as harmonious as we would like, so almost every user has to use the TOR network sooner or later.

For example, a network may be useful to you if you visit an unfamiliar computer where you are afraid to leave your data to strangers. TOR erases all traces of a visit, and also masks the route, so that in the future it becomes simply impossible to find out which computer and who performed any actions. Continue reading

How to create robots.txt correctly

Nowadays, the Internet has spread around the world. We are almost inconceivable our day without access to the Internet, where you can view a list of news, find the necessary information. New sites appear, new ones appear along with them
protocols for the performance of certain operations. The webmaster should be familiar with both the old methods of writing protocols and be able to instantly and timely master the latest programs and protocols.
Search engine robots initially access the robots.txt file when they enter the portal. It is this file that Continue reading

1 2 3 7
Basic definitions of the Web. About IP Addresses
For Internet technologies, there are basic concepts, without knowledge of which the understanding of the principles and methods of its functioning will be quite superficial. Those who want to understand…

...

Install and configure hmailserver
The hmailserver mail server developed by Martin Knife is completely free and works with the Windows operating system platform. The server is equipped with tools such as backup, administration, it…

...

Internet Services
With the advent of the global web, services provided over the Internet have emerged. Today, many people use these types of services and find them extremely convenient. On the Web,…

...

How to connect to a proxy server: methods and instructions
There are many ways you can connect to a proxy server. Sometimes for this it is enough to properly configure the computer device itself, and sometimes you only need to…

...