Computers
Last modified: 2025-01-22 21:01
Programs running in the background support changing the icons that appear on the taskbar. These icons can be changed in the interface settings, and you can also create new ones at your discretion. Necessary - program for editing icons
Last modified: 2025-01-22 21:01
The procedure for changing the application icon in the Microsoft Windows operating system refers to standard actions and can be performed using standard system tools. In the Mac OS operating system, you will have to use the additional application img2icns
Last modified: 2025-01-22 21:01
Owners of personal computers, laptops, tablets and other devices that allow connection to a Wi-Fi network can create their own connections without unnecessary problems. How to share Wi-Fi on a computer? In order to distribute a wireless Wi-Fi network from a computer, the user will need a special utility - mHotspot
Last modified: 2025-01-22 21:01
The wireless Internet connection does not always complete successfully, resetting user settings. For this and various other reasons, users often need to find out the password for their Wi-Fi on the computer. To do this, you will have to dig into the system settings, as well as try some other data recovery methods
Last modified: 2025-01-22 21:01
To prevent your own local or wireless network from being hacked, be sure to configure the security settings of your modem (router). To do this, you need to set up multiple levels of authentication. Instructions Step 1 Turn on the router and connect a laptop or desktop computer to the LAN or Ethernet channel
Last modified: 2025-01-22 21:01
Protecting your home wireless network from hacking is one of the most important steps in setting it up. Naturally, few people will like it if someone else uses his internet connection. Necessary Wi-Fi router. Instructions Step 1 You should start preparing security for your wireless network before you create it
Last modified: 2025-01-22 21:01
To create a wireless LAN, it is recommended to use Wi-Fi routers. These devices allow you to manage access point configurations and monitor network connections. Necessary - Wi-Fi router. Instructions Step 1 Connect the Wi-Fi router to an AC power supply by installing it in the desired location
Last modified: 2025-01-22 21:01
Wireless Internet based on Wi-Fi technology is often fraught with intractable problems. This could be an intermittent connection while connecting, no wireless network, or a wireless network but no internet connection. All these problems can be solved quite simply
Last modified: 2025-01-22 21:01
When configuring a local network, you need to enter a parameter such as "computer workgroup". However, in the future, some users need to change these parameters, or simply delete. In this regard, the question arises: "How can I remove a computer from a workgroup"
Last modified: 2025-01-22 21:01
Computer manufacturers care about our convenience, developing new ways of communication. Nowadays, wireless Internet no longer surprises anyone: in cafes, at home and in the office, wi-fi allows you to access the network without connecting to a cable
Last modified: 2025-01-22 21:01
For faster access and file sharing between two computers at home, you can create a homegroup using the system settings. This option will allow you to exchange data at maximum speed without creating a wired network, but using only a wireless data transmission channel
Last modified: 2025-01-22 21:01
Information technology has recently become more and more accessible. Many people have several computers or laptops with internet access at home. But sometimes users want some resources, such as a printer or a shared movie folder, to be accessible from all home computers
Last modified: 2025-01-22 21:01
The reason for the lack of a Wi-Fi signal on a netbook can be technical nuances or incorrect software settings. The procedure for finding the cause begins with defining the program parameters. Technical reasons To determine the cause of a malfunction in Wi-Fi signal reception, you need to find out if the netbook is capable of receiving this signal
Last modified: 2025-01-22 21:01
Local networks are conventionally divided into two main types: cable and wireless. Naturally, for the joint work of stationary and mobile computers, it is recommended to combine these networks into a single whole. Necessary - patch cords
Last modified: 2025-01-22 21:01
Wireless technology has evolved significantly over the past few years. Wi-fi networks have infiltrated office buildings, cafes and restaurants, and even parks. In a house or apartment, a Wi-fi network allows you to connect all devices without using wires
Last modified: 2025-01-22 21:01
Network protocols - synchronize the operation of computers in the network. The division of protocols into several levels allows the process of data exchange to continue even in the event of any disruptions and failure in the network. A network protocol is a set of rules that allows two computers connected to a network to establish a connection, exchange all kinds of data with each other, and synchronize the operation of these machines on the network
Last modified: 2025-01-22 21:01
Today, virtual networks based on VPN (Virtual Private Network) class technologies are used not only to organize well-protected environments for transparent data exchange through open channels, but also to easily provide Internet access. In this regard, any user who changes the provider may face the need to set up a VPN
Last modified: 2025-01-22 21:01
Virtual private networks (VPNs) are usually created to connect large numbers of computers to the Internet. Typically, the VPN is activated and configured over an existing local network. Instructions Step 1 The Windows XP operating system is capable of maintaining a VPN connection
Last modified: 2025-01-22 21:01
The speed settings set by the user affect the overall operation of the Internet, so if you set them incorrectly, it can not only slow down, but also stop working altogether. There are no uniform settings - they differ depending on the type of connection you are using
Last modified: 2025-01-22 21:01
Certain security updates may cause the MTU to decrease. which significantly reduces system performance and leads to the inability to connect to certain web resources. Receiving an ICMP warning with the text destination unreachable is indicative of a similar problem
Last modified: 2025-01-22 21:01
One of the oldest standards for serial asynchronous digital information exchange is RS-232. Its implementation in a PC is done through a special connector - a COM port. Despite the availability of new and faster communication methods, the COM port is still used, in particular, when a modem is operating
Last modified: 2025-01-22 21:01
Setting up a local network can help solve file sharing, Internet sharing, and network applications. Necessary To install a local network, you will need a UTP - 5e cable ("Twisted Pair"), a switch with the number of ports equal to the number of computers in the future network, RJ-45 connectors and a tool for crimping the connectors
Last modified: 2025-01-22 21:01
You will learn how to create a local area network between two or more computers by connecting them with a network cable and a network switch. As well as how to lay and crimp the cable, choose a switch and set up your computer. Necessary Twisted pair (cable) category 5E Crimping Tools RJ-45 connectors Ethernet switch (network switch) or hub Cable fixing brackets A hammer Instructions Step 1 First, decide how much cable you need and where you
Last modified: 2025-01-22 21:01
A local network without Wi-Fi is created using Windows tools by wired connection of each computer to one Internet channel. After that, the workgroup is configured, the folders placed on the network, the visibility of computers and the creation of a connection
Last modified: 2025-01-22 21:01
Peers are those torrent users who are currently in the process of downloading files. They can not only receive, but also distribute the downloaded file in parts to other users. Necessary - Internet connection. Instructions Step 1 Run a search engine on your computer
Last modified: 2025-01-22 21:01
You can manually compose several photos and make a collage in Photoshop, but if you often have to do this, you can speed up the process by installing the Akvis Chameleon plugin. Instructions Step 1 Akvis Chameleon is one of the most popular plug-ins for the graphics editor Photoshop, which allows you to quickly and efficiently make collages
Last modified: 2025-01-22 21:01
The main techniques used when inserting an image into a collage are to completely or partially remove the original background of the image, change the size and color of the image, and change the blending mode of the layer with the inserted photo
Last modified: 2025-01-22 21:01
Mailers, or post sponsors, are sites that pay registered users to view email. Absolutely anyone who can only follow Internet links can make money in this way. Necessary - a computer connected to the Internet; - reliable antivirus installed on your computer
Last modified: 2025-01-22 21:01
The exchange of files and links is an integral part of the full-fledged Internet interaction of different users. There are a huge number of paid and free file hosting services on the network, differing in the speed of downloading files, their storage time, the limit on the volume of files, and many other parameters
Last modified: 2025-01-22 21:01
The Elder of Scrolls: Oblivion is one of the most iconic games of our time. The variety of her world is striking to the core, and the number of opportunities provided in the game seems simply unthinkable. Despite this, a huge number of mods have been released for the game that will help diversify the gameplay and add something new to it
Last modified: 2025-01-22 21:01
The further technology moves, the more opportunities users have to create their own content. And, if in the first "Age of Empires" you could create campaigns, then today it is possible to create an almost new game. Instructions Step 1 Decide on the software
Last modified: 2025-01-22 21:01
In modern times, computer games are released in huge numbers. But a better plot, graphic design can be achieved with the help of add-ons that are released by official manufacturers. Instructions Step 1 The most common first-person game is Counter-Strike 1
Last modified: 2025-01-22 21:01
Many minecrafters are trying to find out how to make a herobrine in Minecraft, but the official version of the game does not provide for this possibility. Fans regularly develop various add-ons to the game, and it is thanks to one such add-on that Herobrine can be summoned
Last modified: 2025-01-22 21:01
An engine is a specific set of systems that are designed to simplify the most commonly used game functions. It provides better game portability. A well-designed engine can easily be ported to another library or even to another platform. You can write it yourself, but only with some knowledge of programming
Last modified: 2025-01-22 21:01
Computer games, like any other field of human activity, have their own masterpieces, the popularity of which has not faded over the years. One such creation is Transport Tycoon Deluxe, originally created for MS DOS and later recreated by enthusiasts as a cross-platform open source OpenTTD application
Last modified: 2025-01-22 21:01
Minecraft was created by only one developer, he made it in his spare time. Who would have thought that she would gain such huge popularity in the world. The universe of the game is constantly expanding and supplementing. For example, new worlds appear:
Last modified: 2025-01-22 21:01
The Minecraft game provides players with limitless scope for creativity and construction of various structures. One of them is such a means for moving the character as an elevator. Instructions Step 1 The elevator in Minecraft is a very useful structure that allows the character to quickly move around the buildings he has
Last modified: 2025-01-22 21:01
There are standard and non-standard configurations for the 1C: Enterprise application. A typical configuration is issued by the developer and is used by the end user in its original form, while an atypical one can be written from scratch, or modified on the basis of a typical one
Last modified: 2025-01-22 21:01
Sooner or later, every company is faced with the need to optimize the accounting system. There are many different programs to cover different areas of activity, but they do not always meet the special needs of a particular person or company
Last modified: 2025-01-22 21:01
The operation of canceling the password for access to the local network and access to shared folders can be performed using standard tools of the Microsoft Windows operating system and does not require the involvement of additional third-party software
Last modified: 2025-01-22 21:01
Some of the computer games become popular only through the efforts of fans with their irresistible desire to improve their favorite product. Each gamer sooner or later thinks about how to improve this or that game by creating a unique mod for it
Last modified: 2025-01-22 21:01
Minecraft game has won the hearts of millions of users around the world. Here you can build almost all the objects that surround us in everyday life. Some things can only be crafted with the help of special add-ons - mods. Not everyone succeeds in adding them the first time, so the question of how to install a mod on Minecraft is very relevant
Last modified: 2025-01-22 21:01
According to the rules of the Russian language, there are a number of situations that require the spelling of words or whole sentences using capital letters. When printing to a computer, this is usually done using the Caps Lock key. How do I use it?
Last modified: 2025-01-22 21:01
Concatenating cells is one of the functions used when creating a table. It means creating one cell from two or more selected cells. This function is used in both Word and Excel. Instructions Step 1 You created a table in a Microsoft Word document and while entering data, you needed to combine two or more cells into one
Last modified: 2025-01-22 21:01
Some players who are just starting to master the process of creating servers in Counter Strike 1.6 - an Internet first-person shooter that does not lose its popularity after many years - are interested in how to install plugins on them. Instructions Step 1 For example, suppose you have a plugin amx_dream-x_plugin (no such plugin really exists, it is just for illustration purposes)
Last modified: 2025-01-22 21:01
Working for a long time with one program, the user is faced with the problem of limited software capabilities. For several years, the user of a personal computer is able to learn by heart all the subtleties of work. For example, a photo artist, in order to add variety to his work, installs additional plugins
Last modified: 2025-01-22 21:01
A plug-in (from the English plug-in) is a whole class of applications that are an additional software module to any application. Such an application can be, for example, a browser, a graphics editor, an audio player, or even a website management system
Last modified: 2025-01-22 21:01
Today there is a large selection of programs for creating animation of a waving flag. One of them is a small graphical utility called Flagimation. It has a simple and intuitive interface and allows you to turn a static image into a beautiful gif-animated picture with the effect of a waving flag in a matter of seconds
Last modified: 2025-01-22 21:01
Browser Mozilla Firefox is one of the most popular browsers among Internet users due to its free, high security, as well as a large number of useful and convenient add-ons that can be downloaded in any quantity, modifying the program to meet your own expectations
Last modified: 2025-01-22 21:01
A plugin is a way to extend the capabilities of a program with additional plugins. For example, the popular Mozilla Firefox browser can use such extensions to block ads on websites. Or the well-known photo processing package Adobe Photoshop can be "
Last modified: 2025-01-22 21:01
If you have already started to master Photoshop, you know that it has a lot of different filters and plugins for processing and optimizing photos. All plugins are located in the Filter menu, and for novice users their number may seem intimidating
Last modified: 2025-01-22 21:01
The graphic editor Adobe Photoshop not only offers users a set of ready-made textures, but also makes it possible to create new ones using any pictures. Necessary Adobe photoshop Instructions Step 1 Open an image and use the Rectangular Selection tool to select the fragment that you want to turn into a texture
Last modified: 2025-01-22 21:01
Textures are used in a wide variety of areas of design and graphics - when creating backgrounds and various objects in Photoshop, and of course when working with three-dimensional objects in 3DMax. If you work with such programs, and especially in 3D, the skill of creating realistic photographic textures will be very useful to you
Last modified: 2025-01-22 21:01
3d max is a fully functional system for 3D graphics operations. Due to the wide variety of its capabilities and the high quality of reproducible objects, it can rightfully be considered one of the best in the world. When working with it, various questions may arise, for example, such as editing or adding textures
Last modified: 2025-01-22 21:01
Over time, any device fails or becomes partially inoperative. For example, a laptop keyboard may stop working only from a spilled cup of coffee. The only way to restore the working condition of the keyboard is to completely clean it using special means
Last modified: 2025-01-22 21:01
In the game "Minecraft" the player has the opportunity to visit parallel worlds, you can get there using special portals. When using mods, the number of worlds and portals increases. However, in order to play in the regular world and use portals to the game Hell or Ender, mods are not needed
Last modified: 2025-01-22 21:01
There are millions of people on social media all over the world. To share the highlights of their lives with friends, users upload photos to albums, exchange ratings and comments. It is not always easy for a beginner to figure out how to navigate a social network, so many people have a question about how to add a photo to Odnoklassniki
Last modified: 2025-01-22 21:01
Sometimes it happens that it is necessary to send an SMS message, but the balance on the phone account does not allow you to do this. In this case, all that is needed is a computer and a valid internet connection. Using the Internet, you can send SMS to almost any number, regardless of the mobile operator to which it is attached
Last modified: 2025-01-22 21:01
The Sberbank Business Online system is intended for use by legal entities. It makes it possible to carry out banking operations and manage all financial processes via the Internet without leaving the office. Necessary - computer
Last modified: 2025-01-22 21:01
How many hieroglyphs in the Chinese language can not even be counted by the inhabitants of the Celestial Empire. Unlike many countries in the world, China does not have a unified alphabet. therefore, each province not only speaks its own dialect
Last modified: 2025-01-22 21:01
From time to time, many of us need to remotely connect to a friend's or relative's computer. Fortunately, the free TeamViewer software can solve this problem with just a few clicks. Instructions Step 1 Download the full version of TeamViewer from the official website and install it on your computer
Last modified: 2025-01-22 21:01
The location coordinates may not be recognized when entered into a search engine. Always be guided by the specifics of the service, as they may vary. Necessary - Internet access. Instructions Step 1 To enter the coordinates of a specific location on online maps, enter latitude and longitude values in the search bar
Last modified: 2025-01-22 21:01
Talents in World of Warcraft are a daunting task for beginners, especially when you need to properly distribute these talents as a rather difficult to master mage. It is most relevant now to play in the Fire branch, since these magicians can fight back both the players of the enemy faction and the creatures of the game world
Last modified: 2025-01-22 21:01
Steam is a popular gaming service that allows you to buy all kinds of computer games. Most of the positions in the resource store are represented by paid versions of games, however, there are several ways that will allow you to get some of them for free
Last modified: 2025-01-22 21:01
Emails have become firmly established in the life of every modern person. They are needed both for personal correspondence and for solving many corporate issues and business problems. However, often, e-mail users - beginners do not know how to read the letter that came to their mailbox
Last modified: 2025-01-22 21:01
Sometimes users of payment systems have unpleasant feelings when they see, instead of a message about a transfer of funds, a message about a prohibited operation due to a blocked wallet. There is a simple option for quickly and reliably regaining control over your account in payment systems
Last modified: 2025-01-22 21:01
It happens that for some reason you are banned from a website. Placing a ban on your account prevents you from gaining access to features that were previously free to use. It can be pointless to register a new account if you have blocked access to the site by your IP-address or the necessary settings, contacts, or maybe even money are stored in the old profile
Last modified: 2025-01-22 21:01
It is common for a person to forget some things, but a forgotten password from network accounts is an unpleasant thing. However, the problem of getting a forgotten password is usually quite simple to solve. Instructions Step 1 Means for recovering a forgotten password, as a rule, are pledged already when registering a mailbox or account on any service
Last modified: 2025-01-22 21:01
Passwords tend to be forgotten and lost, and this also applies to computer logon passwords. However, life does not end there, and you can still log into your home computer, and even without reinstalling the operating system. Necessary - thin screwdriver
Last modified: 2025-01-22 21:01
The air of most popular radio stations has long been possible to listen to not only on conventional receivers. Any modern computer gives you the opportunity to enjoy music and programs. FM tuner You can install a special device on your computer - an FM tuner
Last modified: 2025-01-22 21:01
Many music lovers love to listen to radio on the Internet. It is convenient - there is a wide selection of radio stations for every taste and you do not have to leave your computer. But in order to record the radio broadcast, one Internet browser will not be enough
Last modified: 2025-01-22 21:01
Animated banners are actively used in web design, as they can not only give the user more information, but also attract attention. There are several ways to create such images. Instructions Step 1 To create an animated banner, you need one of the graphic editors
Last modified: 2025-01-22 21:01
Banners are effective online advertising tools that are ubiquitous on the web. Its task is to attract new visitors to the advertiser's page. That is why it is recommended to post it on thematic resources. Instructions Step 1 A banner, first of all, should attract attention, be noticeable to potential customers
Last modified: 2025-01-22 21:01
Fighting with various monsters in skyrim, you can often get infected with vampirism from them. The negative consequences of this disease include a decrease in health, magic and stamina of the hero under the rays of the sun. The positive aspects of vampirism:
Last modified: 2025-01-22 21:01
3D modeling is a very painstaking, but at the same time, interesting and highly paid work, and everyone is free to choose how to receive rewards for their work. Someone gets a job in a design studio and receives a fixed salary, someone lives on the profit from their own projects, and someone prefers to be a freelancer, to model only what he likes and sell finished work
Last modified: 2025-01-22 21:01
Don't feel like you need to be an experienced programmer or marketer to sell your software. This is a deep misconception, because if you are not a beginner and already know how to write programs, you may well sell them. Of course, this business has its own difficulties, but overcoming them, you can make good money
Last modified: 2025-01-22 21:01
Before reinstalling the operating system, choose a safe place to temporarily store your browser bookmarks. This can be removable media or any of the drives that will not be formatted during the reinstallation process. When a safe place is determined, you can proceed to the procedure for saving bookmarks
Last modified: 2025-01-22 21:01
Every person who has experience of working on the Internet knows how sometimes pop-ups that suddenly appear on web pages interfere with normal network activity and which are not always easy and quick to get rid of. There are several ways to remove pop-ups
Last modified: 2025-01-22 21:01
The solution to the problem of blocking pop-up windows in Internet Explorer can be obtained in several ways, the implementation of which depends on the degree of theoretical preparation of the user and practical experience of using computer resources
Last modified: 2025-01-22 21:01
We remember about the presence of a secret question in the event that the password for the account (it can be a postal or any other service) is lost. Forgetting the secret question, let alone the answer, is not worth it. If you've forgotten, it's time to change your security question
Last modified: 2025-01-22 21:01
Every day the e-mail system becomes the most convenient to use. If earlier it was quite problematic to restore access to e-mail, having forgotten the password or login, now the situation has changed dramatically. One of the innovations of postal services is the presence of a "
Last modified: 2025-01-22 21:01
The entire list of functions for managing Windows network services is available through the use of commands of the net utility. One of these commands, send, has been widely used in the past to send out administrative messages. However, in modern versions of Windows, the messenger service, to which net send is the interface, is stopped by default
Last modified: 2025-01-22 21:01
The location of the entrance to the Network and Sharing Center depends on the version of Windows. In Windows XP, for this you need to perform several actions from the control panel. In Windows 7 and higher, you can enter the Network and Sharing Center through the context menu icon located directly on the desktop
Last modified: 2025-01-22 21:01
Social media is incredibly popular with people of all ages. To chat with friends in Odnoklassniki, you just need to register and fill out your profile. But what if you are tired of sitting on a social network? You can delete your page in Odnoklassniki
Last modified: 2025-01-22 21:01
With the development of information technology, many purchases can now be made using the Internet. One of the popular payment systems is Webmoney. However, many users have problems during the registration process, namely in activating the wallet
Last modified: 2025-01-22 21:01
Each browser provides the ability to save a username and password for subsequent automatic authorization on websites. In order to take advantage of this opportunity, you need to enable remembering passwords. Necessary - personal computer with Internet access
Last modified: 2025-01-22 21:01
Saving the username and password in the browser is its automatically set function. Which is not always convenient for several users working on the Internet from one computer. It is good that the developers of the InternetExplorer and MozillaFirefox browsers provide the ability to disable this function, which makes it real not to save the name and passwords when working on the Internet
Last modified: 2025-01-22 21:01
Some browsers in operating systems of the Windows family offer to save the password when entering a password. To do this, you need to press the appropriate button. But this function is not always needed, so it can be easily disabled. Instructions Step 1 Internet Explorer
Last modified: 2025-01-22 21:01
Skype is a free application that allows you to make voice and video calls, as well as exchange messages between users over the Internet. In addition, using Skype, you can call both mobile and landline phones, but this feature is paid. All transmitted information is encrypted, which ensures the confidentiality of negotiations
Last modified: 2025-01-22 21:01
Verification is used to determine the authenticity of user-specified information when filling out certain web forms or documents that are printed on paper or created in electronic format. The term can also be applied in areas other than IT. Meaning of the word The term "
Last modified: 2025-01-22 21:01
Despite the reliability of tablets, their performance can sometimes become unstable. One of the most unpleasant situations can arise when, when you turn on the tablet, it turns out to be locked. In this article, we'll show you how to deal with this problem on Android devices
Last modified: 2025-01-22 21:01
No game can be considered complete until it has been tested by testers. A poorly tested product will be akin to Gothic 3 - it will be simply impossible to play until a few patches are released. Instructions Step 1 A baseline test should show the engine is working
Last modified: 2025-01-22 21:01
Skype is a service that provides subscribers with communication services via the Internet. The program allows you to communicate with other Skype users for free. However, in order to call a landline phone or send a message to a mobile phone, you need to top up your account
Last modified: 2025-01-22 21:01
Skype is a popular and convenient voice communication tool. Perhaps none of the similar systems can compete with this program. Skype is completely free for computer-to-computer communication, but you must have money in your account to make calls to phones, both landline and mobile
Last modified: 2025-01-22 21:01
When choosing a mobile computer, it is necessary to determine in advance the purpose of its purchase. In most cases, you can get by with a relatively cheap model, having correctly selected its characteristics. Instructions Step 1 Keep in mind that if you want to buy a really cheap laptop, then you should not chase the promoted brands
Last modified: 2025-01-22 21:01
The electronic money system WebMoney is by right the most popular payment system in the Russian-speaking segment of the Internet. It is difficult to count the number of services, sites and services that accept this e-currency as payment. And although the system is very user-friendly in general, some aspects of its work are worth considering in more detail, for example, paying an invoice using Webmoney
Last modified: 2025-01-22 21:01
Until the end of 2013, Microsoft is giving away an annual premium Skype account free of charge. Such an account will allow you to create group video chats, disable ads, receive free technical support and exchange desktop images during a call
Last modified: 2025-01-22 21:01
Choosing a disk for recording the necessary information is one of the most common problems of most computer users. Discs vary in format, capacity, recording speed, and even packaging. Instructions Step 1 Determine which disc format is best for storing the selected information
Last modified: 2025-01-22 21:01
DVD is a very convenient source of information storage. Also, you can rewrite information on DVD discs repeatedly. However, this requires a DVD burner and an appropriate disc format, since not all DVDs can be recorded multiple times. Discs that can be recorded and then erased are in RW format
Last modified: 2025-01-22 21:01
Users of software for accounting and tax accounting "1C" in the process of work are faced with the imperfection of the transaction mechanism. Such a program takes a long time to understand when downloading large reports. To avoid slowing down user processes, you can set quotas on the use of processor time