Install SFTP server Windows

If you want to turn your Windows based system into a SecureFTP server, you should read this tutorial of how to install SFTP server Windows. Some important notes before going to install SFTP server Windows:     What is the SFTP? Of course you must have a background about SFTP server before you install SFTP server Windows. So, SFTP “SSH File Transfer Protocol” or a Secure File Transfer Protocol is a network protocol which provides file access, file transfer, and file management functionalities over any reliable data stream. It was

Read More

10 ways avoid Spyware and Trojans

Before we represent the 10 ways avoid Spyware and Trojans; what are the differences between Viruses, Worms, Trojans, Spyware, and Malware? Of course you wonder about these harmful software and want to know how dangerous of them on your PC. Virus: Virus is a software program replicates itself and infects all the computers or devices it connects to. Viruses usually need to be executed through Autorun, system startup or manually by the user. Virus often spreads via email attachment, USB drives, and the Internet connection. Worms: Worms are the most

Read More

Watch NBC live stream online free

To watch NBC live stream online free, you must live in the US. NBC “National Broadcasting Company” TV is an American commercial broadcast television and radio network. NBC is founded in 1926 by the Radio Corporation of America; NBC is sometimes referred to as the "Peacock Network", in reference to its stylized peacock logo which was originally created in 1956 for its then-new color broadcasts and became the network's official logo in 1979. If you want to watch NBC live stream online free such as one of a big variety of programs and series, NBC

Read More

Best ways avoid Malware attacks

Of course searching about best ways avoid Malware attacks is the most important thing that is must be taken in our consideration, how to stay safe online and protect our hardware from bad threats and spyware attacks. When our computers are behaving abnormally or slowing down, we often think there is a virus in our PCs. It is not necessary to be a virus, there may be some malware attacks either it seems to be either harmful or annoying. What is Malware? Malware is a short for “Malicious Software” which is specifically designed to disrupt or dama

Read More

Configure port forwarding routers NETGEAR interface

You can utilize this post to configure port forwarding routers NETGEAR interface. Before we start up representing the way to configure port forwarding routers NETGEAR interface, let’s define “Port Forwarding” and what is the difference between it and “Port Triggering”? By default NETGEAR router has a firewall blocks any connection by other devices in the public network “internet” to devices in your local network. So, if you want to allow specific connections to your local network, you must reconfigure the router. Port Forwarding: Po

Read More

Enable VPN passthrough DrayTek router

How to enable VPN passthrough DrayTek router? Of course this is the most important question nowadays because of many routers which is an obstacle in front of using VPN. While there are some features in the router does not allow the VPN to work successfully. So, you need to enable VPN passthrough DrayTek router for example to allow VPN traffic to passthrough it easily without any restriction or blocking by the router. How can I enable VPN passthrough for an internal VPN server? This applies to NAT mode only. If you have a VPN server running behin

Read More

Configure L2TP IPSec Cisco router

Layer 2 tunneling protocol is one of the best and high encrypted protocol to provide more security to your connection in addition to open some blocked services like webpages or an application in the public network “Internet”. How can I utilize from “configure L2TP IPSec Cisco router? Configure L2TP IPSec Cisco router enables remote users accessing a VPN over a public IP network without need to an intermediate gateway or a dedicated line, you can access anonymously from anywhere with POTS. There is an amazing benefit that the only requirement

Read More

Worried About Your Applications Security? Check this out!

Smartphones applications convey incalculable advantages to the clients and to the organizations advertising them. No big surprise even somewhat big, famous sites have their own applications. Then again, these applications are not without their defects. Imperfections you presumably aren't mindful of. To examine your cell phone applications security, we should examine what could turn out badly when you utilize a not so trusty app. Applications from Unknown Sources: Your mobile's top Enemy! Today, there are a few application stores offering distinctive

Read More

Configure port forwarding on router

Let’s define port forwarding before clarifying how to configure port forwarding on router. What is port forwarding? Port forwarding or port mapping as in a computer networking is an application of NAT “network address translation” which receives a communication request and redirects it from one address and port number combination to another during the packets are bypassing a network gateway. Port forwarding is commonly used to allow services on the internal network “protected” to be available to hosts on the opposite side of the networ

Read More

Route all Android traffic through secure tunnel

A lot of people need to route all Android traffic through secure tunnel to keep your Android’s mobile data connection safe against any snooping threats and you can get it done easily by many methods either manual methods which may require rooting for your Android device or easy and fast methods using free or paid software programs from Google play such as the VPN applications. We will represent both of these methods to route all Android traffic through secure tunnel. First method: how to route all Android traffic through secure tunnel manually Be

Read More