Guides
Home » Archive by category "How to" (paged 6)
Posted November 17 2017 By admin
Avira is a Germany based company that specializes in online security, antivirus, and firewall software. Avira firewall is considered one of the very reliable security software, however when it comes to online security or VPNs, some users prefer other software that are more specialized in online security only. If you try to use the Avira security or Avira firewall with a different VPN application, it might cause a conflict due to that the Avira firewall will automatically ...
Posted November 17 2017 By admin
ZoneAlarm is a California based company that specializes in computer security software such as antiviruses and firewalls. It was originally developed by Zone Labs which, in 2004, was acquired by Check Point. ZoneAlarm has been known to provide both corporate and public consumers with high end firewalls. However, to those concerned more with online security or in other words, using a virtual private network or VPN service is more reliable. The problem is that sometimes using...
Posted November 17 2017 By admin
In this tutorial, we will show you how to easily allow your VPN connection through ESET Firewall. Scroll down for more details.
How to Allow VPN through ESET Firewall (Easy Method)
Follow the steps below in order to stop ESET Antivirus from blocking your VPN connection on your Windows system: 1- Right-click to open the ESET icon which is located at the bottom right corner of the system tray. Windows 7 users may need to click on the small triangle in order to be able ...
Posted November 17 2017 By admin
How to Allow VPN through Bitdefender Firewall (1st Method)
Follow these steps in order to stop Bitdefender Antivirus from blocking your VPN connection on your Windows system: 1- Hover to the system tray and right-click on the Bitdefender icon to open the main window. 2- From the left panel, choose “Firewall”. 3- From the “Firewall” window, click on the “Programs” tab. 4- Next, choose “Add Rule” and select the radio button “Apply rule to”, an...
Posted November 15 2017 By admin
How to Allow VPN through AVAST Firewall (1st Method)
Follow these steps in order to prevent AVAST Antivirus from blocking your VPN connection on your Windows system: 1- Navigate to your system tray and right-click on the AVAST icon in order to open the AVAST interface. 2- Go to “Protection”, and then go to “Firewall”. 3- At the bottom of the screen, you will find “Application Settings”, click on it. 4- Next, click on “New application rule”, and ...
Posted November 11 2017 By admin
How to Allow VPN through Mcafee Firewall (1st Method)
Follow these steps in order to stop Mcafee from blocking your VPN connection on Windows: 1- Navigate to the notification bar, and then right-click on Mcafee icon. 2- Select “Advanced Menu” to open the Mcafee Security Centre window. 3- From the Mcafee Security Centre window, head over to the left side panel, and then click on "Configure" followed by a click on "Internet & Network". 4- Next, click on t...
Posted November 08 2017 By admin
Even though Blackberry phones have recently lost their popularity among smartphones, yet they are still considered one of the most practical and reliable devices for both personal and professional use. This is why it is important for Blackberry users all over the world to secure their online connections with a reliable Virtual Private Network or VPN service. There are 2 ways to enjoy the online security, online privacy, and online freedom of the VPN service on your device...
Posted November 04 2017 By admin
Getting Things Ready & Installing WinGate on Windows 10
Follow the steps below in order to successfully install the WinGate proxy server package on your Windows 10 server: 1- Use RDP using your admin credentials or admin permission to sign in to your Windows server in order to be able to download WinGate proxy server package (http://www.wingate.com/download/wingate/download.php). 2- You will then be prompted to save the “.exe package” to the server location ...
Posted November 03 2017 By admin
Virtual Private Networks or VPN services use multiple security protocols to secure the online connection between their users and the VPN server. One of the most popular protocols used is the Point-To-Point-Tunneling-Protocol or PPTP. Even though it is not considered the most secure protocol available, yet it is one of the most popularly used protocols. This is why it is not highly recommended among other protocols yet some users prefer it and in some cases it is more reliab...
Posted November 03 2017 By admin
In this tutorial, we will show you how to easily chain Socks5 proxies Using SRelay on Ubuntu 16. Scroll down for more details.
Getting Things Ready
Before setting up a Socks5 proxy chain, you need to make sure that there are multiple proxies and that all proxies are working properly because if one proxy is not functioning, the whole proxy chain will not work and will collapse. In addition, if the connection at one proxy is lost, the whole connection to the remote server...