OUR BLOG POST

hosting image
blog list image

How to avoid incorrect domain name resolution failure when using VPN

We are going to explain why the domain name resolution error appears when using a VPN and what we can do to fix it. This problem can appear when we try to establish a connection, but as we will see it has different causes. This error appears in Windows and we can solve it in a simple and fast way.

blog list image

Do you need to block malicious IPs on your firewall?

When we install a firewall on a system, we mainly have two policies that we can follow, permissive policy (we allow everything except what we want to block) or restrictive policy (block everything except what we specifically want to allow). Currently, on the Internet, we have a large number of lists of malicious IP addresses that we can block, with the aim that possible attacks carried out on us are blocked directly in the firewall. Do you want to know the best lists of malicious IP addresses that you can use in your firewall?

blog list image

What is SSH and what is it for?

SSH stands for Secure Shell. It is a protocol whose function is to offer remote access to a server. The main peculiarity is that this access is secure since all the information is encrypted. This prevents it from being leaked and a third party from seeing that data. We are going to explain what this protocol consists of, how it works and we will also talk about how we can use it in Windows.

blog list image

This is how the DNS protocol works for you to browse the Internet

In order to surf the Internet, different protocols, services, and programs come into play. For example, we will need a router that offers a connection to the computer or mobile, as well as a browser with which to search for pages. But for that to be possible there is much more and one of the most important points is the DNS protocol. We are going to explain how they work, why they are important, and in what way or why we can change them.

blog list image

When should you use a VPN

Having a VPN has become very common among users, both on computer and mobile. It is very useful to avoid geo-blocking or improve privacy, for example. Now when should we really use a VPN? We are going to talk about this in this article. We will explain when it is necessary or recommended and in what circumstances we could do without it.

blog list image

Cut offs when sharing files in the cloud? Fix them with these tips

Working with files in the cloud is changing the way we work and store our memories and files. Today, sharing a file between coworkers to synchronize tasks or carry out a common project is the order of the day. The great advantage that the cloud offers us is that it allows us to store all kinds of files and documents, in addition to having them always at our disposal. Other additional benefits are that they allow us to save space on our hard drives, and we can also have our backup copies of files to recover them in case our hard drive crashes. However, it is not all perfect, sometimes we suffer cut-offs when sharing files in the cloud and today we are going to explain how we can solve them.

blog list image

How a website stores our secure passwords

The passwords are the primary defensive barrier we have to avoid having intruders in our accounts. We use them in social networks, to access devices, forums in which we register, programs ... Now, how do web pages protect these keys so that they are safe? Are all sites the same or can we have problems? We are going to talk about this in this article.

blog list image

Tips to avoid tracking when browsing in private mode

The privacy may be at risk every time you enter a web page, we connect to a Wi-Fi network or anywhere a session is started. We can be victims of computer attacks or simply that the pages collect data such as the IP address, where we are, what provider we use, etc. This is independent of whether we browse in private mode in Chrome or Firefox or, on the contrary, we open a new window in the normal browser. We will explain what to do to avoid tracking.

blog list image

Connection error when using Skype: how to avoid this problem

Skype is a program that has become essential for many home users and also businesses. Sometimes problems arise with the connection that can affect the quality of the call or video call and can even cause that we cannot connect directly. The causes are varied, as we are going to see, as well as the steps that we must take if a problem appears. We are going to give some tips to ensure that the connection is correct and thus avoid the most common failures.

blog list image

What types of cybercriminals are there: Are they all the same?

When we surf the Internet there are many cyber attacks that we can suffer. There are many varieties of malware, such as viruses, Trojans, keyloggers ... Hackers use different strategies to achieve their goal and steal passwords, data, put users' privacy at risk ... Now, are all cybercriminals the same? The truth is that there are differences, depending on the way of operating and of course what objectives they have. Let's see what types there are.