November-2017

Home » Posts tagged "How to" (paged 2)
Posted November 26 2017 By admin

Windows Mobile is a family of operating systems that was created by Microsoft for smartphones and Pocket PC’s. They were first introduced into the market back in 2000 and were called Windows CE. It was renamed to Windows Mobile in 2003. In this tutorial we will be showing you how to manually set...
Posted November 26 2017 By admin

  HP WebOS is the operating system used in Hewlett-Packard or HP touchpads. The HP touchpad was originally launched back in 2011. Even though it faced a massive competition against Apple’s iPad, yet many users preferred it over the iPad due to a lot of reasons including price and durability. S...
Posted November 25 2017 By admin

There are 2 ways to secure your internet connection with a virtual private network or VPN service. The first way is by downloading the VPN application with multiple security protocols built in it. The second way is to manually configure the VPN connection directly into your operating system. Layer...
Posted November 25 2017 By admin

Point-to-Point Tunneling Protocol or PPTP is an internet security protocol used by virtual private networks or VPN services to secure the connection established between their users and their servers. In this tutorial we will be showing you, step-by-step, how to manually configure a VPN’s PPTP co...
Posted November 25 2017 By admin

Layer 2 Tunneling Protocol or L2TP is a security protocol used by VPN providers among multiple other security protocols. However, L2TP on its own is not very secure. This is why it is usually acquainted with Internet Protocol Security or IPSec. In this tutorial we will show you how to manually con...
Posted November 24 2017 By admin

Point-to-Point Tunneling Protocol or PPTP is the most commonly used security protocol by VPN providers to secure their connections between the user and the VPN server. Even though PPTP is not considered the most secure protocol compared to the other protocols used, it is still preferred by some us...
Posted November 24 2017 By admin

Secure Socket Tunneling Protocol or SSTP is one of the multiple security protocols used by virtual private networks or VPNs to secure the connection between their users and servers. In this tutorial we will show you how to manually configure a VPN’s SSTP connection on your Windows Vista operatin...
Posted November 23 2017 By admin

Android is the the most popular and most reliable operating system for smartphones today. It was developed by Google back in 2003 and so far released 8 generations starting from the first generation which was known as the Android Gingerbread all the way to the latest Android Oreo which was release...
Posted November 23 2017 By admin

Android Nougat is the 7th generation of the extremely popular Android operating system which is used in countless smartphones and other devices such as smart TV’s and TV boxes. Since we are talking about smartphones in particular, most of our usage of it is related to the internet. Recently the ...
Posted November 22 2017 By admin

G Data is a Germany-based company that was founded in 1985 and is considered the first company to develop antivirus and firewall software. G Data has been developing security software not only for itself but for other companies such as Bitdefender. It has been known for its powerful security softw...