Skip to content
Home » How To » Page 3

How To

How to change a WIFI Name and Password? [Full Guide]

Wi-Fi Keeping an eye on our networks is key to see if they work and to guarantee our security. One essential task to perform is changing the Wi-Fi network’s name and password.

A router (or access point) plays a major role in our computer setup. However, we fail to pay close attention to it “as long as it works,” so we forget about it until we experience issues, drops, poor performance or, even worse, security breaches in our workplace or home’s virtual gateway .

One of these security tasks entails managing the Wi-Fi network’s username and password as soon as we set up a new device (either one that we bought or one provided by an operator) in our network. Although the situation has improved, there still are vendors that use less secure protocols and passwords that can be easily discovered. The passwords might even be found on a sticker on the router for third parties to see even if you do not want them to.

Moreover, it is recommended to change the above-mentioned data every once in a while as a regular maintenance task performed on our devices and networks. Also, as we were saying, it is important to verify if we are using the most secure encryption methods, as there are some (WEP) that can be hacked easily.

Read more

How to: Complete guide to remove malware/virus from a PC

malware If your PC is slower than usual, the OS and apps experience random errors, you cannot access some of your files and folders or the web browser struggles to get rid of weird ads, then perhaps some kind of malware has taken your PC hostage, preventing you from using the computer as usual and putting your personal and professional data at risk.

Virus, worms, Trojans and other malicious software are on the prowl for PCs and networks of every platform. The risks for hackers are minimal in contrast to the benefits. The age of mobility, automation, smart cars and the internet of things has greatly increased the number of connected devices and improved the way of storing and accessing information either with or without a PC.

Hackers have seen a great opportunity, as creating malware software and investing in attack methods are on the rise. Techniques are being constantly improved, causing spam, data theft, invasion of privacy and overall damage to companies and users.

Although prevention is the first and main line of defense, it is not always possible to stay safe from infections. Any user might have had bad experiences with malware even without being alerted by a security software.

If you fail to install a security solution on your PC (or if a virus or Trojan is preventing you from installing one) or if your antivirus has not detected any malware, then cleaning your PC can be difficult and take a long time depending on the threat. In order to face threats, we will show you how to do it in this guide. We hope you find it useful. The aim of this guide is removing malware from a Windows PC, although the overall process is usually used the same way in other systems.

Read more

You can hide your browsing data from your ISP. Here’s how.

With the recent anti-privacy bill replacing the Obama-era FCC rules, your ISP has been given absolute powers to track your online footprint and sell the information mined to the highest bidder.

For starters, Internet Service providers can monitor your online activity and sell that information to marketers or other third-party firms in the marketing business. These firms then scrutinize your data, evaluate it and use the findings to gain perceptions about your daily life.

For example, when you surf the web searching for “top ranked phones in 2018,” your ISP would regard top-ranked phones as your interest and direct ads related to that query. Nevertheless, the creepy feeling of having targeted ads follow you on the Internet is just one side of the problem. Once your ISP has this personal information on you, you have no control on how else it will use it apart from selling it to marketers.

Read more

Memory leak: what it is and how to solve it

Memory leaks cause a large quantity of the problems which we suffer when using our computer. They cause delays in loading programs, poor multi-tasking and a generally slow performance. If we have all of this happening with our computer and focus on the RAM, we will see that we are suffering a memory leak. What is a memory leak?

The term memory leak is used to describe a large range of communication errors between the programs and the operating system, which are the result of the programing of various programs, which has not been well-studied. These errors reduce the quantity of dynamic memory available.

Read More:
How to test a PC’s RAM for Problems
Everything you need to know about RAM

What a memory leak is

When we execute an application, it makes a request for resources which is known as a system call. In the case of the RAM, this call reserves a block of memory for the application to utilize while it is running. When you finish working with the application and close it, these blocks of memory are supposed to be freed up in order to be used by other programs.

memory

Read more

What an SSD controller is for and the job it does

When we read the specifications of a solid state storage unit, just as important as knowing the type of NAND memory that it uses inside to store our data, is to know what SSD controller the manufacturer has decided to install in it. But do we know what the controller is and how it is used in the function of the SSD?

Apart from the fact that the price of NAND memory is right now in the clouds, there is no doubt that solid state storage units are the greatest revolution that has been seen in decades within the area of consumer-market computer products and related to data storage on a personal level.

And we can affirm this in such a categorical manner not only because the latency in accessing the data that we store on these units is practically non-existent, but also because of the irrefutable improvements in speed that we have achieved because of them. This improvement in speed has allowed us to pass from the 100 or 200 MB/s that a mechanical hard drive could offer us (in the best of cases), to the 550 MB/s or 3 GB/s that SSD units are able to offer (depending on whether they use SATA or PCIe buses).

SSD

The SSD controller is in charge of organizing all of the data in the NAND memory cells

Given the high rate of transfer of files that a good SSD unit can reach, it’s important that its manufacturer incorporates a good SSD controller which takes charge of controlling where those files go and placing them in the memory directories that are free, carrying out an exhaustive control of the files. This function is basic in order to always know at every moment how much free space remains in our storage unit.

Read more

Guide: How Much VRAM Do I Need for Gaming? Is 2GB or 4GB VRAM Enough?

graphics card We will analyze how much memory a graphics card needs in order to play current and future titles with no problems. 4, 6, or 8 GB?

We will analyze how much memory a graphics card needs for both current and future games.

Buying a graphics card can be complicated, and the manufacturers often are partly to blame for using a nomenclature that can easily confuse those who are not initiated.

Which is most powerful, and NVIDIA 980 or 1050? You who read Omicrono frequently surely know that the first one is more powerful, but someone who doesn’t know anything about it will see that one has a number bigger than the other, and will come to the wrong conclusion. Believe me, it has happened more than once.

Memory, a way to attract illiterate buyers

graphics card With memory, something similar happens; it’s a number, so our brains have learned that bigger is better. So we go to the store looking for cards that have the largest amount of memory possible, making bad decisions that will cost us more money in the future.

Read more

A guide: Everything you need to know about RAM

RAMRAM is a vital component in any type of computer unit or system in a broad sense, and we can say without fear of error that its use depends to a large degree on the specific operating system that we use, as well as the applications that we use that system to run.

In spite of its importance, the truth is that RAM is a great unknown to many users, even for some who are above the basic level, who have not understood certain key aspects of the characteristics and functionality of this component.

This lack of understanding keeps giving rise to a lot of nonsense which we see from day to day, like for example recommendations to prioritize a higher quantity of memory over other types of components or even the recommendation to go for those with the highest clock frequency possible, period.

Because of this it tends to be very common to find unbalanced devices, which might have, for example, 16 GB of RAM but a low-level combination of CPU and GPU, and be used to copy games. This huge quantity of RAM acts like a decoy or hook in search of unwary buyers who are carried away by the great computer fiction that “it’s better because it has more memory.”

Read more

Explore Why the USB-C Port for MacBook Pro Enjoys Huge Popularity

It seems that Apple has been deliberating quite a lot before introducing the USB-C Hub for its MacBook Pro. Apple had, in fact, put a lot of thought into this paradigm shift for their MacBooks. What’s rare is that they have chosen to separate themselves from the proprietary technology standards, which is unusual but not unheard of in Apple’s history.

USB-C Port

However, stepping away from Lightning technology and MagSafe is certainly a wonderful thing for the users as more and more developers would be able to come up with technologies that would be compatible with various Apple products without the need to use exclusively Apple-specific gear.

The USB-C hub for MacBook Pro actually enhances the MacBook’s overall design. Apple is one tech company that has given major importance to design. Apple has not only focused on creating products with top technical specifications but it has also fascinated customers by coming up with aesthetically pleasing products. The implementation of the USB-C hub in MacBook is actually a continuation of Apple’s tradition of placing top priority to its minimalist design attitude, ahead of all other considerations.

Read more

Do you have cable in your house but your WiFi connection isn’t good? Mesh routers will change your life

routers With the arrival of optical fiber we have experienced an incredibly great increase in navigation speed, and now we can navigate the internet, download and share files in the blink of an eye. But this connection speed isn’t always the real connection speed that we experience. And since we live in a technological age that is more and more mobile, when we move away from the location of our WiFi router we see that we lose signal strength, and with it, speed. Therefore we need a method to extend the coverage of our internet connection.

The solutions that existed until now

Any large or multi-story house has this coverage problem: one single WiFi router, even a powerful one, is not sufficient to reach all points of the house with high-quality coverage. So the most classic solutions to increase the range of coverage until now was to use repeaters or PLC, each of which had its advantages but also its inconveniences.

WiFi repeaters, for example, require a configuration which sometimes is not simple for everyone, and also, when moving around the house with a laptop or mobile phone, the device has to keep changing the SSDi, or point of access. This means breaks or less smoothness in the connection. And the PLC, on its side, limits us to a concrete number of devices and depends on the quality of the electrical installation, which means that if we live in an old building it doesn’t tend to work correctly.

Read more

How to ANONYMOUSLY Watch and Download Instagram Stories?

Instagram is one of the most popular social networks worldwide. Instagram stories are for some people the most important part of Instagram. On the other hand, it’s a bit annoying that you can’t see those stories after 24 hours after posting, right?

But, now there is a possibility to download Instagram stories to your mobile phone or any other device or just watch them without the publisher’s knowledge.

Read more