|

Shortcuts
|
SpeedGuide.net - Your Guide to Broadband
|
We cover Broadband Internet connections, network security and system performance. A large section of SG focuses on
Cable Modems and DSL technology, stressing on improving TCP/IP performance over high speed/latency networks.
Some of the more popular SG network tools are listed below:
|
|
|
China to build an exascale supercomputer2016-01-26 03:06 EST by Daniela
China is developing a next-generation supercomputer, which will be 1,000 times more powerful than the supercomputer Tianhe-1A.The National Supercomputer Centre in Tianjin is expected to release a prototype in 2017 or 2018 of an "exascale" computer – capable of at least a billion billion calculations per second (one exaFLOPS). Exascale computing is considered the next frontier in the development... »
Researchers create Hot Potato exploit for Windows2016-01-25 16:06 EST by Daniela
Security researchers from Foxglove Security have combined several Windows vulnerabilities in one exploit, called "Hot Potato". It can be used to break into PCs/systems/laptops running on Windows 7/8/8.1/10 and Windows Server 2008/2010, allowing hackers to gain full control of user's computer.These exploits were initially discovered in the year 2000 but still these exploits were not patched by... »
Mozilla co-founder unveils 'Brave' ad-free browser2016-01-22 03:04 EST by Daniela
One of Mozilla's co-founders, Brendan Eich has announced a new browser called "Brave," that blocks outside online ads and ad tracking. Brave is based on Chromium, and aims to speed up browsing. It loads pages two to four times faster than other mobile browsers and 1.4 times faster than other desktop computers."At Brave, we're building a solution designed to avert war and give users the fair deal... »
The worst password for 2015 is '123456'2016-01-21 02:18 EST by Daniela
California-based tech company SplashData has announced the top 25 worst passwords of 2015. The results are based on more than 2 million passwords that leaked online during the year. On top of the list stands the "123456", just like last year. The second spot is also unchanged and holds the "password." "12345678" comes in third, and the lazy "qwerty" takes up the fourth position. The good thing... »
Samsung's older phones banned in Apple patent dispute2016-01-20 01:46 EST by Daniela
A US court has recently ordered that Samsung should stop selling its older smartphones that infringe on three Apple patents. The patents in question include the 'slide to unlock' patent, one for predictive text, and another 'autocorrect' patent. The smartphones covered under the order have already largely vanished from the market. Among them are Samsung's Admire, Galaxy Nexus, Galaxy Note, Galaxy... »
Windows 7, Vista, 2008 Tweaksby Philip (152 comments)
Windows Vista introduces a number of new features to the TCP/IP stack, including CTCP, and TCP Window Auto-Tuning. This new implementation works much better by default than previous Windows versions with broadband internet connections, and is able to adjust the RWIN value on the fly, depending on the BDP (bandwidth-delay product). This, however, introduces some problems with older routers and restricts the user from tweaking some of the TCP/IP parameters. Still, there is always some room for... »
How To Crack WEP and WPA Wireless Networksby Philip (93 comments)
Introduction With the popularity of wireless networks and mobile computing, an overall understanding of common security issues has become not only relevant, but very necessary for both home/SOHO users and IT professionals alike. This article is aimed at illustrating current security flaws in WEP/WPA/WPA2. Successfully cracking a wireless network assumes some basic familiarity with networking principles and terminology, as well as working with command-line tools. A basic familiarity... »
How to set a Wireless Router as an Access Pointby Philip (210 comments)
I've often found it useful to get just the wireless functionality out of a WiFi router and reuse it as an access point. Wireless routers seem more common, and are often priced even lower than wireless access points. Adding an access point to a wired network already in place, or to one where the main NAT router is provided by the ISP is usually the easiest solution. However, introducing a second NAT router on the network is not a good idea, especially without some tweaking to set it... »
Windows 8, 10, 2012 Server TCP/IP Tweaksby Philip (13 comments)
The Windows 8 TCP/IP implementation shares many traits with earlier Windows versions, however, there are some subtle differences, new syntax for applying tweaks, and some new settings. Windows 8 generally works well by default for many broadband connections, yet there is always some room for improvement and we will try to cover all relevant settings and their effect on your connection in detail below.To run some of the outlined commands, you will need to use an administrator account. With... »
Windows Vista tcpip.sys connection limit patch for Event ID 4226by Philip (19 comments)
Microsoft enforces a limit on half-open TCP/IP connections that is hard-coded in tcpip.sys. The maximum simultaneous half-open (incomplete) outbound TCP connection attempts per second that the system can make is intended to limit the spread of malicious viruses and worms, as well as limit the possibility of launching a DDoS attack. However, it has proven to also limit some applications using many TCP connections, such as P2P and P2PTV programs.When the OS reaches the half-open connection limit,... »
Gaming Tweaksby Philip (16 comments)
Online Gaming can often benefit from some fine-tuning of Windows TCP/IP settings and the Network Adapter properties. This article is intended to supplement our general broadband tweaks and list only TCP/IP settings that are specific to online gaming and reducing network latency. Some of these settings are also mentioned in our general tweaking articles, however, the emphasis here is on latency rather than throughput, and we have complemented the tweaks with more gaming-specific recommendations... »
|
|