Jump to content

Search the Community

Showing results for tags 'configuration'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Found 5 results

  1. Hi I have a broadband connection and a 4G mobile data service as internet service to my laptop (Windows). The broadband data speed is high but the internet service goes off often and resumes. To manage that I got a 4G mobile data service - internet connection which has lower data speed while is having a daily limit. I always connect both my broadband and 4G mobile data service with my laptop. When both services are up, how to know which internet service (broadband or 4G mobile) is being utilized by system (alternatively, how to assign broadband as preferred internet connection for the system?) Looking for a (internet service / connection fail-over mechanism) software or any internet network configuration such that the internet for laptop works mainly on broadband and should switch AUTOMATICALLY to mobile data service, in case of broadband service failure and switch BACK automatically to broadband, once the broadband service resumes Thank you
  2. All Private Internet Access Settings Explained The guide provides explanations for all settings and features of the Private Internet Access client for the Windows operating system. Private Internet Access is a popular VPN provider. The company has a strict no-logging policy which have been verified in court this year. Customers may download one of the available clients for their operating system. The Windows client ships with a list of features that you may enable to improve your privacy and security while being connected to one of the company servers. The following guide lists and explains all settings that the Windows client version of Private Internet Access provides currently. We have used the latest version of the client, version 0.65, for that. We will update the guide when features change. If you notice that before us, let us know in the comments so that we can update the article. Private Internet Access VPN Settings You can open the settings by right-clicking on the Private Internet Access icon in the Windows system tray area. Please note that you can only access the settings if you are not connected to the VPN at that time. If you are, you need to disconnect first before you can do so. The client uses three configuration pages of which one, simple, is not of much use. Advanced Settings The advanced settings page, which you see on the screenshot above, lists several options that you want to check out and configure. Username: your PIA username Password: the associated password of the account. Start application at login: whether the VPN software is started on Windows boot. Auto-connect on launch: whether the software connects to the VPN server when it is started. Show desktop notifications: whether notifications are shown on the desktop (e.g. on connection or disconnect). Region: The region you want to connect to. Tip: You can run speed tests for any server region to find out how well it performs. Connection type: Select UPD or TCP as the connection type. Default is UDP. Remote port: Set to auto by default, but you may specify a port there. Local port: Set a local port. Request port forwarding: The port that is being used is shown when you hover over the PIA icon in the system tray area. This can be useful to set it up in applications. PIA MACE: This is a new feature of Private Internet Access. It acts as a blocker for advertisement, malware, trackers and other undesirable elements. You have no control currently apart from enabling or disabling the blocker. VPN Kill Switch: This terminates the Internet connection if the connection to the VPN drops. Useful if you don't want your "real" IP address to be logged by services you connect to while using a VPN. IPv6 leak protection: This disables the use of IPv6 while connected to the VPN. Use small packets: If you notice connection issues, e.g. connections that drop frequently, you may want to enable this option to see if it resolves that issue. Debug mode: You may be asked to enable debug mode by PIA support. The log is written to C:\Program Files\pia_manager\log. While it is up to you and your requirements what to enable on the settings page, it is usually a good idea to enable all features but PIA MACE and Debug mode. Encryption A click on encryption displays options to set various encryption related parameters. Data Encryption: Select one of the available encryption standards. Available are AES-128, AES-256 and None. Data Authentication: Select one of the available cryptographic hash functions. Available are SHA-1, Sha-256 and None. Handshake: Encryption used to establish a secure connection with Private Internet Access servers. Pia uses TLS 1.2. The default is RSA-2048. The selection depends largely on your requirements. Want maximum protection? Select AES-256, SHA-256 and RSA-4096. Want all speed and no safety at all? Pick None, None and ECC-256k1. The default recommendation is AES-128, SHA-1 and RSA-2048. The client displays warning if you choose none for data encryption or data authentication, or when you chose ECC for Handshake. Now Read: Private Internet Access rubyw.exe connections explained Source
  3. Windows 10 Update Delivery Optimization Explained Microsoft's Windows 10 operating system ships with a feature that Microsoft calls (update) Delivery Optimization. The feature uses local network or Internet sources to deliver updates to machines running Windows 10. Basically, peer to peer assisted update delivery. Delivery Optimization is turned on by default on all editions of Windows 10. There is however a difference between Enterprise and Education versions of windows 10, and the regular versions such as Pro or Home. All Enterprise and Education versions are configured to only use PCs on a corporate network as peers. Consumer versions of Windows 10 on the other hand are configured to use local and Internet peers when it comes to updates. Windows 10 Update Delivery Optimization Clients used to provide content to peers need to meet certain requirements. Devices need to have at least 4 Gigabyte of RAM and 256 Gigabyte of hard disk space. Delivery Optimization is currently only used for larger updates such as cumulative updates or feature updates such as the Anniversary Update that was released recently. If enabled, and it is by default, your PC or device may be used to deliver updates to other Windows 10 users, and it may download updates from peers and not Windows Update. The whole process looks like the following: The PC checks WSUS to find out if updates are available. For updates that match the update policy on the PC, the PC checks with the Delivery Optimization service to find out whether local network or Internet sources are available that have the update already (based on configuration of the Delivery Optimization service). If peers are discovered, the PC tries to download the updates from those systems. For updates that are not available and updates that cannot be retrieved for other reasons, WSUS is used instead. Configuring Delivery Optimization First thing you may want to do is check the Delivery Optimization configuration on the PC. Use the keyboard shortcut Windows-I to open the Settings application. Navigate to Update & Security > Windows Update > Advanced options > Choose how updates are delivered. The page lists whether Delivery Optimization is enabled on the device, and how it is configured. You may toggle the feature on or off there on the page, and switch between "PCs on my local network" and "PCs on my local network, and PCs on the Internet". The latter defines update sources and destinations if Delivery Optimization is enabled. While you get some options to control Delivery Optimization using the Settings application, several are missing. Group Policy You may define Delivery Optimization using the Local Group Policy Editor. Tap on the Windows-key, type gpedit.msc and hit enter. Navigate to Computer Configuration > Administrative Templates > Windows Components > Delivery Optimization using the tree hierarchy on the left. Several policies are listed under Delivery Optimization. The main one is Download Mode which determines whether Delivery Optimization is enabled, and how it is being used. You may set Download Mode to one of the following values: 0: WSUS only. 1: Delivery Optimization behind the same NAT only. (Default for Enterprise and Education editions of Windows 10) 2: Private Group only: either same Active Directory Site or same domain. 3: Delivery Optimization uses LAN and Internet peers. (Default for Pro and Home editions of Windows 10) 99: Simple download mode. Delivery Optimization uses HTTP only, won't contact to Delivery Optimization cloud services. 100: Bypass mode: Delivery Optimization is not used at all, BITS is used instead. The following policies are provided as well. Please note that they modify various Delivery Optimization settings. If you turn the feature off, there is no need to configure those. Absolute Max Cache Size (in GB) - Specifies the maximum size in Gigabyte of the Delivery Optimization cache. Group ID: Must be set as a GUID. Used to create a single group for local network peering for branches that are on different domains, or are not on the same LAN. Max Cache Age (in seconds): Default value is 3 days. Specifies the maximum time in seconds that files are held in the Delivery Optimization cache. Max Cache Size (in Percentage): The default value is 20%. Defines the maximum cache size that Delivery Optimization uses as a percentage of available disk size. Max Upload Bandwidth (in KB/s): Default value is unlimited (0). This value specifies the maximum upload bandwidth of the Delivery Optimization service. Maximum Download Bandwidth (in KB/s): Default value is unlimited (0). The value specifies the maximum download bandwidth that the service uses. Maximum Download Bandwidth (in Percentage): The default value is unlimited (0): The value specifies the maximum download bandwidth in percentage. Minimum Background QoS (in KB/s): The default value is 500 KB/s. Specifies the maximum download Quality of Service speed in Kilobyte per second. Modify Cache Drive: Specify a custom drive that Delivery Optimization should use for its cache. Monthly Upload Data Cap (in GB): The default value is set to 200 Gigabyte. Specifies the maximum total bytes in Gigabyte that Delivery Optimization is allowed to upload to Internet peers. Controlling Delivery Optimization via the Registry You may control the feature using the Registry as well. Tap on the Windows-key, type regedit and hit enter. Confirm the UAC prompt. The main key is HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config. Check if you have the preference DODownloadMode listed under it. If not, right-click on Config and select New > Dword (32-bit) Value, and name it DODownloadMode. The key accepts the same values as Download Mode listed under Group Policy above (0=off, 1=On but local network only, 2=On, local network private peering only, 3=On local network and Internet, 99=simply download mode, 100=bypass mode). More information are provided on Technet. Source
  4. The Most Comprehensive Firefox user.js Has Been Updated The Ghacks user.js list covering the majority of privacy and security configuration options for the Firefox web browser has been updated. We released a first version of a user.js file for Firefox that concentrated on privacy and security settings back in 2015. It was the most comprehensive undertaking of its kind back then, and was made possible by Ghacks regular Pants who spend months researching entries and putting them in context. Firefox, unlike the majority of non-Firefox browsers out there, comes with an extensive under-the-hood section of preferences that users can control. A large part of those are for privacy and security features which you can control. While it makes sense to keep some in default state, you may benefit with better security or privacy by modifying others. The most comprehensive Firefox user.js has been updated The update introduces a massive list of changes to the list. Some preferences have been removed by Mozilla, others added or changed. Check out the updated Ghacks user.js version 0.10 list here Without further ado, lets here it from the man who created the list: Pants It's been over a year since I started my own user.js, over ten months since I shared it here at ghacks and the overwhelming support and feedback led to Martin kindly publishing it, and a whopping six months since the last update was published. That was version 0.8. I don't think a day has gone by in all that time where I haven't researched or read something or tinkered with Firefox or edited my user.js. Some days I have spent up to 10 hours on it. I am by no means an expert (despite over a year of reading), and some of the really technical stuff, especially new tech, just flies over my head (I do not have the time to invest in everything), but I have gone to great lengths to research, cite, understand and justify any settings - this includes debunking / disregarding / correcting / setting-the-record-straight on dozens of preferences that are incorrectly described across the web. Don't believe everything you read. While this list is unique, it has been compiled from hundreds of sources and from my own research. But without the help of those sources, and indeed Mozilla for building the preferences in, we could not have done it. So with that in mind, I would like to specifically thank the following: pyllyukko, CHEF-KOCH, fmarier (especially for his insights into safebrowsing - see the new revamped 0410 section) and the many contributors and followers at http://github.com/pyllyukko/user.js . These guys are awesome. the ghacks community and commentators for suggestions, information, and for pushing this list to even greater heights. Guys such as Just me, Conker, earthling, & Rockin' Jerry. They put me through the wringer. Thanks guys (and gals!). Martin for putting up with me and hosting the list and writing the articles. and last but not least, Bob. Thanks Bob. I would also like to share with you, thanks to fmarier (Francois Marier, a Firefox Security Engineer), what I consider to be great news (its old news, but why don't these things get more attention? I only found out a few days ago). Don't get me wrong, I love Firefox and know it to be the best browser in terms of "power users" and the ability to tweak and protect privacy. And I'm excited for e10s. But I have also at times bemoaned Mozilla's urgency to get on with patching some privacy/fingerprinting issues (just one example being the resource://URI's leak, the Proof of Concept has been around for over three years). So it came as some surprise for Francois to link me to this ( https://wiki.mozilla.org/Security/Tor_Uplift/Tracking ). I have long wished for some of the work that the TBB (Tor Browser Bundle) has built, to be incorporated into the firefox core. Looks like somewhere, someone, got busy; contacts were made, people got excited, and stuff is happening, fast. These guys are working hard and making great strides. Look at the completed bugs (blocking SSL session IDs, spoofing various screen/window measurements, permissions caching ). Look at the assigned ones (white-listing fonts, blocking plugin enumeration and mime types (again), reducing precision timing attacks with random microseconds, disabling MathML ). Look at the ones still left to be assigned, which will almost certainly be addressed (isolating favicons, isolating DOM, canvas fingerprinting, disabling SVG). This is AWESOME!!!! And a lot of the hard work has already been done by TBB. Thanks TBB. I also find this comment very interesting. What's your take on it? So here at last, I present to you the ghacks user.js version TEN. Yup, that's right, v.10. There is no version nine. I posted a number of different version nine betas in the wild and I would like to signify this release with a new number. I will attempt to list some things in the changelog, but quite frankly, there is just way too much (I did a file compare and its over half the lines - I will not be listing that). So just treat this as a whole new experience to explore things. I have created new sections (such as hardware fingerprinting), revamped sections (such as safebrowsing), made a very very few number changes (sorry if that upsets anyone), moved a few things around, corrected some data type errors, and of course added tons of new stuff, more information and sources. All items were checked in a vanilla FF, to see if they existed in about:config - anything not shown, was then searched for in the MXR and DXR current release, and inspected. This led to items being moved to deprecated, and for a lot of items to be confirmed as hidden prefs. Anything that is a hidden pref has been marked as such - currently there are 12 - just search for "(hidden pref)". Lastly, please remember that this is my user.js as it is today. I do not expect or want anyone to just run with it. You should know what you are doing. That said, I have kept the warning list at the top up to date, but I will never catch everything for everybody. This list is meant to be a TEMPLATE, please treat it as such. Check out the updated Ghacks user.js version 0.10 list here Source
  5. I've been using EMET for a while, but I don't know if the "System Status" that I configured is secure and stable, so here it's:
×
×
  • Create New...