Automate proxy changing on Windows
In a college or a workplace where you have to use a VPN via proxy or a proxy server to surf the internet? But when you come back home you need to disable the proxy again to use your home … Read More
In a college or a workplace where you have to use a VPN via proxy or a proxy server to surf the internet? But when you come back home you need to disable the proxy again to use your home … Read More
Net neutrality has been one of the biggest questions in the recent times as far as the United States is considered. If you are updated, US got its net neutrality rules approved by the Federal Communications Commission (FCC) which is … Read More
The faster and smaller USB port is here, which doesn’t only transfer data but charges your laptop and monitors, as well. The new USB connector is ready for the market and the announcement of the new MacBook has elevated its demand. The … Read More
By default, you are using the DNS Settings of your Internet Service Provider to surf the internet. What this means is that when you type in www.cyberblogindia.in(the hostname) your DNS server converts it to 184.168.47.225 (the IP Address). This is … Read More
HTTP/2 is the second version of Hypertext Transfer Protocol (HTTP), which is being developed by the Internet Engineering Task Force. After HTTP1.1, released in 1999, this would be the first new version. Now you must be wondering: Why should I … Read More
How do you feel about someone accessing your Facebook account without asking you for your password? Well, It is possible. Most recently through a Facebook post by Paavo Siljamäki, director at the record label Anjunabeats, a new kind of spur … Read More
The Malware that spies on you while your mobile is Switched Off PowerHijack as found out by researchers at AVG is a new type of Android malware which is capable of spying on mobile users in the most unimaginable forms. … Read More
Cyber space is full of people trying to breach into some system, or to yank your personal stuff. As malware has come up a long way, so have these people who create them. So who are these bad guys? Why … Read More
The Cyber Space is not a tough job. Whatever happens are just tricks and some workarounds. Here is another one. You can actually use a pen drive as an authentication measure to open your laptop. Along with being secure, it’s … Read More