OUR BLOG POST

hosting image
blog list image

LANtenna Attack, use network cables to create wireless signals and steal data

At a domestic and business level, it is much safer to use Ethernet network cables than WiFi connectivity, for this reason, all servers, and computers that move sensitive information use a network cable to connect to a switch, which is correctly configured to avoid or mitigate the main attacks on networks, and avoid information theft. A group of researchers has discovered how to create wireless signals through an Ethernet network cable, with the aim of stealing information, this new attack is called LANtenna Attack.

blog list image

QR codes: can they be dangerous?

There are many methods that can be used to infect devices or steal data when we browse the Internet and one of them can be through a simple QR code. Hackers can generate codes solely for the purpose of sneaking malware into our devices or getting our information. Let's see what types of common attacks they can achieve and how to be protected.

blog list image

Is it possible to be anonymous on the Internet and not appear on Google?

It is very common that when searching our name or even ID in Google, results appear. For example, if we are on a list of admitted in a course if you have indexed the profile of a social network, etc. Sometimes this is not of interest and in this article, we will explain what we can do to prevent our data from appearing published on the Internet and indexed in the search engine so that anyone can see it.

blog list image

Congested networks: what it is and how it affects us

Network congestion is a problem that can affect both domestic and professional networks. We are going to explain what it consists of and how it can put the proper functioning of the connections at risk. It is always important to achieve optimal speed, avoid coverage problems and failures when connecting devices to the network. But sometimes this is not possible and we have difficulties with correct navigation.

blog list image

Backdoor Trojan: what is it and how to avoid it

When using a computer, mobile, or any device connected to the network, there are many threats that we can find. There are many types of viruses, Trojans, and malware in general. Obviously not all act the same and it is important to know to what extent they can damage the operation of a computer, steal data or infect other devices on the network. In this article, we are going to talk about backdoor Trojans. We will see how they work and what to do to avoid them.

blog list image

Secure HTTPS connections? Almost all threats come this way

When browsing the Internet we can find pages that are both HTTP and HTTPS. The latter are considered safer and the truth is that it is so on paper. They are websites that encrypt content and prevent information from leaking if, for example, we are connected from an insecure public network and we log in. Now, are we really going to be 100% safe browsing these pages? The truth is that no. In fact, as we are going to see, most malware takes advantage of HTTPS sites.

blog list image

Why should your router with WiFi 6 have 160MHz on the 5GHz band

The new WiFi 6 standard has been with us for several years, but it is in this year 2021 when the main manufacturers have launched affordable routers for home users in general. Today we are going to talk to you about the importance of buying a WiFi 6 router that has 160MHz channel width, and why you should discard any model that does not have this feature

blog list image

How many bays must a home NAS have to configure a RAID?

When we buy a home NAS server to use as the main storage for files and photos, it is very important to configure different RAID levels to avoid data loss in case a hard drive breaks. A very important detail is that a RAID is not a backup, it does not replace a complete backup but rather complements it, in order to protect against physical errors of one of the disks.

blog list image

10 recommendations to optimize your WiFi router

Something that we must take into account so that the Internet speed and the quality of the connection are the best is to keep the router in good condition. In this article, we want to give a series of essential recommendations that we can put into practice to ensure that the operation is adequate and avoid problems that slow down navigation or prevent other devices from being able to connect normally.

blog list image

What is a No-Log VPN and Why It Matters

Virtual private networks, or also known as VPNs, allow us to have privacy and security when browsing the Internet. When we use free or paid VPN services, a VPN tunnel is established that provides us with confidentiality, authenticity, and integrity of the transmitted data. VPNs allow us multiple uses, such as changing the public IP, bypassing regional blocks, and many other uses. Today we are going to talk about what a No-log or no-logs VPN is, and why you should always choose VPN services that have this feature.