MediaFox

Introduce: Specialized site to share, guide and update good techniques about programming, applications, servers, blogs, Network cloud, secure storage, ... and New Trends around the world.


How to check and fix DNS leak error in VPN

How to check and fix DNS leak error in VPN

The Domain Name Server (DNS) is responsible for resolving domains into the actual IP addresses to connect. When using a secure connection like a VPN tunnel , a DNS leak error occurs when DNS requests are sent over a normal (unencrypted) network instead of a secure tunnel. There are several ways to check for DNS leaks. While there are many VPN services that offer their own tools, one of the best ways is to use dnsleaktest.com . The tool is very simple and performs a series of tests that can help reveal leaks that don't appear all the time.

What is a DNS leak? How do I know if you have a DNS leak?

What is a DNS leak? How do I know if you have a DNS leak?

DNS information can sometimes leak out of a VPN connection, and it can do serious things about online privacy and security. What is a DNS leak? You can think of your Internet connection as having two parts. There is a section you would expect, where you connect to a website and get the data that makes up that website. However, there is another part, to find the location of the website, your computer needs to connect to a domain name service (DNS) to connect the domain name you entered as the URL and IP address of the server where website hosted.

What is ActivateWindowsSearch? Should we disable it?

What is ActivateWindowsSearch? Should we disable it?

Some users fret after noticing that a scheduled task in Windows seems to be taking up a lot of system resources. The most frequently asked question is is there an explanation of what this task does and how important it is to the functioning of the Windows operating system? Let's find the answer through the following article offline! What is ActivateWindowsSearch? ActivateWindowsSearch is part of the scheduled task of Windows Search available in Windows 7, Windows 8.1, and Windows 10. The ActivateWindowsSearch task is an essential part of the Search function. You should only do this in situations where disabling Windows search is absolutely necessary. The ActivateWindowsSearch task is used to search indexed files and programs for quick results.

How to set up IKEv2 IPsec on Windows

How to set up IKEv2 IPsec on Windows

Today's article will guide you how to set up IKEv2 IPsec on Windows. This guide was created with the operating system Windows 10. Establish a VPN connection 1. Open the Windows Start menu, enter control panel and open the Control Panel application . 2. Click the Network and Internet category . 3. Then select the tab Network and Sharing Center . 4. Click the Set up a new connection or network option . 5. Select the Connect to a workplace option and click Next. 6. Select the Use my Internet connection (VPN) method . 7. Enter the following information: - Internet address: Enter the domain name of the server you want to connect to. - Destination name: You can name this connection the way you want. - Use a smart card: Unchecked . - Remember my credentials : You may not check this option if you want to enter your login information every time you connect. - Allow other people to use this connection : If you do not check it, only the user for whom you are establishing this connection can connect. (If you want all users to be able to connect, you need admin privileges.)

The difference between torrent files and magnet link

The difference between torrent files and magnet link

Both magnet links and torrent files are used to share content with others through torrent services like uTorrent or BitTorrent . At first glance, the two types of file sharing seem the same, as both are used to download and share everything with others, but after all, they are not exactly the same. How do magnet links and torrent files work? Both the magnet link and the torrent file are used by the torrent client to fetch files for the user. That means if you're looking to download something, whether you have a magnet file or a torrent address, the torrent client can make it work.

Learn about Personal Area Network (PAN)

Learn about Personal Area Network (PAN)

A computer network is a collection of interconnected computers / devices, in which a connection is established for the purpose of communication between computers / devices, to share resources, data and applications. . There are different types of computer networks that are designed to operate in the area they cover and according to the network requirements, type of service, and coverage in which they are classified. What is a Personal Area Network (PAN) network? A Personal Area Network (PAN) is a network that connects computers / devices within an individual's range. Since PAN provides network coverage within a radius of around a person, typically around 10 meters (33 feet), it is called a Personal Area Network. The Personal Area Network typically includes computers, phones, tablets, printers, PDAs (Personal Digital Assistant) and other entertainment devices such as speakers, game consoles, etc.

What is SSTP (Secure Socket Tunneling Protocol)?

What is SSTP (Secure Socket Tunneling Protocol)?

SSTP, or Secure Socket Tunneling Protocol, is designed to protect PPP traffic using an SSL / TLS channel. SSTP is better and much more secure for Windows users than L2TP / IPSec or PPTP . SSTP is difficult to block and only provides good speeds if you have enough bandwidth. What is SSTP (Secure Socket Tunneling Protocol)? Short for Secure Socket Tunneling Protocol, SSTP is a type of VPN tunnel that uses SSL 3.0 channel to send PPP or L2TP traffic. SSL allows for the transmission and encryption of data, as well as checks the integrity of the traffic. Therefore, SSTP can bypass most firewalls and proxy servers by using the SSL channel over TCP port 443 .

Protocol difference between TCP and UDP

Protocol difference between TCP and UDP

You may have seen TCP and UDP when setting up port forwarding on your router or when configuring your firewall software . These two protocols are used for different data types. TCP / IP is a set of ports used by equipment to communicate over the Internet and most local networks. It is named after its two original protocols - Transmission Control Protocol (TCP) and Internet Protocol (IP). TCP provides applications a way to deliver (and receive) a stream of ordered packets and check for errors over the network. The User Datagram Protocol (UDP) is used by applications to transport a data stream faster by bypassing error checking. When configuring network hardware or software you will see the difference.

Difference between PPTP and L2TP protocol

Difference between PPTP and L2TP protocol

In this article, make tech easier with readers to explore the differences between PPTP and L2TP protocols, so that you can decide which is the better choice for your needs. Note that each protocol has its advantages and disadvantages - often related to encryption level, device compatibility, and ease of configuration. What is the PPTP protocol? PPTP or Point-to-Point Tunneling Protocol is an outdated method for deploying a VPN. It is developed by Microsoft and is the easiest protocol to configure. PPTP is low cost and faster than other VPN protocols.

Top 12 most dangerous backdoors in computer history

Top 12 most dangerous backdoors in computer history

A backdoor is a tool (program or related program) used by hackers to install on the system to bypass the security barrier of a device or software remotely. The user is not aware of the existence of the backdoor until it is discovered. Detecting backdoors in devices is extremely difficult. It is also difficult for many of the best experts to know what these "backdoor" malware do on the victim's computer and who is in control.

Address: 797 Nguyen Tat Thanh - Tan Phu - Vietnam. | Gmail: MediaFox.Biz - Phone: 08.00530077
Copyright © 2003 – 2020 MediaFox.Biz. All rights reserved.