|

Shortcuts
|
SpeedGuide.net - Get the most out of your internet connection
|
We cover Broadband Internet connections, network security and system performance. A large section of SG focuses on
Cable Modems and DSL technology, stressing on improving TCP/IP performance over high speed/latency networks.
Some of the more popular SG network tools are listed below:
|
|
|
Apple sues Qualcomm over unfair licensing terms2017-01-23 01:24 EST by Daniela
Apple Inc has filed a $1 billion lawsuit against chip supplier Qualcomm Inc, for "royalties that they had nothing to do with."The suit, filed Friday in federal district court in the Southern District of California, claims that Qualcomm leveraged its monopoly position as a manufacturer of baseband chips, a critical component used in cellphones, to seek "onerous, unreasonable and costly" terms for... »
Samsung says irregular batteries caused Galaxy Note 7 fires2017-01-20 16:03 EST by Daniela
Samsung is expected to announce the results of its investigation into the exploding Galaxy Note7s in a news conference Monday in Seoul. However, a report by The Wall Street Journal has some information about what the company has discovered. Samsung has reportedly concluded that "irregularly sized" batteries are primarily to blame for the issue, which resulted in a massive global recall. The... »
Newly-discovered Mac malware works also on Linux2017-01-19 07:57 EST by Daniela
Antivirus vendor Malwarebytes has discovered a new Mac malware, called "Fruitfly," which can also be used against Linux systems. Malwarebytes identifies the code as "OSX.Backdoor.Quimitchin." It has been discovered after an IT administrator detected unusual traffic flowing out of a computer based on Apple's Mac OS X operating system.The malware uses antiquated code to help it run undetected on... »
Microsoft patent hints at foldable Surface Phone2017-01-18 04:49 EST by Daniela
Recently discovered patent filings have revealed that Microsoft is experimenting with a foldable mobile device that morphs a phone into a tablet.Diagrams included in the filing show two- and three-screened smartphones that fold in equal parts, changing between phone, tablet, and what we'll call "protected" mode. The two-screened phone can also be positioned in tent mode like most Windows... »
MulteFire Alliance Completes Release 1.0 Specification2017-01-17 09:42 EST by Daniela
The MulteFire Alliance, an independent, diverse and international member-driven consortium defining and promoting MulteFire, today announced the completion of its Release 1.0 specification, a key milestone in bringing MulteFire technology to market. Release 1.0, based on 3GPP Releases 13 and 14, defines LTE to operate in unlicensed and shared spectrum, while ensuring fair sharing of spectrum with... »
Windows 7, Vista, 2008 Tweaksby Philip (153 comments)
Windows Vista introduces a number of new features to the TCP/IP stack, including CTCP, and TCP Window Auto-Tuning. This new implementation works much better by default than previous Windows versions with broadband internet connections, and is able to adjust the RWIN value on the fly, depending on the BDP (bandwidth-delay product). This, however, introduces some problems with older routers and restricts the user from tweaking some of the TCP/IP parameters. Still, there is always some room for... »
How To Crack WEP and WPA Wireless Networksby Philip (93 comments)
Introduction With the popularity of wireless networks and mobile computing, an overall understanding of common security issues has become not only relevant, but very necessary for both home/SOHO users and IT professionals alike. This article is aimed at illustrating current security flaws in WEP/WPA/WPA2. Successfully cracking a wireless network assumes some basic familiarity with networking principles and terminology, as well as working with command-line tools. A basic familiarity... »
How to set a Wireless Router as an Access Pointby Philip (223 comments)
I've often found it useful to get just the wireless functionality out of a WiFi router and reuse it as an access point. Wireless routers seem more common, and are often priced even lower than wireless access points. Adding an access point to a wired network already in place, or to one where the main NAT router is provided by the ISP is usually the easiest solution. However, introducing a second NAT router on the network is not a good idea, especially without some tweaking to set it... »
Windows 8, 10, 2012 Server TCP/IP Tweaksby Philip (26 comments)
The Windows 8 TCP/IP implementation shares many traits with earlier Windows versions, however, there are some subtle differences, new syntax for applying tweaks, and some new settings. Windows 8 generally works well by default for many broadband connections, yet there is always some room for improvement and we will try to cover all relevant settings and their effect on your connection in detail below.To run some of the outlined commands, you will need to use an administrator account. With... »
Gaming Tweaksby Philip (25 comments)
Online Gaming can often benefit from some fine-tuning of Windows TCP/IP settings and the Network Adapter properties. This article is intended to supplement our general broadband tweaks and list only TCP/IP settings that are specific to online gaming and reducing network latency. Some of these settings are also mentioned in our general tweaking articles, however, the emphasis here is on latency rather than throughput, and we have complemented the tweaks with more gaming-specific recommendations... »
Windows Vista tcpip.sys connection limit patch for Event ID 4226by Philip (19 comments)
Microsoft enforces a limit on half-open TCP/IP connections that is hard-coded in tcpip.sys. The maximum simultaneous half-open (incomplete) outbound TCP connection attempts per second that the system can make is intended to limit the spread of malicious viruses and worms, as well as limit the possibility of launching a DDoS attack. However, it has proven to also limit some applications using many TCP connections, such as P2P and P2PTV programs.When the OS reaches the half-open connection limit,... »
|
|