Entradas Windows

Control copy tasks in Windows with this software

The problem that users encounter when using Microsoft’s proprietary solution that is included in operating systems is very limited functionality. In other words, the user cannot set copy priorities nor can they consult an error log to check for possible errors during the process. These two aspects are a clear example of the existing limitations if we use this option.

There are many options on the market to improve the file copying process. Total Copier is one of those available for Redmond operating systems, with the advantage that it is a totally free solution.

Features of the Total Copier tool

Regarding the software installation process, it must be said that it does not pose any kind of problem for the user. A SmartScreen warning window may appear on some computers. The application itself is the one in charge of replacing the Windows application in this process.

When the user begins a copying process, the window of this application will appear directly, which will first list the files or folders to be moved.

Once the files to be transferred are counted, the user has several options at their fingertips. It is for these reasons that it stands out with respect to the existing version by default in Windows operating systems.

In addition to knowing the list of remaining files at all times, you can pause the transfer, check the errors that have occurred.

Download the application for Windows

The list of files generated is fully editable in terms of order, being able to modify the order assigned by the program, done automatically. It is also possible to add new files to the existing queue, without having to “create” a new copy process, an operation corresponding to the Microsoft solution.

It offers some very interesting options related to accidental interruption of copying. That is, if we are in a process and the computer spontaneously restarts or the user “kills” the Total Copier process, on the next restart of the computer the application will start and resume the task of copying the file in that moment was subject to copying.

The function that allows you to shut down, suspend or hibernate the Windows computer once the process is complete could not be missing.

Recommended software

If you want to have some control over the file copying processes on your Windows computer, without a doubt, it is a highly recommended software, especially due to the large number of options available. In addition to fulfilling the expected function, it offers many others that will make copying tasks easier for users.

Redes cable Tutoriales

How to stop or start the DNS client in Windows with these alternatives

How to stop or start the DNS service in Windows

Sometimes it may happen that the Windows DNS service does not work properly and causes problems. We can use different methods to start it again. One of the easiest options is through the Windows Services sub-program.

To start or stop the DNS service in Windows, the first thing we have to do is press the key combination Windows + R. Later we have to run services.msc. Once we are inside we have to look for a DNS Client.

When we are here we simply have to click with the second button of the mouse on Client DNS and we will see the option of Pause or Start. We can also enter Properties and configure it automatically. So we can both start the DNS service in case it was paused, and stop it if it is started.

Start or stop DNS unavailable

However, on certain devices this option is not available. We can find that at this step, as we can see in the image above, that option appears in gray, without being able to mark it. We cannot therefore start or stop the DNS service in Windows in this way that we have explained.

Luckily we have other alternatives that we are going to show. Other methods with which we will be able to start or stop the DNS service in Windows 10, which is today the most used operating system among desktop users. This means that it can come in handy for many users who at some point encounter this type of problem.

Use the Windows registry

An alternative option that we can find is to use the Windows’ register. To do this we have to go to the Start menu, write Registry Editor and run it in administrator mode.

Inside HKEY_LOCAL_MACHINE we have to go to System, CurrentControlSet, Services and Dnscache. When we are here we have to right-click on Start and click Modify.

Start DNS service from Windows Registry

We will see that by default the value that is assigned is 2. What we are going to do is put the value 4 and we click OK. With this we achieve that the service starts automatically. If we mark 3 we will have to start it manually.

Now we can follow the initial steps that we mentioned to start or pause the DNS service without these options appearing in gray.

System configuration

We also have the alternative of using the system settings. This time we have to press the key combination Windows + R and execute the command MSConfig. A new window will automatically open.

In this window we have to click on Services, which is the third option. Later we look for DNS client. To tell us that it is running, the box must be checked. If we uncheck it, the service stops.

DNS from System Settings

Symbol of the system

A third and final option we have is the Command Prompt. To do this we have to go to Start again, we write Symbol of the system and we run it in administrator mode. From here we will be able to make different changes to the system.

With the net stop dnscache command we stop the service if it was already started. Instead the command net start dns cache starts it.

In short, these three options that we have mentioned allow you to start or stop the DNS service in Windows. Alternatives for when we cannot through the initial method we mentioned, something that is not available on all devices.

Lanzamientos Noticias

features and options of this SD-WAN router

Hardware features

This SD-WAN router from the manufacturer QNAP incorporates a processor Qualcomm IPQ8072A Hawkeye 2, has a total of four cores at a speed of 2.2GHz and with a 64-bit architecture, therefore, we are facing the top-of-the-range CPU for this type of routers. As if this were not enough, we have 1GB of RAM with 4GB of internal memory to store the operating system and also all the records and settings.

As for wireless features, we have simultaneous dual band with AX3600. In the 2.4GHz band we have a total of four internal antennas with 4.5dBi gain in MU-MIMO 4T4R configuration, therefore, we can achieve up to 1148Mbps. In the 5GHz band we have a total of four internal antennas with 5.2dBi gain in MU-MIMO 4T4R configuration, therefore, we can achieve a speed of up to 2.402Mbps, however, a very interesting aspect is that it will allow us to configure this frequency band in MU-MIMO 2T2R and use 160MHz channel width. This last mode is ideal for mobile devices such as smartphones or tablets where we always have a maximum of 2 internal antennas. Thanks to the incorporation of the latest Wi-Fi 6 technology, we will have Beamforming, MU-MIMO, OFDMA and all the improvements incorporated in the new standard.

Regarding the wired characteristics, we have two 10GBASE-T Multigigabit ports and a total of four Gigabit Ethernet ports. Taking into account that we are facing SD-WAN, any of these ports can function as WAN or LAN, therefore, depending on our needs, we will have one or more WANs, and one or more LAN ports.

Finally, we have two USB 3.2 Gen 1 ports (at 5Gbps) To share files on the local network and the Internet, this will allow us a large number of additional possibilities to make the most of your hardware.

Software features

The highlight of this new QHora-301W router is its software. We are facing a router with SD-WAN, therefore, in addition to offering us complete connectivity, we will have the possibility of using remote multisite VPN servers / clients, in addition, we can create a meshed multisite VPN topology and routed by the best path, this it will allow a highly efficient, flexible and scalable network for multiple sites. Thanks to QuWAN technology (QNAP SD-WAN technology), we will be able to create different paths between the different locations easily and quickly.

Other configurations that we can make are the possibility of creating a virtual access point with business security, configuring a total of 6 SSIDs configured in different VLANs to correctly segment the network. Other security options are that we will have a powerful SPI firewall, we will also have a deep packet inspection system and even an L7 firewall to guarantee the security of the IPsec VPN tunnels.

Thanks to QNAP software, we will be able to create a robust and scalable network, and all this without the need to enter the console, make complicated configurations or waste time due to incompatibility problems. By putting one of these QHora-301Ws in each seat, the setup is really simple.

You can see the following presentation video of the QNAP QHora-301W router where you can see all the details:

We recommend you visit the QNAP QHora-301W official website where you will find all the details of this team.

Redes cable Tutoriales

Create network diagrams online for free

We are going to start by explaining what the Visual Paradigm Network Diagram software can bring us. Next, we will see an example so that you get the basic notions

What can we do with Visual Paradigm Network Diagram

Visual Paradigm Network Diagram is free software with network diagram support. In addition, it supports many other types of diagrams such as UML, organization chart, floor plan, wireframe, family tree, ERD and more. Its main function is to allow us to make network diagrams through a simple and intuitive editor. Here is an example of what can be achieved with this software.

An important characteristic is that it is a on-line software, so it will not require an installation or take up space on your hard drive. All you need to use is a browser and an Internet connection. In addition to being gratuitous another positive thing is that no advertising.

Other interesting features are that there is no limited period of access, and we have no limitations in terms of number of diagrams, number of shapes and more. In addition, it has powerful editing tools including a drag-and-drop diagram editor.

Lastly, it has support for teamwork with cloud-based workspace and project and member management. Although, it does not have all the functions that I have mentioned, it does have most. In the list of prices You can see the difference between the free version and the paid version.

How to start using the program and first steps

We previously commented that it was an online software, so we will use it using our internet browser. If we want to use the program we can do it in two ways. One would be to go to your Web and click on the button Make a Network Diagram that you have framed in red.

The other way to do it would be with this direct link. I put them both in case the developer changes the url of any of the options at some point. Once pressed, we go to the home screen of the program, where we will have to make a series of decisions before starting to work.

In the column on the left is where we select the type of project that we want to use. In this sense, it should be noted that it has a very wide variety, for example:

  • Circuit diagram.
  • Organization table.
  • Decisions Tree.
  • Pert table.

Also if we click on the small box in red we can establish a filter so that it looks for a project for us. Then above we have these sections:

  1. New: we can choose between the projects that are selected in the left column or create a blank one.
  2. Open: open existing diagrams.
  3. Import: allows us to import Visio, and Gliffy files.
  4. Favorites: used to add the diagrams that we use most frequently.
  5. View: we can choose and see in the left column between diagrams and toolkit.

In RedesZone, as it is a website specialized in networks, we will choose such a project as an example. In this case, as the project was already selected by default Network Diagram in the left column, we don’t have to do anything there. The only thing you have to do to start is on the right side select Network Diagram.

So let’s start creating a network diagram from scratch. The other options offer some predefined networks that can sometimes come in handy as a starting point.

So you can create a network diagram and online for free

Now it is time to start a new project of our home or office network.

Above marked in red you have the main options. We are going to briefly comment on what the most important ones are for.

  • File– To open files from Google Drive, a device, or the browser. We can also save the files that we create, import and export them. Login to your Visual Paradigm Online workspace is required for which we need to have an account.
  • Select– Select all shapes, connections, and more at once.
  • View: to choose the way of displaying our workspace. For example, we can select “Grid” and the area where our network devices are located will change from having a white background to one formed by squares.
  • Help: with keyboard shortcuts that we can use and support.

I have left apart from the top menu, the section «Additional features«, There for example if we are going to Language we can put it in spanish. As a curiosity, comment that it also admits Galician and Basque.

Once selected to appear in Spanish, you have to press F5 to refresh and load the new values. Here you can see the menus in Spanish and we will proceed to analyze what the column on the left offers us.

In section Network we have the icons of teams and people that we can use to create our network team. Its use mechanics are very simple, with a simple click or dragging the icon to the work screen on the right. Then in general With the same mechanics of use, we can put geometric shapes, text, connecting lines.

Next, under General, we have arrows in case we want to insert one.

The last thing we have to comment on on the left side is the search bar that we have above and that has the magnifying glass symbol. There, for example, we can use it to add an icon that we do not have below. For example, imagine that we need the WiFi one, we write it, we give enter, it appears below and with one click we already have it in the work area.

Network example using Visual Paradigm software

Now it’s time to create our little network with the Visual Paradigm Network Diagram. We are going to start by explaining very briefly the buttons above on the right side where we will build our network.

Here with the arrows that we have to the left and to the right we can go back and advance in the actions that we have done. Other things we can do:

  • Put fill color, line color, shadow and format copy.
  • Establish connecting lines and reference points.

If you move the cursor gently over each button, comment what it is for. Now we will start to create our network, from the left we will choose a router and a PC by clicking on them. We will also insert text to better identify the devices. To put the text we can do it under the icons in general or in the top menu Insert Text.

Then we will get a result like the following:

The next step is to click on the router to establish a connection line between the WiFi router and Luis’s PC. There we will see four large arrows where we can choose the one that best suits us. The one that I have used to do the tutorial is the one that I indicate with another arrow.

Then, when we link with the second team, we can choose the type of connection we want to create, in this case we have set bidirectional.

This would be the final result of the connection:

Now I am going to create an example with a network with 3 PCs, a WiFi router, a smartphone and a printer.

As you can see, Visual Paradigm Network Diagram allows us to create our network diagrams. Then the complexity of it will depend on whether you put more equipment on your network.

Tutoriales Tutoriales de Internet

Differences of these two networks to browse anonymously

Browse anonymously, something highly sought after

Many users are looking for a way to improve privacy and browse anonymously. Thus, they prevent your personal data from being collected by third parties to be included in spam campaigns or receive targeted advertising, for example.

There are certain tools and services that can help preserve anonymity on the web. It does not matter if we browse from mobile devices or desktop computers, we can always suffer problems that compromise our privacy.

Among the options we have to improve privacy we can name the use of Tor and I2P. They are services that allow you to offer greater anonymity, although each one has its advantages and differences compared to the other. We will explain which are the main ones.

Tor vs I2P, two services to gain anonymity

In both cases we will gain anonymity In the net. They will allow us to browse in a more private way, without exposing our data. They are very useful options when we want to prevent our data from being recorded. They also allow users to access the Dark Web.

Advantages of Tor over I2P

First of all we have the option of Tor. This is a project that aims to create a communications network so as not to reveal the identity of the information that is exchanged. Therefore, users remain anonymous at all times. This also includes hiding the IP address.

They are based on free software. The operation consists of sending those messages through multiple links, which is considered as if they were layers of onion that are routed through. In this way they manage to hide the original data.

We can say that it has different advantages if we compare it with I2P. These are some of the main ones:

  • More users: It is a much more popular service and therefore has more users. This means that there are much more information and tutorials to use it.
  • Better block DoS attacks: Due to being older and heavier, it has also developed a better optimization to block and prevent DoS attacks.
  • Client nodes use little bandwidth– If bandwidth is a problem for users, it should be noted that client nodes do not require much.
  • More efficient: Another advantage of Tor over I2P is that it is more efficient in terms of memory use.
  • More exit nodes: Tor is designed to optimize outbound traffic by having more nodes available.

Advantages of I2P over Tor

On the other hand we have the option of I2P. Its acronym comes from Invisible Internet Project (Invisible Internet Project). We can say that it is a variant, an alternative to the Tor network, but in which we find some interesting advantages:

  • Short-lived tunnels: One of the advantages is that I2P tunnels have a short life. This allows you to reduce the number of samples that an attacker can use to achieve an attack.
  • Greater compatibility: Another important advantage of using I2P is that it has greater compatibility with the different activities carried out on the Internet and the tools that we use.
  • Multiple packages or messages are sent: Unlike Tor where only one message is sent, multiple packets or messages are sent through I2P and they go through the different nodes.
  • One-way tunnels: the request and the response go different ways.
  • Greater customization: I2P also offers users more customization.

In short, as we have seen both I2P and Tor serve to gain anonymity on the network. Each of these options has its own particular advantages. The goal is always to maintain privacy correctly when we go to surf the Internet.

Redes cable Tutoriales

What is the NXDOMAIN error and how can we avoid it

What is DNS and how does it work

To understand what the NXDOMAIN error First of all we must remember what DNS is and how it works. We can say that DNS servers act as translators to allow us to surf the Internet without having to remember a large number of digits.

When entering a web page we usually go to the address bar of the browser and there we write the name, the address. For example we write We can do this thanks to DNS servers that translate that message that we write to the corresponding IP address. In this way we do not need to remember what that IP address is, but simply the name that we write.

DNS servers therefore function as intermediaries to be able to respond to requests what do we do. There are many DNS servers that we can use. There are free and paid ones. Some can even help us improve security, as they are configured to filter possible malicious pages and not send the content. Sometimes changing the servers of our Internet operator can help improve speed.

However, sometimes there may be problems in this type of service and fail when trying to surf the Internet. That’s where the NXDOMAIN bug comes in, which we’re going to talk about.

What is the NXDOMAIN error

When we try to enter a web page and we get an error message indicating NXDOMAIN, it means that the domain name could not be resolved. This logically means that we cannot navigate through that site we are trying to access.

The message that appears may vary slightly. For example in the Google Chrome browser the message that would appear would be DNS_PROBE_FINISHED_NXDOMAIN. This means that the page we are trying to enter does not load correctly.

Possible causes of the NXDOMAIN error

This error can occur for different causes. Sometimes it can be in our power to fix it, while in others it depends on the site server. Let’s see what the main causes:

  • DNS server is not working well
  • DNS client problem
  • The VPN is interfering
  • Installed security tools
  • Incorrect DNS settings
  • Browser problems

How to fix the NXDOMAIN error

Luckily we can take into account certain steps to be able to solve the NXDOMAIN error. This, as we have mentioned, could happen in any browser that we are using, so the advice that we are going to give is generic and we can apply it in any case.

We will not be able to solve some problems that cause this error on our part, which would be when they are present on the server side.

Change DNS

These types of problems can be caused by errors with the DNS servers that we are using. We have mentioned that we can use many different ones, both free and paid.

In the event that this type of message appears, we can try to opt for other public DNS than the ones we use. We can easily change them in Windows, through the network settings. To do this, we go to Configuration, Network and Internet, we enter Change adapter options and there we select the network that interests us, we click Properties and a window will open to change the IP address and DNS.

Change DNS to avoid NXDOMAIN problem

Avoid using the VPN

We have also seen that a cause of the NXDOMAIN error is that we are using a VPN and create conflict. We can choose to pause this tool momentarily and check if it really is about this problem or not.

In case we detect that it is indeed the VPN, we can either choose not to use it or switch to another service.

Check if any antivirus or firewall is interfering

It could also happen that the antivirus or firewall that we are using are causing problems. We already know that security tools are essential to avoid problems on the network, but they could also generate certain failures if there is a bad configuration.

Keep the browser running smoothly

Of course the browser should work correctly. You have to be careful if you are using badly configured extensions, for example. We must take a look at that everything that surrounds the browser works correctly and thus correct possible bugs that are generating this problem to resolve domain names correctly.

Restart the system

It is a basic solution but in many cases it can fix problems of this type. We must restart both our computer and the router itself. So we can fix bugs like this and similar ones.

Ultimately, these are some options we have to fix the problem when the NXDOMAIN error appears.

Seguridad Tutoriales

Malware on Facebook or WhatsApp: how they can sneak it

Social networks and messaging, used by cybercriminals

Both social networks Like the messaging programs They are widely used by private users and also by companies. We speak for example of platforms such as Facebook, Twitter or Instagram, as well as WhatsApp or Telegram, to name a few examples.

Now, the fact that they are so widely used services also makes hackers set your sights here. They use these types of tools to try to sneak malware onto users who are clueless or who do not have sufficient knowledge of computer security.

We must always be alert and not make mistakes when using these types of services and thus expose our security and privacy. As we will see, an attacker can use different types of strategies to achieve his goal. It must be taken into account that some types of attacks can be present both in social networks and in messaging applications.

How Malware Can Sneak Through Social Media

First of all, we are going to explain how social networks can use to spread malware to users. We are talking about popular and used services such as Facebook, Instagram or Twitter.

Fake bots or profiles

Undoubtedly one of the problems of social networks are bots or fake profiles. Cybercriminals use them to be able to send messages to real users. Sometimes they simply seek to send spam, but sometimes they go beyond simple annoying advertising and could use them to link to sites containing malware.

The problem of bots is mainly present in social networks like Facebook. They abound in those in which we have to accept contacts.

Fake News

Something similar can happen with Fake News. At first we can say that they are false articles, news that rather seek to misinform or easy click. They are very present in social networks and we can find them especially in some such as Facebook or Twitter.

The aim of hackers to sneak malware is for us to click on that so-called interesting news. Once we have entered the website, that is when our system can become infected.


Another widely used technique is Phishing. On the one hand, hackers use it to steal passwords, but they can also use it to deliver malicious software through different baits.

They usually send messages that may be interesting or apparently important to users. For example, some problem that there has been with the account or something that causes them the need to click.


Social networks have many accessories. They are improvements that allow us to carry out certain tasks in a better way. They are very present as third-party software. The problem is that sometimes we can come across plugins that are insecure, which could damage our privacy.

Fake apps

Finally, another way that cybercriminals use to sneak malware is to do use of fake apps. Hence always the importance of installing from official sources and avoiding third-party sites that are not guaranteed.

Instant messaging attacks

We can also suffer attempts to sneak malware through applications such as WhatsApp. We must be careful with any private conversation or group in which we are.

Attached files

Through instant messaging applications such as WhatsApp we can receive attachments. For example text documents. Those files may contain malware that, when downloaded, infects our systems.

Fake coupons

It is also very common to receive by WhatsApp coupons for offers or discounts to purchase a product. Sometimes these are baits that, beyond taking us to a misleading advertising page, could also infect our device and strain malware.

Malicious links

Undoubtedly another very frequent method are the malicious links. We can click on a link that comes to us through a group, for example, and it is actually a page maliciously configured to steal personal information or download malicious software.

Conversations with fake users to collect data

Similar to the bots we mentioned on social media, we can also come across conversations where there are fake users that only seek to collect personal data and be able to sneak malware. Whenever we encounter this problem, we must avoid offering data or accepting files that are sent to us.

Ultimately, these are some options that hackers have to try to sneak malware through social networks or instant messaging applications.

Banda Ancha Entradas

Should the internal wiring of a home be replaced to improve the internet connection?

Currently there are three types of connection in our country: fiber optic connections to the home, cable connections and xDSL connections that use copper as a means to reach the user. Taking these three types into account, a series of needs can be drawn for each type of connection, which in the case of cable and FTTH will be practically the same.

FTTH and cable installation

In the case of fiber optics, it is the operator himself who is in charge of placing the optical rosette and interconnecting the optical-electrical converter with it. In the case of cable, it is also the company itself that is responsible for installing the coaxial cable up to the subscriber’s home, which will be responsible for providing connectivity to the cable modem. This has an advantage as the subscriber chooses the location of the equipment.

Therefore, for this type of connection, the existing internal wiring should not be replaced. However, this would continue to be used to offer a telephone line to the home unless VoIP is contracted.

Installation of xDSL lines

Currently in our country existing connections ADSL2 + and VDSL2 that use the existing wiring in the home. This cabling consists of the Network Termination Point (known as PTR) and the telephone rosettes that are connected to the PTR to have connectivity. It can also exist splitter instead of PTR.

The rosettes give us mobility to be able to connect the xDSL router anywhere in the home but sometimes this can become a problem for the user since many times the noise conditions and attenuation in a rosette they are not optimal and the effective speed is much lower than that which exists in the PTR.

This may be caused because the copper cable is in poor condition, it passes close to electrical sources that generate interference, or the connectors found in the rosettes are in poor condition. Even the topology in which the rosettes are connected can have a negative influence.

This influences the appearance of much more noise on the line and also increases the attenuation of the xDSL signal.

I am an xDSL user, how can I detect this problem?

To detect the problem, you have to access the router’s web menu and locate the section where the attenuation and noise values ​​are found, where you can also find the synchronism of the line. Later, it will be necessary for the router to connect to the PTR and access the menu again to verify the values. In the event that these values ​​are the same or get very little worse (higher) it means that the interior installation is in good condition. Otherwise, and the difference in the interior rosettes is very large, this means that there are anomalies in the wiring.

What solutions are there?

The first option would be to replace the cabling that exists between the socket to which the xDSL router will be connected. This many times does not cause an appreciable improvement so the next option would be to change the topology in which the rosettes are connected (in the case that there are more). Many times, even the rosette itself or a phone in poor condition can cause the xDSL connection to be incorrect.

Another less elegant solution is to “pull” copper wire through the baseboards or junction boxes to where you want to locate the router. This cable would be connected to the PTR or the closest rosette to it for optimal performance. It is the least elegant solution but it is also the most economical, even in time.

Have you suffered problems with your broadband connection due to the installation of the house? Tell us

We leave you a comparison tutorial between Wi-Fi and cable.

Seguridad Tutoriales

Browsers and programs to maintain privacy on the web

Why you should maintain privacy on the Internet

It is very important that we maintain internet privacy. Today our data has great value on the net. They can be used by third parties to include us in spam campaigns, send targeted advertising or even sell them to others. All this can also put our security and the proper functioning of the devices at risk.

If we do not properly protect our privacy online, not only our data can be compromised, but even that of an entire company or company. They could also reach impersonate our identity and access our social networks or any account we have on the Internet.

All of this makes protecting privacy on the web essential. In this way, we will avoid such important matters as preventing identity theft or malware from entering our systems.

Browsers to use the Internet privately

The browser It is a fundamental part of our day to day on the Internet. It is the program that allows us to enter websites and access a large number of online services and platforms. We have a wide range of possibilities, but not all of them are going to protect our privacy equally. Although the most popular ones like Google Chrome or Mozilla Firefox also have different functions that improve privacy, we are going to show some specific ones.


One of the most popular and used browsers to browse privately is Tor. It is an open source project that among other things allows us to navigate the Deep Web.

But beyond that possibility, Tor also brings anonymity and privacy to users. All the information that we send through this browser travels in an encrypted form. The IP address, for example, is not exposed at any time. It is available for operating systems such as Windows, Linux, macOS or Android. We can go to your Web page and download it.

Epic Browser

Another browser within which we could consider safe and private is Epic Browser. It is based on Chromium and whenever we open a web page we do it in incognito mode. In this way, no data is stored on our device.

In addition, it must also be taken into account that Epic Browser uses a built-in VPN to further encrypt connections. Among other things, it keeps the user’s IP address hidden at all times.

SRWare Iron

It is also based on Chromium. SRWare Iron It is yet another alternative to surf the Internet with greater privacy. It is also known as simply Iron. The main mission of this browser is to eliminate all types of tracking that may affect the privacy of Internet users.

We already know that when browsing the Internet there are many trackers that can collect data on the use we make of the Internet, the pages we visit or the time we are on a specific site, for example. This browser avoids all that.


Brave It is one of the most popular browsers among the alternatives to those that are most used. It is a very interesting option to protect security and privacy at all times. It is open source and cross-platform.

This option also allows you to eliminate trackers that may collect information from users when browsing. We can download it from your Web page.


One last option that we want to show within private browsers is Iridium. It is based on the Chromium code, so it is very easy to use for those who are familiar with Chrome. It focuses on privacy and security, but also seeks to maintain a good speed.

It is therefore an interesting alternative for those who worry that their data is not exposed on the network and maintain security. In its Web we find all the information for download.

Tools to improve privacy on the Internet

Beyond the browser itself, there are also different tools that we can use in our day to day to make the Internet connection more reliable and better protect our personal data.

Browser extensions

We have shown some browsers based on privacy, but we can also use extensions for others such as Google Chrome or Mozilla Firefox. This type of accessories help us improve privacy and security when we browse.

In this sense we can name, for example, Privacy Badger. It is an extension that allows us to avoid trackers and scripts that affect our privacy. It is available for Chrome and Firefox.

We also find other options such as HTTPS Everywhere, which allows you to always navigate from the encrypted version of a website.


We cannot leave behind the possibility of using VPN services. As we know, they are very useful to encrypt our connection when using public wireless networks, such as Wi-Fi in a shopping center or airport.

There are many options that we can find on the Internet, both free and paid. They are also available for all types of operating systems.

Know if the VPN works well


An option similar to VPN in its operation, although with differences, is to use a proxy. It also encrypts the connection and hides our real IP address. We can even access services that may be restricted.

Again we can find free options on the Internet, although we must always choose correctly which one we are going to use.

Privacy-based Linux distributions

Linux distributions can also give us greater privacy when surfing the net. There are some like Tails or Whonix whose main objective is to protect user information and not expose any type of data. They are alternatives to more popular operating systems such as Windows.

General tips for maintaining privacy on the web

We also want to give a series of general recommendations to maintain privacy when browsing the Internet. Some tips that may come in handy for users to prevent their data from being compromised.

Do not expose more data than necessary

Something fundamental to maintain privacy on the Internet is not to expose more data than is really necessary. For example when using social media, it is not necessary that we make public information such as our email, place of residence or work.

We must also take care of the information that we can make public on the network when we write comments in a forum or article on a news page. We must not make public data that can be used against us.

Properly protect our accounts

Of course we must also properly protect our accounts In the net. It is essential that we use passwords that are strong and complex. They must contain letters (uppercase and lowercase), numbers, and other special symbols. All this always in a random way and do not repeat the same key in another place.

Additionally, we can also take into account the possibility of using two-factor authentication. It is something that is increasingly present in the different platforms and tools of the Internet. One way to add an extra security barrier.

Passwords on bank accounts

Avoid insecure networks

We discussed this earlier when we were talking about VPNs. exist wireless networks that are insecure, such as Wi-Fi in a station or any public place. We don’t really know who may be behind that network and how they might collect personal information.

Therefore our advice is to avoid these types of networks that can be a problem for privacy. In case of need we must make use of VPN services to protect ourselves.

Do not use third party programs

It is true that sometimes we can find the option to use certain third party programs they are independent of the officers. We can achieve different functions or additional features that may be interesting. But this could be detrimental to our privacy.

We should always download from legitimate sources, as well as use software that is official. Therefore, third-party programs that do not offer guarantees should be avoided.

Have security tools

They can not miss security tools to protect our privacy. A good antivirus or a firewall can protect our data so that it is not exposed on the network.

Again we can make use of multiple options. They are available for all types of devices and operating systems. In addition, there are both free and paid.

Internet security today

Review privacy options

Many platforms that we use in our day to day have different privacy options that we can modify. We must take the time to review these available options and apply whatever measures are necessary to avoid privacy-related issues.

Alternative search engines

The most popular search engine today in Spain is Google. There are also others like Bing that are widely used in other places. However we can always use alternatives that focus more on privacy.

An example is DuckDuckGo. It is a search engine that does not collect any type of information from users. It does not use trackers and therefore privacy is always present.

Common sense

The last, although most likely the most important, the common sense. We must not make mistakes that could expose our data. We are talking, for example, of attacks such as Phishing that need these user failures to be successful.

Common sense must be present at all times and thus avoid problems. Without a doubt, it is the best barrier to our security and privacy on the web.

In short, these interesting tips will allow us to surf the Internet with complete privacy, without compromising our data at any time. We have seen examples of interesting browsers, tools to protect our personal information, as well as some additional recommendations.

Redes WiFi Tutoriales

What to do if the Wi-Fi icon does not appear in Windows

What to do if the Wi-Fi icon does not appear

The normal thing is that to connect to a Wi-Fi network let’s have the icon on the Windows taskbar, next to the clock. However, it could happen that we do not see the icon. That there has been some problem, some bad configuration, and it has disappeared. We would still have other methods to connect, but let’s see what we can do if it does not appear and we want it to be visible there.

Have the Wi-Fi icon in the taskbar it is very useful not only to connect to a specific network, but also to check that we are indeed connected and what quality of signal reaches us. This helps us better understand if we should take any action to improve the quality of coverage, such as using an amplifier or changing locations.

Check if the icon is hidden

One of the basic steps and that we must first do is check if the icon may be hidden. This sometimes happens with icons that are on the taskbar and that may appear hidden in the drop-down menu.

To do this we simply have to click on the arrow that appears next to the clock, in the task bar, and see the icons that appear. Is there the one for Wi-Fi? Perhaps it is hidden there.

If we see it hidden there and we want it to be in the taskbar, where other icons such as the battery or speaker appear, we simply have to drag it. The same if what we want is the opposite: hide the icon.

Enable the Wi-Fi icon on the taskbar

Another option that we must take into account is that the Wi-Fi icon not enabled to appear on the taskbar. Windows allows us to configure it and choose what we want to show us in that place. It is very simple and you only have to follow a series of steps.

We have to go to Windows Settings, we enter Personalization and then Task Bar, which is the last option that appears on the left. Then we have to click Select the icons that will appear on the taskbar.

There we will see a list and we have to enable so that the Wi-Fi icon is displayed on the taskbar. It may have been set not to appear.

Use Windows Group Policy

We can also enable or disable the Wi-Fi icon from the Windows Group Policy. Again you have to follow a series of simple steps to do this. We must first press the keys Windows + R and run gpedit.msc.

Once inside we have to go to User Configuration, Administrative Templates, Start Menu and Taskbar. We are interested in the option Remove Network Connections from the start menu. We double click and if it is enabled, we give it to disable. In this way we would not be removing the Wi-Fi icon from the taskbar.

Wi-Fi icon from Group Policy

Restart the system

Undoubtedly one of the simplest steps, but one that often solves errors, is Restart the system. Sometimes there may be a problem in that session that affects the icons displayed on the taskbar, among other issues.

Simply by restarting the computer we can solve certain problems that may occur in Windows 10. It is another of those basic steps that we can carry out if we see that the Wi-Fi icon does not appear.

Reinstall the network card drivers

Errors like this can be due to missing drivers or outdated drivers. There may also have been some conflict with the system after a Windows update, for example.

Therefore, another point to take into account is the possibility of reinstalling the network card drivers. It is very simple and for this we must go to Start, Device Manager, Network adapters and there look for the Wi-Fi card. We click with the second mouse button and click Uninstall the device. We restart the computer and it will automatically reinstall the drivers.

Reinstall the network card

Restart network services

One last issue to consider is to restart network services. In this case we press the key combination Windows + R and we execute services.msc. There we have to look for Network connections.

When we have it selected, we only have to click with the right button of the mouse on the name and click Stop, to later start it again.

Restart network services

In short, these are some options that we can take into account if the Wi-Fi icon does not appear on the taskbar. Different procedures for the same objective.