
Shortcuts
|
SpeedGuide.net - Get the most out of your internet connection
"Some of the Best Broadband Speed Tweaks on the Net"
We cover Broadband Internet connections, network security, wireless and system performance. A large section of SG focuses on
Cable Modems and DSL technology, stressing on improving TCP/IP performance over high speed/latency networks.
Some of the more popular SG network tools are listed below:
|
|
CISA warns TP-Link vulnerabilities exploited in active cyberattacks2025-09-08 14:54 EST by Daniela
The US Cybersecurity and Infrastructure Security Agency (CISA) has said two flaws in routers made by Chinese networking biz TP-Link are under active attack and need to be fixed – but there's another flaw being exploited as well.CISA warned that two flaws, CVE-2023-50224 and CVE-2025-9377, have been exploited in the wild by persons unknown. The first issue allows an attacker without... »
Google's Circle to Search can now translate text as you scroll2025-09-04 18:06 EST by Daniela
Google's Circle to Search is getting a new feature that will allow you to continuously translate text while scrolling through social media posts or even when switching to different apps. Announced on Thursday, the feature will start its rollout this week to select Samsung Galaxy devices, but will more than likely expand to more devices, with the Pixel 10 lineup a natural next stop.While you could... »
Google can keep Chrome and Android, judge rules in antitrust case2025-09-03 19:10 EST by Daniela
A court will not force Google to sell off its Chrome browser or Android, a federal judge said in a court filing on Tuesday. The decision serves as a significant win for the tech company, which has avoided the most extreme possible outcome from a landmark antitrust case that determined the company was operating an illegal online search monopoly.Although Google will not be forced to sell of its... »
OpenAI is adding parental controls to ChatGPT2025-09-02 12:03 EST by Daniela
OpenAI has promised to release parental controls for ChatGPT within the next month, the company said Tuesday. Once the controls are available, they'll allow parents to link their personal ChatGPT account with the accounts of their teenage children. From there, parents will be able to decide how ChatGPT responds to their kids, and disable select features, including memory and chat history.... »
FTC accuses Google of having 'partisan spam filters' for Gmail2025-09-01 17:47 EST by Daniela
Federal Trade Commission (FTC) Chair Andrew Ferguson warned Gmail, the world's largest email service, this week that it may face a federal investigation over allegations the company intentionally suppresses messages sent by Republicans."My understanding from recent reporting is that Gmail's spam filters routinely block messages from reaching consumers when those messages come from Republican... »
Windows 7, Vista, 2008 Tweaksby Philip (155 comments)
Windows Vista introduces a number of new features to the TCP/IP stack, including CTCP, and TCP Window Auto-Tuning. This new implementation works much better by default than previous Windows versions with broadband internet connections, and is able to adjust the RWIN value on the fly, depending on the BDP (bandwidth-delay product). This, however, introduces some problems with older routers and restricts the user from tweaking some of the TCP/IP parameters. Still, there is always some room for... »
Windows 10,11 TCP/IP Tweaksby Philip (50 comments)
The TCP/IP speed tweaks below work with Windows 8, 10, 2012/2019 Server. The Windows 8/10 TCP/IP implementation shares many traits with earlier Windows versions, however, there are many subtle differences and updates, new syntax for applying tweaks using PowerShell cmdlets, and some new settings. Windows 10 generally works well by default for many broadband connections, yet there is always some room for improvement and we will try to cover all relevant settings and their effect on your... »
How To Crack WEP and WPA Wireless Networksby Philip (95 comments)
Introduction With the popularity of wireless networks and mobile computing, an overall understanding of common security issues has become not only relevant, but very necessary for both home/SOHO users and IT professionals alike. This article is aimed at illustrating current security flaws in WEP/WPA/WPA2. Successfully cracking a wireless network assumes some basic familiarity with networking principles and terminology, as well as working with command-line tools. A basic familiarity... »
Gaming Tweaksby Philip (59 comments)
Online Gaming can often benefit from some fine-tuning of Windows TCP/IP settings and the Network Adapter properties. This article is intended to supplement our general broadband tweaks and list only TCP/IP settings that are specific to online gaming and reducing network latency. Some of these settings are also mentioned in our general tweaking articles, however, the emphasis here is on latency rather than throughput, and we have complemented the tweaks with more gaming-specific recommendations... »
How to set a Wireless Router as an Access Pointby Philip (236 comments)
I've often found it useful to get just the wireless functionality out of a WiFi router and reuse it as an access point. Wireless routers seem more common, and are often priced even lower than wireless access points. Adding an access point to a wired network already in place, or to one where the main NAT router is provided by the ISP is usually the easiest solution. However, introducing a second NAT router on the network is not a good idea, especially without some tweaking to set it up... »
Windows Vista tcpip.sys connection limit patch for Event ID 4226by Philip (19 comments)
Microsoft enforces a limit on half-open TCP/IP connections that is hard-coded in tcpip.sys. The maximum simultaneous half-open (incomplete) outbound TCP connection attempts per second that the system can make is intended to limit the spread of malicious viruses and worms, as well as limit the possibility of launching a DDoS attack. However, it has proven to also limit some applications using many TCP connections, such as P2P and P2PTV programs.When the OS reaches the half-open connection limit,... »
How to Stop Denial of Service (DoS) Attacksby Philip
Denial of Service (DoS) attacks are very common on the Internet these days, and they can make your online experience miserable. In some cases of Distributed Denial of Service Attacks (DDoS), they can bring down websites, or cripple entire networks in a matter of minutes, preventing connectivity for many customers. There are different types of DoS attacks, and we've tried to explain the most common types and ways to mitigate their effects to you or your network.Types of Denial of Service (DoS)... »
Network Adapter Optimizationby Philip (12 comments)
The information in this article is intended to improve understanding of all common and advanced network adapter settings under current Windows versions. We will also offer some general suggestions on setting up your LAN for the best possible network performance. Keep in mind that many of these settings can significantly affect performance and reliability in a good or bad way. Consider testing performance using some type of network analyzer or even a simple throughput test before and after... »
|
|