Google DNS: 8.8.8.8 and 8.8.4.4. Benefits and how to use

What is Google DNS

Google Public DNS represents two IP addresses for IPv4 – 8.8.8.8 and 8.8.4.4. 8.8.8.8 is the primary DNS, 8.8.4.4 is the secondary one. Google DNS service is free to use and can be used by anyone who has access to the Internet. You can use Google DNS IP instead of your ISP’s DNS servers to improve the resolve time and provide security.  Continue reading

What is UPnP? How to disable UPnP on router

What is UPnP

UPnP (stands for Universal Plug and Play) is a set of network protocols. UPnP is designed to automatically configure network devices. Simply put UPnP automatically forwards a port if the connection was initiated from the local network. It trusts the LAN outgoing requests by default.  Continue reading

How to Secure Your Wireless Router

secure wireless router

Nowadays almost in all apartments there is at least one wireless router or modem. You need a router if you have at least one laptop to be able to connect to the Internet without using a wire (patch-cord). You also need one if you own a modern phone like iPhone or Android-based device to use your home ISP and not to waste your mobile data in vain. How many networks does your laptop or smartphone detect when you are at home? In most cases you can see at least three Wi-Fi names belonging to your nearest neighbors except the SSID of your own router.

So what about security? Many people believe that setting up a strong wireless security key for Wi-Fi access means a total security for the router in whole. It’s a big fallacy. Even if your “WiFi password” is hard-to-guess, someone can exploit a vulnerability in your current security mode or features like WPS to gain access to the wireless network, then – to settings page of your router and few minutes later – to your PC, files, e-mails, credit cards credentials and banking account. In this article read our tips about how to secure your wireless router, access point or wireless modem and prevent hackers from accessing your devices and stealing your data. Continue reading