
Shortcuts
|
SpeedGuide.net - Everything Broadband
"Some of the Best Broadband Speed Tweaks on the Net"
We cover Broadband Internet connections, network security, wireless and system performance. A large section of SG focuses on
Cable Modems and DSL technology, stressing on improving TCP/IP performance over high speed/latency networks.
Some of the more popular SG network tools are listed below:
|
|
FTC investigating ad sale practices at Google and Amazon2025-09-12 18:06 EST by Daniela
The Federal Trade Commission has launched an investigation into whether Amazon and Alphabet, Google’s parent company, misled advertisers who place ads on their websites.The federal agency is looking into whether Amazon and Google properly disclosed the pricing structure of their ads to potential advertisers, according to Bloomberg. It is looking into whether Amazon’s advertising "auctions"... »
Spotify finally launches HD lossless audio for Premium subscribers2025-09-10 18:29 EST by Daniela
Lossless audio, a format that Spotify says has been much-requested by subscribers over the years, is finally arriving on the streaming service.In a post, the company says that 24-bit/44.1kHz FLAC audio will now be an option for premium subscribers in select markets "across nearly every song available in Spotify."Subscribers will have the option to adjust music quality as low, normal, high, very... »
Apple unveils new iPhone 17 at event in Cupertino2025-09-09 17:17 EST by Daniela
Apple launched the iPhone 17 series today at its "awe-dropping" event, with the base model getting an upgraded display. The iPhone 17 has a slightly bigger screen at 6.3 inches as compared to the 6.1-inch screen of the iPhone 16. The display is getting an upgrade with ProMotion, which is being used in the base model for the first time.It supports a 120 Hz refresh rate and dynamically... »
CISA warns TP-Link vulnerabilities exploited in active cyberattacks2025-09-08 14:54 EST by Daniela
The US Cybersecurity and Infrastructure Security Agency (CISA) has said two flaws in routers made by Chinese networking biz TP-Link are under active attack and need to be fixed – but there's another flaw being exploited as well.CISA warned that two flaws, CVE-2023-50224 and CVE-2025-9377, have been exploited in the wild by persons unknown. The first issue allows an attacker without... »
Google's Circle to Search can now translate text as you scroll2025-09-04 18:06 EST by Daniela
Google's Circle to Search is getting a new feature that will allow you to continuously translate text while scrolling through social media posts or even when switching to different apps. Announced on Thursday, the feature will start its rollout this week to select Samsung Galaxy devices, but will more than likely expand to more devices, with the Pixel 10 lineup a natural next stop.While you could... »
Windows 7, Vista, 2008 Tweaksby Philip (155 comments)
Windows Vista introduces a number of new features to the TCP/IP stack, including CTCP, and TCP Window Auto-Tuning. This new implementation works much better by default than previous Windows versions with broadband internet connections, and is able to adjust the RWIN value on the fly, depending on the BDP (bandwidth-delay product). This, however, introduces some problems with older routers and restricts the user from tweaking some of the TCP/IP parameters. Still, there is always some room for... »
Windows 10,11 TCP/IP Tweaksby Philip (50 comments)
The TCP/IP speed tweaks below work with Windows 8, 10, 2012/2019 Server. The Windows 8/10 TCP/IP implementation shares many traits with earlier Windows versions, however, there are many subtle differences and updates, new syntax for applying tweaks using PowerShell cmdlets, and some new settings. Windows 10 generally works well by default for many broadband connections, yet there is always some room for improvement and we will try to cover all relevant settings and their effect on your... »
How To Crack WEP and WPA Wireless Networksby Philip (95 comments)
Introduction With the popularity of wireless networks and mobile computing, an overall understanding of common security issues has become not only relevant, but very necessary for both home/SOHO users and IT professionals alike. This article is aimed at illustrating current security flaws in WEP/WPA/WPA2. Successfully cracking a wireless network assumes some basic familiarity with networking principles and terminology, as well as working with command-line tools. A basic familiarity... »
Gaming Tweaksby Philip (59 comments)
Online Gaming can often benefit from some fine-tuning of Windows TCP/IP settings and the Network Adapter properties. This article is intended to supplement our general broadband tweaks and list only TCP/IP settings that are specific to online gaming and reducing network latency. Some of these settings are also mentioned in our general tweaking articles, however, the emphasis here is on latency rather than throughput, and we have complemented the tweaks with more gaming-specific recommendations... »
How to set a Wireless Router as an Access Pointby Philip (236 comments)
I've often found it useful to get just the wireless functionality out of a WiFi router and reuse it as an access point. Wireless routers seem more common, and are often priced even lower than wireless access points. Adding an access point to a wired network already in place, or to one where the main NAT router is provided by the ISP is usually the easiest solution. However, introducing a second NAT router on the network is not a good idea, especially without some tweaking to set it up... »
Windows Vista tcpip.sys connection limit patch for Event ID 4226by Philip (19 comments)
Microsoft enforces a limit on half-open TCP/IP connections that is hard-coded in tcpip.sys. The maximum simultaneous half-open (incomplete) outbound TCP connection attempts per second that the system can make is intended to limit the spread of malicious viruses and worms, as well as limit the possibility of launching a DDoS attack. However, it has proven to also limit some applications using many TCP connections, such as P2P and P2PTV programs.When the OS reaches the half-open connection limit,... »
How to Stop Denial of Service (DoS) Attacksby Philip
Denial of Service (DoS) attacks are very common on the Internet these days, and they can make your online experience miserable. In some cases of Distributed Denial of Service Attacks (DDoS), they can bring down websites, or cripple entire networks in a matter of minutes, preventing connectivity for many customers. There are different types of DoS attacks, and we've tried to explain the most common types and ways to mitigate their effects to you or your network.Types of Denial of Service (DoS)... »
Network Adapter Optimizationby Philip (12 comments)
The information in this article is intended to improve understanding of all common and advanced network adapter settings under current Windows versions. We will also offer some general suggestions on setting up your LAN for the best possible network performance. Keep in mind that many of these settings can significantly affect performance and reliability in a good or bad way. Consider testing performance using some type of network analyzer or even a simple throughput test before and after... »
|
|