Rules of work and behavior on the Internet
Every Internet user should be clearly aware that the Internet can not only benefit, but also cause considerable harm. To avoid trouble, strictly follow the recommendations and rules listed below.…

Continue reading →

How to connect wifi yourself
Using Wi-Fi at home is very convenient. This allows you to get rid of wires, which cause a lot of inconvenience, and open access to the Internet for any portable…

Continue reading →

How to connect do-it-yourself satellite internet?
Why spend money on laying a special cable and installing special equipment when you can connect satellite Internet with your own hands? Internet - only a few do without it…

Continue reading →

settings

Making the internet anonymous: TOR network

Many people are already aware that anonymity on the network is important not only for the reason that you want to visit any resources with impunity. Many users are forced to use the so-called onion network to perform basic work operations or to avoid unnecessary control over their actions. Unfortunately, our life is not as harmonious as we would like, so almost every user has to use the TOR network sooner or later.

For example, a network may be useful to you if you visit an unfamiliar computer where you are afraid to leave your data to strangers. TOR erases all traces of a visit, and also masks the route, so that in the future it becomes simply impossible to find out which computer and who performed any actions. Continue reading

How to create robots.txt correctly

Nowadays, the Internet has spread around the world. We are almost inconceivable our day without access to the Internet, where you can view a list of news, find the necessary information. New sites appear, new ones appear along with them
protocols for the performance of certain operations. The webmaster should be familiar with both the old methods of writing protocols and be able to instantly and timely master the latest programs and protocols.
Search engine robots initially access the robots.txt file when they enter the portal. It is this file that Continue reading

How to get rid of Webalta

One of the search engines of the Russian Internet is Webalta. She has a kind of promotion technology. This is reflected in the fact that many Internet users once detect a change in the address of the home page in the browser. Instead of the previously set address, a completely different one appears, which includes the word “webalta”. In addition, such a program unexpectedly designates itself as the main system for searching the Internet. Such actions naturally make many users want to get rid of Webalta.

The most obvious solution is to change the address of the start page – in relation to the browser. To do Continue reading

Elastix setup
Elastix today is a universal multifunctional solution with which you can quickly deploy a VoIP service. At the moment, it is he who remains the most convenient and multi-tasking solution.…

...

How to find out a password from someone else's Wi-Fi: ways
So, you want to get on the Internet, but using other people's wireless networks, but this does not work, because these networks are password protected. Of course, you have a…

...

How to connect to a proxy server: methods and instructions
There are many ways you can connect to a proxy server. Sometimes for this it is enough to properly configure the computer device itself, and sometimes you only need to…

...

How to set up Google mail
Correct Google mail settings will provide not only convenience in its use, but also make it more secure by protecting confidential information. To configure, you must first go to your…

...