Showing posts with label internet. Show all posts
Showing posts with label internet. Show all posts

July 5, 2016

Wireless Internet Not Connecting? Try Clearing Your DNS!

Overview

Your DNS cache stores the locations (IP addresses) of web servers that contain web pages which you have recently viewed. If the location of the web server changes before the entry in your DNS cache updates, you can no longer access the site.
If you encounter a large number of HTML 404 error codes, you may need to clear your DNS cache. After you clear your DNS cache, your computer will query nameservers for the new DNS information.

How to clear your DNS cache

The following methods allow you to remove old and inaccurate DNS information that may result in 404 errors.

Windows® 8

To clear your DNS cache if you use Windows 8, perform the following steps:
  1. On your keyboard, press Win+X to open the WinX Menu.
  2. Right-click Command Prompt and select Run as Administrator.
  3. Run the following command:
    ipconfig /flushdns
    If the command succeeds, the system returns the following message:
    Windows IP configuration successfully flushed the DNS Resolver Cache.

Windows 7

To clear your DNS cache if you use Windows 7, perform the following steps:
  1. Click Start.
  2. Enter cmd in the Start menu search text box.
  3. Right-click Command Prompt and select Run as Administrator.
  4. Run the following command:
    ipconfig /flushdns
    If the command succeeds, the system returns the following message:
    Windows IP configuration successfully flushed the DNS Resolver Cache.

Windows XP, 2000, or Vista®

To clear your DNS cache if you use Windows XP, 2000, or Vista®, perform the following steps:
  1. Click Start.
  2. On the Start menu, click Run....
    • If you do not see the Run command in Vista, enter run in the Search bar.
  3. Run the following command in the Runtext box:
    ipconfig /flushdns
    If the command succeeds, the system returns the following message:
    Successfully flushed the DNS Resolver Cache. 
    

MacOS® 10.10

To clear your DNS cache if you use MacOS X version 10.10, perform the following steps:
  1. Click Applications.
  2. Click Utilities.
  3. Click Terminal.
  4. Run the following command:
    sudo discoveryutil mdnsflushcache
    If the command succeeds, the system does not return any output.
    Warning:
    To run this command, you must know the computer's Admin account password.

April 2, 2016

Forcing Windows To Use A Wired Connection Instead Of Wi-Fi

There are times when it is best to use a wired Ethernet connection instead of Wi-Fi even if a  Wi-Fi connection is available, but most Windows installations will default to connecting via Wi-Fi even when the PC is plugged into a router or modem via an Ethernet cable.
This defaulting to Wi-Fi is quite an annoyance, but it’s one that is easily remedied. Here’s how: 
1 – Press the Windows+R keyboard combination to open the Run box.
2 – Type ncpa.cpl into the Run box and press the Enter key.
3 – Press and release the Alt key to display the File menu.
4 – Click Advanced, then click Advanced Settings.
5 – Find the Connections: section, then highlight the Wireless connection.
6 – Click the green “down arrow” to the right of the wireless connection.
Your screen should look something like this:
choose-ethernet
7 – Click Ok.
From now on the computer will connect to the network/Internet via the wired Ethernet connection any time the PC is plugged into the router even if there is a Wi-Fi connection available.

February 16, 2016

Windows 10 is NOT Tracking Your Every Move!

Everyone, I am hearing from many clients and people that they are under the impression that Windows 10 is tracking and following every move someone is making over the internet. This is NOT true. If you are still anxious, suspicious, or need to verify this for yourself, then you should download one or all of the programs below:

I. O&O Shut Up 10. This one can be run from a USB flash drive and it does not need to be installed!
O&O ShutUp10 means you have full control over which comfort functions under Windows 10 you wish to use, and you decide when the passing on of your data goes too far.
Using a very simple interface, you decide how Windows 10 should respect your privacy by deciding which unwanted functions should be deactivated.

"O&O ShutUp10 is entirely free and does not have to be installed – it can be simply run directly and immediately on your PC. And it will not install or download retrospectively unwanted or unnecessary software, like so many other programs do these days!"
Freeware
Download


Windows 10 Antispy-Tool free Download
Still worried that Windows 10 is 'spying' on you?

II. Spybot Anti-Beacon. This is a one-click solution that just works!


Still worried that Windows 10 is 'spying' on you? 
The key word for all of the paranoia, and a lack of evidence for it in Windows 10, is "TELEMETRY" because Windows 10 is designed to help and assist you. One example is a reminder of expediting your trip to the airport 30 minutes earlier due to traffic on the way. Convenience, such as reminders, calendar entries, airline confirmation emails, etc. requires two things-
1. Your location
2. Access to the internet

More information about Telemetry here: http://betanews.com/2016/02/13/how-much-do-you-know-about-telemetry-and-privacy-in-windows-10-and-how-much-do-you-care/

If you truly are ready and have the need to track everything then go ahead and install Wireshark which allows you to monitor all data going out.


October 15, 2014

The Best Way to Access your Internet Connection from a Distant Room

powerline-networking-adapterAccessing a high speed Internet connection from a distant room can be a challenge. Wi-Fi signals diminish with distance, and they weaken further as they pass through walls and/or floors on the way to a distant computer.
There are several ways to extend your Internet connection to a distant room. Here are two of the most common methods:
1 – You can run a long CAT 5 Ethernet cable from your router to the distant computer, but this can be quite a job and end up producing less than desirable results.
2 – You can set up a second wireless router as a wireless repeater, but this presents its own set of issues.
While either of the two methods mentioned above will work, in my opinion the best option is purchasing an inexpensive powerline networking kit. These devices are extremely easy to install and use in two simple steps: 
1. Simply plug the Bridge unit into an unused Ethernet port on the router and the nearest electrical outlet. 
2. Then plug the Switch unit into the computer and its closest outlet. You’ll have instant Internet connectivity at up to 200 Mbs.
Most powerline networking adapters will work anywhere within homes ranging in size from tiny to 5,000 square feet. They will even allow you to access the Internet from a detached garage or outbuilding as long as it’s relatively close to the house and powered from the same electrical panel.
The price of a typical powerline networking kit is comparable to that of an inexpensive wireless router. For example, at the time of this writing Amazon.com has numerous kits for sale starting at around $30, and most of them allow you to connect up to four devices on the distant end!

September 25, 2014

Hackers exploit 'Shellshock' bug with worms in early attacks: Huge Warning to all Mac Users- Beware!

Hackers exploit 'Shellshock' bug with worms in early attacks: Huge Warning to all Mac Users- Beware!

A lock icon, signifying an encrypted Internet connection, is seen on an Internet Explorer browser in a photo illustration in Paris April 15, 2014.  REUTERS/Mal Langsdon
A lock icon, signifying an encrypted Internet connection, is seen on an Internet Explorer browser in a photo illustration in Paris April 15, 2014. Full Article Credit: Reuters/Mal Langsdon
 
"Shellshock" is the first major Internet threat to emerge since the discovery in April of "Heartbleed," which affected OpenSSL encryption software that is used in about two-thirds of all web servers, along with hundreds of technology products for consumers and businesses.

Hackers have begun exploiting the newly identified "Shellshock" computer bug, using fast-moving worm viruses to scan for vulnerable systems and then infect them, researchers warned on Thursday.

The latest bug has been compared to "Heartbleed" partly because the software at the heart of the "Shellshock" bug, known as Bash, is also widely used in web servers and other types of computer equipment.

The problem is unlikely to affect as many systems as Heartbleed because not all computers running Bash can be exploited, according to security experts. Still, they said "Shellshock" has the potential to wreak more havoc because it enables hackers to gain complete control of an infected machine, which could allow hackers to destroy data, shut down networks or launch attacks on websites, experts said.
The "Heartbleed" bug only allowed them to steal data.

The industry is rushing to determine which systems can be remotely compromised by hackers, but there are currently no estimates on the number of vulnerable systems. "We don't actually know how widespread this is. This is probably one of the most difficult-to-measure bugs that has come along in years," said Dan Kaminsky, a well-known expert on Internet threats. For an attack to be successful, a targeted system must be accessible via the Internet and also running a second vulnerable set of code besides Bash, experts said.
"There is a lot of speculation out there as to what is vulnerable, but we just don't have the answers," said Marc Maiffret, chief technology officer of cybersecurity firm BeyondTrust. "This is going to unfold over the coming weeks and months."

ATTACKS ON DEVICES
Joe Hancock, a cybersecurity expert with insurer AEGIS in London, said in a statement that he is concerned about the potential for attacks on home broadband routers and controllers used to manage critical infrastructure facilities. "In some areas this will be a challenge to fix, as many embedded devices are not designed with regular updates in mind and will never be able to be patched," Hancock said.

WORMS
Russian security software maker Kaspersky Lab reported that a computer worm has begun infecting computers by exploiting "Shellshock." The malicious software can take control of an infected machine, launch denial-of-service attacks to disrupt websites, and also scan for other vulnerable devices, including routers, said Kaspersky researcher David Jacoby.