Proactive Computing | Optimizing IT for usability, performance and reliability since 1997

Category: #Networks (Page 1 of 2)

How to Setup an OpenVPN Server to Secure Your Network

5e315ba1.png
Hosting your own VPN server can secure your network by allowing you to set rigourous firewalls in place (to block important services like SSH), while still being able to maintain administrative access when you’re connected to the VPN.

Read This Article on CloudSavvy IT ›

Source: https://www.cloudsavvyit.com/1147/how-to-setup-an-openvpn-server-to-secure-your-network/
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Anthony Heddings

The star of Netgear’s first WiFi 6 gaming router is its software

c0692b30-f863-11ea-8ed7-5d4807369790The PlayStation 5 will support WiFi 6 upon its release this November, but it won’t mean much if gamers don’t have a router that also supports the standard. There are some good models on the market from companies like D-Link and Linksys, with great ge…

Source: https://www.engadget.com/netgear-nitehawk-pro-gaming-xr1000-123031339.html
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By:

The Ultimate Defense: What Is an Air Gapped Computer?

cutting-an-ethernet-cable.jpg
When reading about cyber-security, you’ll probably see talk about “air-gapped” computer systems. It’s a technical name for a simple concept: A computer system that’s physically isolated from potentially dangerous networks. Or, in simpler terms, using a computer offline.

Read This Article on How-To Geek ›

Source: https://www.howtogeek.com/687792/the-ultimate-defense-what-is-an-air-gapped-computer/
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Chris Hoffman

How to Get Location Information from an IP Address

9c52c8fb.png
It isn’t CSI magic—it’s easy to get location info from an IP address. The internet is split up into chunks, called subnets, which are spread around the globe. Getting a location is as simple as finding which subnet an IP falls into.

Read This Article on CloudSavvy IT ›

Source: https://www.cloudsavvyit.com/1495/how-to-get-location-information-from-an-ip-address/
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Anthony Heddings

How to Use the Snort Intrusion Detection System on Linux

59b60e83.png
Run Snort on Linux and protect your network with real-time traffic analysis and threat detection. Security is everything, and Snort is world-class. This pig might just save your bacon.

Read This Article on CloudSavvy IT ›

Source: https://www.cloudsavvyit.com/6424/how-to-use-the-snort-intrusion-detection-system-on-linux/
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Dave McKay

How to Disable Wi-Fi Protected Setup (WPS) in Your Router

Wifi-Protected-Setup-router-featured.jpg By default, many routers have Wi-Fi protected setup (WPS) which can let you connect to your router without needing its SSID and password. However, WPS makes your router vulnerable to PIN-guessing attacks from hackers. As a result, you may want to turn off WPS in certain cases. Below, we’ll cover how to disable WPS as well as the benefits and drawbacks of keeping WPS active. How to Activate/Deactivate WPS There are two ways to manually enable and disable WPS. If your router allows you to deactivate WPS, you should be able to… Read more13771174.gif

Source: https://tracking.feedpress.com/link/12555/13771174/disable-wifi-protected-setup-wps-router
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Damien Oh

How to Connect to a Database Over a Network

a612d420.png
When connecting to a database, you must take extra precautions if it’s not running locally. Any connections made over a network should be secure, and you should never leave the database open for anyone to brute-force a connection.

Read This Article on CloudSavvy IT ›

Source: https://www.cloudsavvyit.com/5440/how-to-connect-to-a-database-over-a-network/
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Anthony Heddings

How to Configure Your DNS

a612d420.png
DNS records are used to translate addresses humans can understand (like google.com) into IP addresses computers can understand (like 64.233.191.255). In order for your site to work properly, you’ll need to make sure your DNS configuration is in order.

Read This Article on CloudSavvy IT ›

Source: https://www.cloudsavvyit.com/3852/how-to-configure-your-dns/
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Anthony Heddings

New H.266 codec uses half the data to stream 4K video

78b0fd80-c060-11ea-b7f5-3fd0d8977217Fraunhofer, the German company that helped develop the H.264, H.265 and MP3 encoding formats, has unveiled a new video encoding standard that could severely reduce streaming bottlenecks. Called H.266/Versatile Video Coding (VVC), it’s specifically de…

Source: https://www.engadget.com/h266-vvc-codec-4k-streaming-data-half-133047705.html
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By:

How to Use Wireshark Filters on Linux

network-switch.jpg
Wireshark is a world-class packet analyzer available on Linux, Windows, and macOS. Its filters are flexible and sophisticated, but sometimes, counterintuitive. We’ll explain the “gotchas” you need to be on the lookout for.

Read This Article on How-To Geek ›

Source: https://www.howtogeek.com/678918/how-to-use-wireshark-filters-on-linux/
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Dave McKay

« Older posts