Category Archives: Uncategorized

Is your ISP really to blame for your slow connection ?

Blaming your ISP for your slow connection is the easy way out , but in most cases its something else , either someone in the house is using up all the bandwidth by downloading torrents or its windows downloading updates. We are going to break down what are some common issues and fixes for slow internet speeds.

Give that old router a good old hard reboot

Image result for router reboot

Try rebooting your router by switching it on and off , check that your routers cabling is intact since bent cables can wreak havoc on your internet speed.

Test your speed

Image result for speedtest images

Use sites like Speedtest to check that you are getting what you pay for . For example if you are paying for 10mpbs / 2mbps and are getting lower than that its time to start looking into things .

Configure you WIFI

Image result for wifi analyzer

When every one sets up a wifi router the forget that it is prone to interference by other devices especially on the 2.4ghz range . What we can do is either change our signal to 5ghz which is much less prone to interference but less devices can use it or try changing the channel which our signal is broadcast . The best way to test which channels are used the most is by using android apps like WifiAnalyzer which can show you the most populated channels .

Enable QOS(Quality Of Service)

Image result for qos

Some routers have QOS function which monitors network traffic and prioritizes it to services which require more bandwidth such us VOIP which uses the UDP protocol. UDP does not use a handshake protocol there for its prone to unreliability when not enough bandwidth is allocated which can cause jitters and pixelation .

Turn off unnecessary applications

Image result for full taskbar

Most off the time internet speeds suffer when the user has lots of applications running that use up bandwidth on the network for example you don’t have to have Steam , Skype and Origin running all the time if you are not going to play a game or call someone . These applications will check constantly for updates and will download them automatically causing network speed degradation.

Consider using Opera

Image result for opera browser speed

Opera is a web browser with build in features to deal with slow internet connections by compressing web pages  so less data in downloaded and web pages can be displayed faster . Its easy to set up with just a click of a button.

Call your ISP

Image result for calling isp

If all else fails call your ISP and see if they can resolve the issue for you .  Sometimes it might be that the area you live in is not well covered by your ISP or there is a malfunction with one of the ISP service lines , calling to confirm this is not a bad idea.



Types of Web Hosting

Web hosting is a service that allows individuals or business to host a website on the internet to promote their service and reach a broader audience from around the world. This allows the user to find information about a service with a simple search on the web. Web hosting allows businesses to grow by promoting their services and making them available to people almost 24/7. To host a website we must first buy a domain, most hosting providers will assist the user in buying a domain name. Domain names should be short and easy to remember and be relevant to the content they will host. There are different types of hosting shared hosting , dedicated hosting and co-location hosting.

Web-hosting is not only limited to websites, it can be a website that also hosts a number of services like FTP, VPN , Email server, E – commerce website and even video hosting . Services like E-mail services are crucial for any business that need to be more professional in setting an image for itself for example a business is more reputable if it uses its own email provider than a free one like gmail ( than

Types of web hosting

Shared hosting is hosting on a server that is shared by multiple users at the same time pricing is much cheaper but lacks in resources and cannot function with a heavy load and also has limited storage space to build large websites with multiple services ,although there are multiple plan with more storage space and computing power they might still not be enough to host heavy usage websites.

Dedicated hosting is hosting on a dedicated server that is only used by one person and is easy to to expand and load with more services as it will have its own physical server . You have the entire web server to yourself and is recommended for High traffic and resource intensive websites and it offers more security options .

VPS hosting (Virtual private server) is an advanced variation of shared hosting , essential you are still sharing a physical server with other users but you website has its own partition on the web server taking up more CPU power and Ram. Websites using VPS hosting does not compete for resources with other websites , what that means is if there is a large amount of traffic into a VPS websites that shares the same physical server with you your bandwidth will not be affected .

Managed Word press hosting are specialized services that offer hosting for only worpress sites. They give an excellent hosting environment to the user with rich features and staff with lots of expertise to help the use fix any issues it might have with the website. But it the most expensive since you have a dedicated team of support for you website .

Samsung Galaxy S8 release date

Samsung’s new Galaxy S8 and Galaxy S8+ are scheduled to be released this Friday, April 21st, in South Korea and in a number of international markets including the United States.

Although the growing concern related to Samsung’s latest failure  Note 7, preorders of Samsung’s Galaxy S8 and Galaxy S8+ in South Korea have surpassed 1 million units.

Preordering became available on April 7th.


4D printing and it’s future uses


One of the emerging fields within 3D printing research is 4D printing.  4D printing refers to types of materials that can alter their physical shape in response to a stimulus.

While this type of material is fairly new, future iterations could be used to create various compact products. Packaging materials made out of this sort of polymer could be far lass space consuming. If manufacturers can alter the stiffness of the polymer, companies could make furniture that could be shipped in a compact form and then heated to expand into its intended shape.

There’s also a wide range of applications such as:

  • home appliances and products that can adapt to heat or moisture to improve comfort or add functionality.
  • Childcare products that can react to humidity or temperature, for example, or clothes and footwear that optimize their form and function by reacting to changes in the environment.
  • Bio-compatible components that can be implanted in the human body


Technologies and communication protocols.

There are many different types of internet technologies and protocols used today each has its advantages and disadvantages:

  • Asynchronous transfer mode (ATM) is a switching technique used by telecommunication networks that uses asynchronous  time-division multiplexing to encode information into little, altered measured cells..This is different from Ethernet , which use variable packet sizes for data or frames.

  • Dial-up Internet access is a form of Internet access that uses the facilities of the public switched telephone network (PSTN) to create connection between the ISP and the Computer by calling a telephone number. The user’s computer or router uses an attached modem to encode and decode information into and from audio frequency signals, respectively. Dial up can reach speeds up to 56 kbps.

  • Digital subscriber line is a family of technologies that are used to transmit digital data over telephone lines. These technologies can work simultaneously  through the same line there for one call take and receive call and also be connected to the internet.

What is virtualization in computing and how it works?

Large business use large servers to run multiple services for example FTP, Web server , Call center etc. This is where visualization comes into play by running multiple operating systems on one powerful server we can fully utilize all of its power and have to only maintain one physical server. With single operating system it own all the hard resources but by using visualization technology we can share hardware between virtual operating systems allowing us to run multiple operating systems on the same hardware.

In addition we can use visualization on multiple physical servers and use migration tools to move running visualized operating system between physical servers to perform maintenance while still maintaining server downtime to a minimum. Visualization allows us to run different operating systems at the same time. There are different times of visualizations type 1 and type 2 hypervisiors . Type 1 hyper visors like Microsoft’s Hyper-v , Vmware , Citrix Xenserver and KVM run virtual operating systems directly of the hardware , this means that the virtual machines can utilize more resources than using a type 2 hyper visor. Type 2 hyper visors are already installed operating systems like windows server or Ubuntu server that first load the Virtual machine on the host os and then on the hardware. The hardware has to run the host os and the virtual machines there for it uses more resources .

When running a virtual machine the guest os does not know that it is running in a virtual space and can fully function as it would if it was running as a host os on a physical hardware. One of the best Visualization solutions would be Citrix as it offers an open source solution with enough flexibility and documentation to meet most companies needs in terms of visualization. It is also the cheapest solution as it is free and since it is a Type 1 hyper visor it can run guest operating systems directly from the hardware so the operating systems can work at there full potential. Citrix Xen server only takes about 10 minutes to install and allows IT staff to convert existing virtual or physical machines of previous installations to the newly installed server. It allows for scheduled VM snapshots that can be organized for achieving and use for disaster recovery.

Network Security Risks you are not taking into account

Even with a very secure network internal attacks are the most effective and hardest to prevent . Some of these are :
USB thumb drives : a malicious user can infect a usb thumb drive with a virus that can spread to all the computers on the network but also allow him to use the infected computer as a host for external attacks . In addition usb drives can be used to run malicious scripts that dump the users login information and stored on the drive for later use without the user knowing.
Laptops : Laptops are small and easy to move around and most have an ethernet port allowing it to connect to the network . Users can use laptops to either launch malicious attacks within the network . Laptop should not be used to store sensitive data like salary information, medical records, home addresses, phone numbers and Social Security numbers are just a few obvious examples . Since in many instances these laptops have gone “missing” and without a proper encryption algorithm they are easy to extract data from.
Wireless access points : They are a heaven prone to attacks but offer an easy way to connect multiple devices to the network . Without proper security and encryption protocols in place they can be exploited by creating fake Accesses points that UN-suspecting users connect to exposing their data . Also they can be shutdown using multiple de authentication packets overloading the access point and kicking all devices off the network .
Email : Email is frequently used within businesses to send and receive information from one person to an other. However ti can be misused is such a way that confidential data is forwarded to external targets. Furthermore emails can carry infected files and many users will open the files without knowing and infecting their computer and the whole network . One of these viruses is the infamous ransomware virus that encrypt the users data and demands a large sum of money so they data will be unlocked.

Make your own WIFI Jammer







Creating your own WiFi jammer has never been easier! Using a small little chip call NodeMCU we can create a WiFi jammer in just 5 minutes. First you”ll need to buy a NodeMcu with the ESP 8266 which can be purchased at here .

Then we need to install  the Arduino  software from here

  1. Install Arduino and open it.
  2. Go to File > Preferences
  3. Add
  4. to the Additional Boards Manager URLs.
  5.  Go to Tools > Board > Boards Manager
  6.  Type in esp8266
  7. Select version 2.0.0 and click on Install (must be version 2.0.0)
  8. Go to File > Preferences
  9. Open the folder path under More preferences can be edited directly in the file
  10. Go to packages > esp8266 > hardware > esp8266 > 2.0.0 > tools > sdk > include
  11. Open user_interface.h file with your favourite text editor or just wordpad.
  12. Scroll down and before #endif add following lines: if you cant see correct copy it from the txt file included in the project files

typedef void (**freedom_outside_cb__t)(uint8 status);
int wifi_register_send_pkt_freedom_cb(freedom_outside_cb_t cb); void wifi_unregister_send_pkt_freedom__cb(void); int wifi_send_pkt_freedom(uint8 **buf, int len, bool sys_seq);

13.Download project files from here (Credit goes to the orginal creator spacehuhn)

14. Open Wifi Jammer > esp8266_deauther > esp8266_deauther.ino in Arduino

15. Select your ESP8266 board at Tools > Board. I used NodeMCU 0.9 but you can try NodeMCU 1.0 or Generic ESP8266 Module

16. Select your programmer at Tools > Programmer > ArduinoISP

17. Select the right port no at Tools > Port If no port shows up you may have to reinstall the drivers.


Your Wifi Jammer is now ready! Now just connect to it using your Phone or Computer and you are ready to go !