
Shortcuts
|
SpeedGuide.net - Your Guide to Broadband
|
We cover Broadband Internet connections, network security, wireless and system performance. A large section of SG focuses on
Cable Modems and DSL technology, stressing on improving TCP/IP performance over high speed/latency networks.
Some of the more popular SG network tools are listed below:
|
|
|
EternalRocks Worm Exploits 7 NSA Hacking Tools2017-05-22 16:40 EST by Daniela
A few weeks after WannaCry ransomware started attacking users around the world, a new worm using NSA hacking tools has been discovered. This particular worm, called EternalRocks uses seven different NSA tools: EternalBlue, Eternalchampion, Eternalromance, Eternalsynergy, Doublepulsar, Architouch and SMBtouch.EternalRocks worm uses flaws in the SMB Server Message Block (SMB) shares networking... »
FCC votes to start net neutrality rollback2017-05-19 11:40 EST by Daniela
The FCC voted on Tuesday 2:1 to officially propose an order that would kill net neutrality rules put in place by the previous administration. These rules were designed to ensure that all online content and services get equal treatment online. However, the new FCC chairman Ajit Pai, argues that they represent unnecessary government meddling in the internet's infrastructure."Today, we propose to... »
Chrome vulnerability allows hackers to steal user credentials2017-05-18 10:42 EST by Daniela
DefenseCode security researcher Bosko Stankovic has discovered a flaw in Google's Chrome browser that allows hackers to install and automatically run a malicious file on a Windows PC to steal passwords. The vulnerability is in the default configuration of Chrome and all Windows versions supporting the browser.Due to the flaw, hackers may trick a Chrome user into downloading a Windows Explorer... »
Comcast's new wireless service, Xfinity Mobile, is now live2017-05-17 18:27 EST by Daniela
Comcast announced today that its long-rumored new wireless service, Xfinity Mobile, is now live. Users can now sign up on the official Xfinity Mobile website.The service features an unlimited data, talk, and text plan starting at $65 a month for up to five lines ($45 per line for customers with Comcast's top X1 TV packages), or $12 per GB a month a la carte. The unlimited option has been reduced... »
WannaCry ransomware by the Shadow Brokers another major blow for the NSA2017-05-17 10:56 EST by Philip
The hacking group calling itself the Shadow Brokers has caused issues for the National Security Agency for months, auctioning off highly classified NSA hacking tools. In April, the group dumped a number of NSA's zero-day software exploits on the web.All this culminated last Friday, when the WannaCry ransomware based on these exploits spread across the world, disrupting rail traffic, shutting down... »
Windows 7, Vista, 2008 Tweaksby Philip (153 comments)
Windows Vista introduces a number of new features to the TCP/IP stack, including CTCP, and TCP Window Auto-Tuning. This new implementation works much better by default than previous Windows versions with broadband internet connections, and is able to adjust the RWIN value on the fly, depending on the BDP (bandwidth-delay product). This, however, introduces some problems with older routers and restricts the user from tweaking some of the TCP/IP parameters. Still, there is always some room for... »
How To Crack WEP and WPA Wireless Networksby Philip (93 comments)
Introduction With the popularity of wireless networks and mobile computing, an overall understanding of common security issues has become not only relevant, but very necessary for both home/SOHO users and IT professionals alike. This article is aimed at illustrating current security flaws in WEP/WPA/WPA2. Successfully cracking a wireless network assumes some basic familiarity with networking principles and terminology, as well as working with command-line tools. A basic familiarity... »
How to set a Wireless Router as an Access Pointby Philip (226 comments)
I've often found it useful to get just the wireless functionality out of a WiFi router and reuse it as an access point. Wireless routers seem more common, and are often priced even lower than wireless access points. Adding an access point to a wired network already in place, or to one where the main NAT router is provided by the ISP is usually the easiest solution. However, introducing a second NAT router on the network is not a good idea, especially without some tweaking to set it... »
Windows 8, 10, 2012 Server TCP/IP Tweaksby Philip (28 comments)
The Windows 8 TCP/IP implementation shares many traits with earlier Windows versions, however, there are some subtle differences, new syntax for applying tweaks, and some new settings. Windows 8 generally works well by default for many broadband connections, yet there is always some room for improvement and we will try to cover all relevant settings and their effect on your connection in detail below.To run some of the outlined commands, you will need to use an administrator account. With... »
Gaming Tweaksby Philip (26 comments)
Online Gaming can often benefit from some fine-tuning of Windows TCP/IP settings and the Network Adapter properties. This article is intended to supplement our general broadband tweaks and list only TCP/IP settings that are specific to online gaming and reducing network latency. Some of these settings are also mentioned in our general tweaking articles, however, the emphasis here is on latency rather than throughput, and we have complemented the tweaks with more gaming-specific recommendations... »
Windows Vista tcpip.sys connection limit patch for Event ID 4226by Philip (19 comments)
Microsoft enforces a limit on half-open TCP/IP connections that is hard-coded in tcpip.sys. The maximum simultaneous half-open (incomplete) outbound TCP connection attempts per second that the system can make is intended to limit the spread of malicious viruses and worms, as well as limit the possibility of launching a DDoS attack. However, it has proven to also limit some applications using many TCP connections, such as P2P and P2PTV programs.When the OS reaches the half-open connection limit,... »
|
|