Local Area Networks and the Internet
When a local area network is connected to the global Internet, one of the PCs, called a server, becomes a kind of conductor and connects to the Internet using a…

Continue reading →

How to protect your password from hacking
Today, passwords play a significant role in human life. Everywhere on the Internet, on every site, each account must have its own password in order for the user to gain…

Continue reading →

VPN Basic Concepts and Classification
The term VPN (Eng. "Virtual Private Network") refers to a group of technologies that provide a network connection, or the so-called logical network, functioning on top of some other network,…

Continue reading →

common mistakes

Removing SMS viruses

Recently, viruses that require sending SMS have become a very popular and profitable type of money withdrawal from cybercriminals. As a result of this, a lot of varieties of SMS viruses have appeared. There are not only viruses that require SMS for viewing porn sites, but also disguise for installing and updating programs, locking the system due to unlicensed use, and so on and so forth. The whole variety of varieties in the form of screenshots can be observed here, for example.

ransomware sms virus

Another problem is that an infected user, going to a friend to search the Internet for a solution to his problem, stumbles across the network to Continue reading

Mozilla Firefox Web Browser Overview

For more than 10 years I have been using the “Firefox” browser in my daily work on my PC and have gained a decent experience, which I hasten to share. This article is an introductory FAQ for beginners, which reveals and demonstrates the main features of the browser. This article is also a guide to setting up Firefox for beginners. So to say, “read before use.”

Most users simply install the browser and use it as is. Naked Firefox loses to WebKit browsers in a number of ways. At the same time, if we try to dress up (set up) the browser at least a little, then WebKit browsers (Chrome, Opera, etc.) will start to play strongly, and Firefox – vice versa. After all, with the help of extensions, this wonderful browser can be turned into an ultra-convenient assistant that can make work on the Internet many times more convenient.

Since Firefox can be configured for very different tasks, this review contains general (basic) setup instructions that Continue reading

SeaMonkey Web Browser Overview

Shrimp support is not as dynamic (in every way) as Firefox. But as it turned out, this has not only disadvantages, but also a number of advantages. I switched to this wonderful browser forced. At the time of writing my review on Firefox Gekko, it was updated to the 52nd version and due to the experiments of the developers it began to slow down significantly. But the main reason was the inability to use the web-developer panel, which did not work at that time a little less than completely.

And since SeaMonkey supports a small, but still a sufficient number of Firefox add-ons and is updated more slowly in terms of the Gekko engine, it was decided to switch temporarily and permanently to using this browser. Read the details in the article.

Now I switched back to Firefox Quantum and the return move can be considered quite comfortable. However, in Continue reading

Capacitor Replacement
In the element base of the computer (and not only) there is one bottleneck - electrolytic capacitors. They contain electrolyte, electrolyte is a liquid. Therefore, heating such a capacitor leads…

...

Work on the Windows command line
The most common startup recommendations are: Start, Run, cmd. There is a Run item in the start menu. He runs a program that allows you to transfer single commands to the…

...

Reading books on a computer. How to read books on a computer?
I welcome all fans to read interesting and useful books, as well as those who are just interested in how you can read books on a computer. In the past…

...

Overview of modern antiviruses
Of all the threats to the security of user information, viruses stand apart. These small malicious programs, if not handled carefully, can steal or destroy any data. But it turns…

...