internet connection

Fri
11
Nov
John Lister's picture

Study: Microsoft Defender Too Reliant on Internet

A new study suggests Microsoft Defender's effectiveness varies dramatically on the setting. It's one of the best for online-based threats, but among the worst performers for offline-based threats. The study is from AV Comparatives, which runs ... regular tests on more than a dozen leading cyber security tools. (Source: av-comparatives.org ) The results for Microsoft Defender are particular noteworthy for two reasons. First, it's the default, built-in tool for modern versions of Windows, meaning hundreds of millions of people use it. Second, it's often argued that Defender does a good enough job ... (view more)

Tue
31
Mar
John Lister's picture

VPN, Proxy 'No Internet' Bug Fix Released for Win10

Microsoft has fixed a Windows 10 bug that meant some users, particularly those running VPNs or proxy servers, couldn't get online. It's an optional update designed only for those who experienced the problem. The bug came to light last week, which ... was about as bad timing as it gets given the increase in the number of people now working from home. As is now a familiar issue, it seems to have been introduced by a previous update to Windows 10. The problem appears to have affected people running either proxy servers or virtual private networks. Though they use different techniques, both are ... (view more)

Wed
15
Jan
Dennis Faas's picture

How to use Smart DNS to Access Geo-Restricted Content

Have you ever tried to watch a trending online video, only to find that it's not available in your region? A Smart DNS proxy is a solution can help. Here's how it works: A Smart DNS proxy can be used to unblock geo-restricted content from around the ... world. It does this by collecting data related to your geographical location and re-routing it through a computer server located in a region where access to the blocked content is permitted. They do this by changing your Domain Name System (DNS) settings so that the websites you visit think you're in a location where you are permitted to access ... (view more)

Tue
04
Aug
John Lister's picture

How to Shut off Windows 10 File Sharing (WUDO)

Microsoft has confirmed it is using customers' Internet connections to distribute Windows 10 to other users. While it doesn't appear to pose a serious security risk, switching off the feature is a bit tricky. The feature is officially known as ... Windows Update Delivery Optimization , or "WUDO". It involves putting some downloaded Windows 10 files into a temporary directory area on a users computer; the files are then made available to other computers over the Internet. Microsoft insists no personal files or folders are shared in this way. The same system will also apply to ... (view more)

Mon
23
Apr
Dennis Faas's picture

'For Dummies' Publisher Targets BitTorrent Users

The company that publishes "For Dummies" books is taking to court the people it accuses of pirating its titles and releasing the content via BitTorrent. This could be the first time an American jury has considered a case involving BitTorrent users. ... BitTorrent is a technology for sharing large files, legally and illegally. It involves breaking down a file into hundreds of small pieces and downloading the pieces from many different sources, all at once. The method allows a computer to obtain different pieces of the same file in any convenient sequence, making the transfer process much quicker ... (view more)

Tue
22
Jul
Dennis Faas's picture

SpeedUpMyPC Review

A while back, I was asked to review and critique a new program from Li Utilities: the same company who created WinTasks Professional and WinBackup. For the purpose of this article, I will explain basic tweaking terminology and how it applies to ... SpeedUpMyPC: all in Simple English. If you really want to learn about computer hardware and how tweaking can make a world difference -- you will definitely find this article an interesting read! OK, so what is SpeedUpMyPC? SpeedUpMyPC is a utility which runs quietly in the system Tray Bar. It monitors system resources, optimizes Internet connections, ... (view more)

Tue
28
Jan
Dennis Faas's picture

Using a software firewall and hardware firewall in tandem, Part 3

Last week's question was about using a hardware and software firewall in tandem, and whether or not a [Laptop] PC would be protected through a firewall if it was daisy-chained to another [Desktop] PC which used a software firewal l. Yes -- this is a ... very technical question, but certainly very worth-while to know the answer to. Here is what the connection might look like if it was daisy chained: Internet connection -> Router, 1 port [hardware firewall] -> Desktop PC [software firewall] -> Laptop [no firewall: is it protected from the Desktop PC's software firewall?] This type of daisy ... (view more)

Subscribe to RSS - internet connection