Software
Last modified: 2025-01-22 21:01
If you have forgotten the password for your ICQ instant messaging account, this can become a real problem if the mailbox has not been specified previously. Necessary - Internet access. Instructions Step 1 Open your instant messaging program
Last modified: 2025-01-22 21:01
Modern PC users often use a very large number of all kinds of passwords in their work. And they are also often forgotten. This guide will show you what you can do to remember the password hidden behind the asterisks. Necessary In order to "
Last modified: 2025-01-22 21:01
Connecting to computer ports for different devices often occurs according to certain scenarios, however, the recent trend is towards the universalization of this process, in particular, it concerns the use of a USB port. Instructions Step 1 To connect a phone with removable storage media to the USB port of a computer, use a special cable that is usually included with the mobile device
Last modified: 2025-01-22 21:01
When communicating between nodes on a network, TCP addresses packets to specific applications that process the information received. Each packet specifies a source port and a destination port. Port is a conditional number from 1 to 65535 that determines which application the packet is addressed to
Last modified: 2025-01-22 21:01
A Windows Live account allows you to use various services provided by Microsoft. With Windows Live, you can share files, use Windows Mobile devices, and store personal data. To register an account, you can use the official Microsoft website
Last modified: 2025-01-22 21:01
One computer can often have several users, for example, family members, where everyone needs their own environment to work on the computer with their own settings, and so on. For this purpose, Windows provides a multi-user function. Instructions Step 1 Click on the "
Last modified: 2025-01-22 21:01
"Internet Censor" filters the content of websites, protecting it from unwanted and harmful information. But there are times when you need to refuse the services of the program. Necessary - PC running Windows operating system
Last modified: 2025-01-22 21:01
Sometimes a user needs to close one or more connection ports on his computer. This can be done in several ways that do not require a lot of labor. Instructions Step 1 The easiest way is to use a third-party firewall program that restricts access to connections in accordance with the security policy
Last modified: 2025-01-22 21:01
Content Advisor in Internet Explorer is a standard browser feature. Disabling this option requires a password, which, in most cases, has long been lost and cannot be recovered. However, it is possible to disable the selected function. Instructions Step 1 Click the "
Last modified: 2025-01-22 21:01
The prohibition of automatic updates of the Windows operating system is necessary for those who use an unlicensed version that limits the use of the OS to 30 days. This is not the only, but the most common reason for this operation. Fortunately, this procedure is doable with standard tools and does not require additional software
Last modified: 2025-01-22 21:01
A login is required to come up with when you register on a site. That is, you name yourself. And it is here that usually all unpleasant news awaits. Although in life the names of people are repeated, in the web space they must be unique. Necessary computer, internet Instructions Step 1 Specify what may be the login on the site on which you are going to register
Last modified: 2025-01-22 21:01
There are several proven methods to unlock the operating system if it is infected with a virus program. Each user can choose the most convenient option for himself. Necessary - access to the Internet. Instructions Step 1 If a viral ad window is blocking access to your operating system, try finding the code to disable it first
Last modified: 2025-01-22 21:01
The operating systems of the Windows family have long used a built-in firewall, or firewall. For many programs, the settings of this firewall are not suitable and you have to "increase the bandwidth". For example, networked games or file sharing programs require certain ports to be opened in order to function or play properly
Last modified: 2025-01-22 21:01
There are situations when you need to use an old email or account on a social network, forum, or online store. In most cases, we are faced with the problem of entering a password. If you use the same system code everywhere, then there will be no problems, and if you have forgotten it, then it is worth doing a number of consecutive steps
Last modified: 2025-01-22 21:01
Almost always, to maintain privacy when entering passwords, the corresponding programs instead of the entered characters display unreadable characters - "asterisks". However, if you see these very asterisks in the password entry field, this does not mean that the password is actually placed in this field
Last modified: 2025-01-22 21:01
If you have important documents on your computer, damage or loss of which can cost you dearly, then it is worth organizing the protection of the files, folders and even programs you need. This will allow you and only you to edit documents and open programs that will be safely hidden
Last modified: 2025-01-22 21:01
On a personal computer, various restrictions are often put that prevent it from performing some functions. Often users are faced with situations where it is impossible to install programs. Necessary - administrator rights. Instructions Step 1 To solve this problem, you need to have administrator rights
Last modified: 2025-01-22 21:01
Often, after reinstalling the OS, you may have a question about enabling the "Security" tab if you need to access the "Desktop" and "My Documents" folders of the previous OS. How do you enable this tab? Instructions Step 1 Open the desired folder you want to access by opening the Security tab
Last modified: 2025-01-22 21:01
The Internet offers great opportunities for lovers of music, movies, cartoons, and various games. All this can be downloaded in order to watch your favorite movie at any time, play an exciting game. You can download a lot of useful information when writing a term paper or thesis
Last modified: 2025-01-22 21:01
Due to the fact that many sites force their visitors to view advertisements, the problem of interfering banners on the working area of the screen has become widespread. These are malicious viruses or spyware that must be removed from your computer immediately to eliminate the threat to your data
Last modified: 2025-01-22 21:01
Windows Firewall is a firewall that is used in new operating systems from Microsoft to protect against virus attacks and unauthorized access to user data through the applications that he uses. To disable it, just use the appropriate options in the system
Last modified: 2025-01-22 21:01
The problems of exchanging various resources and information arise for many users at the initial stage of working with a PC. In order not to constantly exchange information using removable media, there are various local networks. Modern operating systems allow very fine tuning of the settings for sharing the necessary files and folders
Last modified: 2025-01-22 21:01
It is customary to call spam annoying and unnecessary advertising mailing that comes to e-mail, ICQ or to the phone in the form of sms. More broadly, the word "spam" can be understood to mean "clog" or "interfere"
Last modified: 2025-01-22 21:01
Removing protection from removable media or from a logical partition of a hard disk is possible if the object is in a mounted position and the lock is completed on it. Only one logical partition can be unprotected within a single physical disk
Last modified: 2025-01-22 21:01
With the advent of Windows 7, and in some cases with other operating systems, the security of the system and file access has improved significantly. Such security measures are useful, but on the other hand, many users face a huge problem after reinstalling the OS
Last modified: 2025-01-22 21:01
Using the Internet, you may encounter restrictions on access to some resources. And they don't all have to be malicious. Sites with entertainment content or social networks can be blocked by the filter. Necessary - Browser Internet Explorer
Last modified: 2025-01-22 21:01
The history of visits to web sites by the user is kept by the browser constantly, if the default settings have not changed after the installation of this program. It is used both by the application itself (for example, to speed up the loading of already visited pages) and by the user (for example, to find a lost website address)
Last modified: 2025-01-22 21:01
Among the many dangers that lie in wait for a novice user on the Internet, one of the most unpleasant is the Winlock virus. Infection of the computer with this virus leads to the appearance of the so-called "blocking banner". What does a blocking banner look like?
Last modified: 2025-01-22 21:01
As a rule, many Internet users communicate in various social networks, instant messaging programs and do not think that all correspondence can be copied by unauthorized persons and used for insidious purposes. To protect yourself from such situations, you need to adhere to some rules
Last modified: 2025-01-22 21:01
Captcha is a special test that offers users a problem that anyone can easily solve, but which is almost impossible for a computer to master. In order to protect your site from automatic registrations, spam or automatic downloads of files, you need to create a captcha code
Last modified: 2025-01-22 21:01
No one is safe from a virus getting on a computer. Sooner or later, all users face the problem of removing it from the computer. This is especially true for those who are too careless who do not install an anti-virus program. Of course, prevention in the form of antivirus is better, but if a virus has already appeared on your PC, then it is important to react to the problem in time and remove it
Last modified: 2025-01-22 21:01
The Windows operating system, with all its undoubted advantages, has one significant drawback. Namely, it is vulnerable to viruses and Trojans. And although antiviruses and firewalls significantly reduce the risk of infection, the user is sometimes faced with the need to find a virus that has settled on his computer
Last modified: 2025-01-22 21:01
When reinstalling the operating system or changing the disk format from FAT 32 to NTFS, an error may appear when opening folders and files. This often occurs when you try to open a folder that was created in a previous version of Windows. Instructions Step 1 Follow these steps to open the denied folder
Last modified: 2025-01-22 21:01
There are several ways to open a file if you do not have access to it. The most common variant is that the file is simply infected with a virus and must be deleted. But sometimes the file just uses another application that prevents it from launching
Last modified: 2025-01-22 21:01
A password manager is a software that helps a user to work with passwords. Many of them remember the entered data and then fill in the login and password fields automatically. If necessary, the password manager can be disabled. Instructions Step 1 Very often password managers are browser extensions
Last modified: 2025-01-22 21:01
In cases where several users use the same computer or there are concerns about the safety of data, the login to the system can be password protected. An account is created for each user. If you think someone is using your account, change your password when you sign in
Last modified: 2025-01-22 21:01
Users of a computer connected to the Internet have probably faced such a problem as an intrusive advertising or porn banner on the monitor. Banners can appear after viewing suspicious sites, when you go to which a firewall or antivirus warns of their danger, they can be downloaded along with add-ons of various programs
Last modified: 2025-01-22 21:01
When installing programs in smartphones and communicators of Nokia, Samsung and other manufacturers running on Symbian platform, the device requires that the program be signed with a security certificate. Otherwise, the installation is aborted
Last modified: 2025-01-22 21:01
A certificate is an electronic document that allows you to install an application on your phone without the need to jailbreak the firmware, and also gives the program the right to be used in the operating system environment for a specific user
Last modified: 2025-01-22 21:01
To protect against potentially dangerous software, Nokia smartphones use a safety certification system. Applications that are unsigned with a certificate are limited in functionality or do not start at all. Necessary - computer
Last modified: 2025-01-22 21:01
There are several basic methods to prevent access to your personal computer. It is recommended to use all available methods to ensure maximum protection of important data. Instructions Step 1 Turn on your computer, press and hold the Delete key
Last modified: 2025-01-22 21:01
Spam is the unwanted marketing email that now populates most of our email inboxes. If you imagine it on the scale of paper mail, we would be bogged down in mountains of waste paper. Necessary - a computer with Internet access
Last modified: 2025-01-22 21:01
Usually, users do not think that scammers can easily gain access to their data or computer. But in vain. No expensive OS or antivirus software can provide a 100% security guarantee. Today it is already very difficult to imagine your life without a computer with Internet access
Last modified: 2025-01-22 21:01
All kinds of advertising windows can be found on many Internet resources. In addition to the usual advertisements, there is a type of banners that are distributed by installing malicious software. Necessary - access to the Internet
Last modified: 2025-01-22 21:01
Sometimes it becomes necessary to password protect access to all pages of the site or only to a certain area of it. The mechanism for allowing visitors to access pages by logins and passwords is called "authorization". How to organize authorization without knowledge of any programming language?
Last modified: 2025-01-22 21:01
It is difficult to find an Internet user who has not received spam at least once in his life. Because of it, it is sometimes easy to miss an important message that can get lost among many advertisements. Instructions Step 1 You will receive much less spam if you completely opt out of publishing your email address on any public web pages
Last modified: 2025-01-22 21:01
There are several ways to close the ICQ messaging program. Among them - replacing the software with a more reliable one and setting a password for the user account. Necessary - messaging program Miranda; - Internet connection
Last modified: 2025-01-22 21:01
ICQ can literally be called the most popular instant messaging service in the world. There is hardly a person who owns the Internet who would not know about ICQ. If you are an active ICQ user, you should know that if you accidentally reinstall the client or OS, passwords are reset, and sometimes it is not easy to remember them
Last modified: 2025-01-22 21:01
We all surf the endless fields of the Internet and often face a variety of problems. This mainly concerns low-quality advertising and spam. A separate "cholera" is an advertising module. Many users are faced with the problem of removing it
Last modified: 2025-01-22 21:01
Every month hackers come up with new tricks to extort money over the Internet. Advertising modules are one of the ways to attack the computer of an ordinary user. Modules with unwanted images block the screen, restart the computer and require sending an expensive SMS to “unlock” the computer
Last modified: 2025-01-22 21:01
Copy protection of CDs is often needed not only for music files, but also for storing various databases, working files, as well as any content that may be on it. Necessary - Nero; - CD Protector. Instructions Step 1 Prepare the files that will later be burned to the disc
Last modified: 2025-01-22 21:01
To protect the information stored on your computer from prying eyes, from unwanted intrusions, you can set an account password. Then no one will be able to view the documents stored under your account. But it also happens that a password is not needed
Last modified: 2025-01-22 21:01
When it becomes necessary to connect two local networks into one, you should not come up with a fundamentally new scheme. In some cases, it is sufficient to connect just a couple of devices together. This will save you some time and effort. Necessary network hub, network cable
Last modified: 2025-01-22 21:01
The Internet provides opportunities for realization for almost anyone. One of the ways to increase popularity with the help of the Internet is to shoot and then publish video instructions covering a wide range of activities: from preparing breakfast to creating websites
Last modified: 2025-01-22 21:01
Sometimes, in order to convert text to a more convenient format, you need to change its encoding. This is a simple procedure that does not require special knowledge and does not take much time. Instructions Step 1 Install the MS Office software package on your personal computer
Last modified: 2025-01-22 21:01
Each text document has its own specific encoding. If the original encoding of the file has been changed, then in some cases, when you open it, instead of the usual letters, a set of incomprehensible characters may appear. Or, the document may mix, for example, Latin characters and Cyrillic
Last modified: 2025-01-22 21:01
Installing additional emoticons in the agent is needed in order to expand the set of existing ones. Most ICQ clients support uploading new elements, so it won't take you too long to install emoticons. Necessary - Internet connection
Last modified: 2025-01-22 21:01
Cartoons are animated images in messenger programs that serve to express certain emotions. They differ from ordinary emoticons in that in most cases they have voice acting and a larger size. Necessary - Internet access. Instructions Step 1 Close the mail agent program before installing new cartoons or emoticons (these components are installed in the same way)
Last modified: 2025-01-22 21:01
Lossy compression is used when converting to DjVu format. This method is used to store scanned documents, which contain many formulas, symbols and pictures. All these signs and drawings are very difficult to fully recognize, and just the method of this compression is very convenient for such material
Last modified: 2025-01-22 21:01
Computer information can be presented in various file formats. Often not all of them are easy to use, and therefore require reformatting. The Djvu format was created specifically for working with scanned documents. It is well known that such files take up a lot of hard disk space, and therefore the ability to compress was quickly appreciated by users
Last modified: 2025-01-22 21:01
Files with the djvu extension are, as a rule, e-books created from scanned pages of their paper version. This format is notable for the fact that it allows you to completely recreate the appearance of the book, including all drawings and photographs
Last modified: 2025-01-22 21:01
Inserting pictures into a note is a rather interesting technique that will help convey the essence of the content to the reader or simply understand the author's mood at the time of writing. Notes are supported by most of the existing social networks and blogs
Last modified: 2025-01-22 21:01
Some users rarely use the Internet browser in their daily work. They give preference to programs that can replace the functions of viewers. For example, e-mail can be checked through special programs that must be pre-configured. Necessary Windows Live Mail software
Last modified: 2025-01-22 21:01
It is customary to call a tab a separate page that opens in a browser window. Visual bookmarks is an add-on that allows you to load thumbnails of Internet resources on a new page that the user chooses. Instructions Step 1 Visual bookmarks are more like regular magazine bookmarks
Last modified: 2025-01-22 21:01
The background of a web page can be tied to its content or behave independently of it. In the first case, when scrolling content in the browser window, the background image will also scroll, while in the second, it can remain stationary. To implement a fixed background of the page, you should use the CSS style description language - only it can guarantee the same background behavior in different types of browsers
Last modified: 2025-01-22 21:01
Often, with similar functionality, a picture in the header of a site or blog gives the necessary individuality, and the proposed templates, on the other hand, are often simply "faceless". It is convenient to put a company logo, or a picture with a geographic location, or certain photos that are important for the site owner in the picture, at the very top
Last modified: 2025-01-22 21:01
Dreams of your photo on the cover of a glossy magazine may well come true! Have fun with your friends by putting your photo on the cover of the magazine. You do not need knowledge of Photoshop, because you can do it using the Internet. Instructions Step 1 Most sites provide such services for money, but you can almost always find free options on the Internet
Last modified: 2025-01-22 21:01
Podcasts have recently entered our lives, but have become an almost indispensable source of information for many, thanks to their ease of use and the ability to listen on portable devices. Each person can create their own audio or video podcast, share their news and opinions, convey certain information to people
Last modified: 2025-01-22 21:01
Hyperlinks are used to quickly redirect information from one source to another object (website, graphics, photos, etc.). It is very convenient and practical to use hyperlinks. For example, you are writing an article about the Alps and want to add photographs to the article or a link to a site with interesting information on this topic
Last modified: 2025-01-22 21:01
If you do not want to share personal information with other users of your personal computer, you must lock certain files or partitions on your hard drive. This can be done manually, without using special programs. You can open access to the file to a limited number of users or close it from everyone
Last modified: 2025-01-22 21:01
Any computer or laptop user sooner or later needs to protect their files and folders from deletion. The Windows operating system provides all the possibilities for setting rights for different users, and you yourself can set the level of access to your folders
Last modified: 2025-01-22 21:01
There are many programs that allow you to create your own copy-protected disc. CD Protector is freeware, of course, it is not universal, but the only non-commercial program can make it difficult to copy a disc. Instructions Step 1 Run the program and in the file to encrypt field specify the location of the file you are going to write to disk
Last modified: 2025-01-22 21:01
The popular microblogging service Twitter offers its users a wide variety of photo sharing options. You can post photos on Twitter both through a computer and using a mobile device. Instructions Step 1 To send a picture or photograph to your microblog from your computer, go to the Twitter website and enter the service using your username and password
Last modified: 2025-01-22 21:01
The question "In what format is it better to save a photo?" arises both among novice amateur photographers and creative people who create unique artistic masterpieces and collages with the help of a computer. But a definite answer can be obtained only if the purpose of saving the image is specifically indicated
Last modified: 2025-01-22 21:01
"Mail Agent" is a messenger program for the exchange of short messages, which is provided to users of the mail service Mail.ru. This application allows you to search for interlocutors and add them to your contact list according to certain parameters
Last modified: 2025-01-22 21:01
Digital shots are convenient for everyone. They can be conveniently stored, transferred and viewed. However, when browsing through collections of digital photographs, it is not uncommon to find images rotated from their natural position. These images are obtained by rotating the camera appropriately when shooting
Last modified: 2025-01-22 21:01
Sometimes it is enough just to open a page of an infected website to infect a computer virus. In this case, the so-called client scripts are processed in the browser, the most common of which is JavaScript. This script can be stopped (disabled) to improve security
Last modified: 2025-01-22 21:01
When processing documents on a computer, it may become necessary to turn over the worksheet. Word has the ability to set two modes: landscape (horizontal) orientation and portrait (vertical) orientation. Instructions Step 1 If you have Word 2003, find the File drop-down tab located in the top horizontal menu
Last modified: 2025-01-22 21:01
Without applications and programs, no computer can function at full capacity, which is why it is so important for every developer to know how a high-quality user-friendly application should differ, and how to make it in order to achieve the best result
Last modified: 2025-01-22 21:01
Modern social networks such as VKontakte, Odnoklassniki and Facebook allow you to exchange not only written messages, but also video files, music and pictures. Necessary - computer with internet connection - desired picture - basic knowledge in the field of computer technology Instructions Step 1 Upload the picture to any photo album
Last modified: 2025-01-22 21:01
The Opera browser has a very comfortable express panel. In a sense, these are the same bookmarks, but they are stored there not just as text links, but in the form of thumbnails of web pages. The only drawback lies in the fact that the official number of windows in the express panel can only be increased to 25
Last modified: 2025-01-22 21:01
Delphi is an environment for software development, it has long become a part of the lives of many users, even those who do not seriously program. It is one of the most popular languages as it is easy to learn and has extensible functionality
Last modified: 2025-01-22 21:01
Entering and editing text is one of the most frequent operations performed by personal computer users on a daily basis. Few people think about mechanisms that make these actions simpler. Meanwhile, the stunning typography of the text displayed on the screen is the product of a synthesis of many technologies embodied in the graphics subsystems of modern operating systems
Last modified: 2025-01-22 21:01
To become a successful programmer, you need two things that traditionally don't go hand in hand: creativity and math skills. Before you start programming, you should be familiar with the use of specially designed applications. Necessary - Computer
Last modified: 2025-01-22 21:01
Most modern digital cameras have a built-in rotation sensor, so the photos you end up with are usually already in the correct orientation. However, if all of you still have an image that is incorrectly rotated, our faithful friend - Photoshop will help fix the situation
Last modified: 2025-01-22 21:01
Many software users understand that timely updating of software products guarantees (not 100% of course) productive and safe operation of not only themselves, but the operating system as a whole. To install updates in a timely manner, you need to find out the current version of the program, which is not difficult at all
Last modified: 2025-01-22 21:01
Almost every car with an electronic engine management system is also equipped with a self-diagnosis system. If one of the sensors gives a reading to the computer that differs from the one provided by the program, an emergency one will be started, and a lamp on the car's display will light up, warning of a malfunction
Last modified: 2025-01-22 21:01
Overclocking the CPU is an effective way to improve the performance of your computer at a low cost. If you are careful in performing overclocking actions, you will protect your computer and its components from damage. Necessary Programs:
Last modified: 2025-01-22 21:01
To protect the copyright of your captured and edited video, you can overlay it with a special logo that cannot be removed by other users. The logo in the video file can be inserted both as an image and in text format. To add it, you can use video editing utilities
Last modified: 2025-01-22 21:01
The scroll bar is present as standard on almost all Internet sites, allowing you to scroll down or up the page for easy familiarization with the information posted on it. In some cases, the site design requires the developer to remove the scrollbar from the page because it does not match the page design or the type of content posted
Last modified: 2025-01-22 21:01
One of the types of ransomware viruses is a frame that requires sending an SMS to a short number or transferring money to a phone account. This virus can block access to the Internet and the launch of certain programs. Instructions Step 1 Do not send money to cyber fraudsters, try to deal with the problem for free
Last modified: 2025-01-22 21:01
Everyone wants to make their site more interesting for the user. Most often, scripts are used for this, they provide great opportunities for the development of Internet projects. Necessary PHP script, PHP-enabled hosting, local server, FTP manager or online FTP service Instructions Step 1 A script is an executable program that runs in a browser window or on a server
Last modified: 2025-01-22 21:01
Today, finding a page on the Internet that does not use at least some script is no easier than at a university - a student without a mobile phone. And just as a mobile phone does not work without the appropriate infrastructure, so web scripts need some kind of power to animate them
Last modified: 2025-01-22 21:01
A database is a collection of data that is organized according to certain rules and resides in the computer's memory. It characterizes the current state of a specific subject area. Necessary - computer; - server; - Sql database
Last modified: 2025-01-22 21:01
As applied to programming, the word "script" today is used to refer to a program written in one of the scripting programming languages. If the script needs to pass any parameter, then this is done, as a rule, when calling such a program
Last modified: 2025-01-22 21:01
DLL is a piece of code stored in files with a .dll extension. A piece of code can be used by other applications, but the library is not an application itself. In essence, dynamically linked libraries are collections of compiled functions. However, such libraries have a number of peculiarities - for example, if some applications are simultaneously executed in the system and they use functions located in the same DLL, then only one of the libraries will be permanently in memory
Last modified: 2025-01-22 21:01
The Windows 7 operating system has pleased users with a new component - Libraries. They are places for managing files and documents. In the library, viewing files is carried out as in a regular folder. You can also sort your files here - by type, date, etc
Last modified: 2025-01-22 21:01
Files with the dll extension (Dynamic Link Library) contain compiled libraries of program codes and resources. Resources can be images, text, audio and video clips, cursors, and other elements used by application executables. You can view and even make changes to such files using various software, although this may lead to the inoperability of programs using such files
Last modified: 2025-01-22 21:01
A game engine is a kind of operating system that exists within a game and provides an appropriate set of basic functions for its correct operation. To write a game engine, you need to have a good knowledge of this or that programming language
Last modified: 2025-01-22 21:01
Scripts are different, you can write them yourself, or you can find ready-made ones on the Internet. When creating a website, the script is written into the source of the page in the form of a code. It is best to use special programs for editing sites