Home network

Bat files, examples
You can perform all the examples published below not only by creating and running a BAT file containing these commands, but also copying them directly to the command line. To…

Continue reading →

Overview of modern antiviruses
Of all the threats to the security of user information, viruses stand apart. These small malicious programs, if not handled carefully, can steal or destroy any data. But it turns…

Continue reading →

Forum Communication
The Internet has become an integral part of life. Since the Internet is an American invention, many terms have no direct analogues in the Russian language. For example, cookie. In…

Continue reading →

1 8 9 10

Child Safety Online

Many users, even the most experienced, sometimes do not suspect that having protected themselves, they forget about their own children. They forget, especially when creating different accounts in the OS for themselves and for the child, that children require attention even at the computer and they still cannot and do not want to take care of their own protection. And this task turns out to be on our shoulders.

Immediately determine what threats the Internet poses for a child. They can be divided into two categories: threats associated with games and threats associated with paging. With the second, everything is clear, advertisements and pornography, pop-ups and the calculation of children’s naivety. Games carry risks of a different kind – abnormal social adaptation and the study of indecent words, and not only that. Continue reading

Personal Data Security

What is personal information, and why does the state develop entire laws designed to protect such data? Imagine that you are making an order online. In the process of forming the order, you specify such data as contact phone number and address.

It would seem that nothing bad happened, the order was delivered on time and you were satisfied. However, after some time, you begin to receive a lot of advertising letters to your address, strangers call you on your home phone and, calling you by name, offer your services. In addition, you may encounter theft of plastic card data when working with online banking.

Recently, the idea of ​​the so-called e-government has been actively promoting in our country, which will allow Continue reading

How to protect your password from hacking

Today, passwords play a significant role in human life. Everywhere on the Internet, on every site, each account must have its own password in order for the user to gain access to its data. Losing or breaking a password can often result in a big problem and a headache.

This article will focus on passwords, hacking methods and creating passwords.

How do passwords break?
There are always at least two ways to crack a password. This is a banal selection (which takes a huge amount of resources and time, but with proper luck, or rather, with due naivety of the user, it will not Continue reading

Present day viruses

There are a huge number of computer viruses in the world. To establish their exact number (along with all modifications and upgrades) no one is taken. Instead, it is customary to calculate the loss or intensity of a virus attack. But, neither one nor the other does not allow users to understand what, exactly, how and why it gets to their computer?

Reasons for creating viruses
There are no reasons for the appearance of viruses as such. These are the reasons for human stupidity. We simply have the actual value – a huge number of computer viruses and virus programs that inhabit the Internet along with sites. It’s true that it’s worth highlighting several reasons, it’s still worth it, they are especially clear to any person. Continue reading

Internet fraud

A proverb says: “Forewarned – means armed.” Not to listen to her is stupid. Nowadays, the Internet is playing an increasingly important role in people’s lives, and is of undoubted benefit. However, let’s not forget that he also carries many risks and dangers. Not only good people who do not mind others use the Internet. Also, it is used by those individuals who want to cash in on inexperience and not knowledge of average users. And here you can read about such personalities and methods of their work in this article. From it you can gather information about different types of fraud on the Internet. Well, of course, we will try to tell you how not to fall for the scammers.

First Class Fraud – Money Cheating Continue reading

1 8 9 10
SeaMonkey Web Browser Overview
Shrimp support is not as dynamic (in every way) as Firefox. But as it turned out, this has not only disadvantages, but also a number of advantages. I switched to…

...

How to choose a service on the Internet
Nowadays, electronic gadgets are firmly in use, and with them the Internet. There, according to the trend of the time, the service sector is also moving. Even in my small…

...

Cleaning your computer from dust
The topic Cleaning a computer (judging by queries in a search engine) from the point of view of the user for the most part involves cleaning the garbage of the…

...

How long can I sit at a computer?
Computing has become literally a part of life. Computers and tablets - it’s impossible to imagine a single day when only a couple of minutes were spent in front of…

...