OUR BLOG POST

hosting image
blog list image

Is it possible to be anonymous on the Internet and not appear on Google?

It is very common that when searching our name or even ID in Google, results appear. For example, if we are on a list of admitted in a course if you have indexed the profile of a social network, etc. Sometimes this is not of interest and in this article, we will explain what we can do to prevent our data from appearing published on the Internet and indexed in the search engine so that anyone can see it.

blog list image

Congested networks: what it is and how it affects us

Network congestion is a problem that can affect both domestic and professional networks. We are going to explain what it consists of and how it can put the proper functioning of the connections at risk. It is always important to achieve optimal speed, avoid coverage problems and failures when connecting devices to the network. But sometimes this is not possible and we have difficulties with correct navigation.

blog list image

Backdoor Trojan: what is it and how to avoid it

When using a computer, mobile, or any device connected to the network, there are many threats that we can find. There are many types of viruses, Trojans, and malware in general. Obviously not all act the same and it is important to know to what extent they can damage the operation of a computer, steal data or infect other devices on the network. In this article, we are going to talk about backdoor Trojans. We will see how they work and what to do to avoid them.

blog list image

Secure HTTPS connections? Almost all threats come this way

When browsing the Internet we can find pages that are both HTTP and HTTPS. The latter are considered safer and the truth is that it is so on paper. They are websites that encrypt content and prevent information from leaking if, for example, we are connected from an insecure public network and we log in. Now, are we really going to be 100% safe browsing these pages? The truth is that no. In fact, as we are going to see, most malware takes advantage of HTTPS sites.

blog list image

Why should your router with WiFi 6 have 160MHz on the 5GHz band

The new WiFi 6 standard has been with us for several years, but it is in this year 2021 when the main manufacturers have launched affordable routers for home users in general. Today we are going to talk to you about the importance of buying a WiFi 6 router that has 160MHz channel width, and why you should discard any model that does not have this feature

blog list image

How many bays must a home NAS have to configure a RAID?

When we buy a home NAS server to use as the main storage for files and photos, it is very important to configure different RAID levels to avoid data loss in case a hard drive breaks. A very important detail is that a RAID is not a backup, it does not replace a complete backup but rather complements it, in order to protect against physical errors of one of the disks.

blog list image

10 recommendations to optimize your WiFi router

Something that we must take into account so that the Internet speed and the quality of the connection are the best is to keep the router in good condition. In this article, we want to give a series of essential recommendations that we can put into practice to ensure that the operation is adequate and avoid problems that slow down navigation or prevent other devices from being able to connect normally.

blog list image

What is a No-Log VPN and Why It Matters

Virtual private networks, or also known as VPNs, allow us to have privacy and security when browsing the Internet. When we use free or paid VPN services, a VPN tunnel is established that provides us with confidentiality, authenticity, and integrity of the transmitted data. VPNs allow us multiple uses, such as changing the public IP, bypassing regional blocks, and many other uses. Today we are going to talk about what a No-log or no-logs VPN is, and why you should always choose VPN services that have this feature.

blog list image

TOR Browser: what should you know if you use it for the first time

Among all the browsers that we have available, one of the most popular is TOR Browser. It is well known for protecting the privacy and security of users. However, it is always advisable to really know how it works, what it can contribute to us, and why it is really interesting to use it. We are going to talk in this article about the basic points you should know when using this browser.

blog list image

Can a computer affect the speed of the entire network?

One thing is certain, every time the networks of our homes and offices are more complex. At first, it was just our router, desktops, and laptops. Wi-Fi smartphones, tablets, and printers were added not long ago. As if all this were not enough, networks have continued to grow with IoT devices, home automation, IP video surveillance cameras at home, and more. Today we are going to focus on explaining whether a computer or device can affect the bandwidth of our Internet connection, and what solutions we could adopt to try to avoid it.