OS - Windows

Depanare VPN 4 Solutii

instalare printer 50 Solutii

Optimizare pc 50 Solutii

Optimizare PC 103 Solutii

Scanare cu malwarebyte 4 Solutii

shareuire si mapare 15 Solutii

adaugare la domeniu 5 Solutii

Migrare profil 9 Solutii

Instalare/reinnoire certificate 2 Solutii

Personalizare sistem operare 274 Solutii

Configureaza si verifica setarile de boot 11 Solutii

Transfer de date 21 Solutii

Configurare OS 109 Solutii

Reparare OS 47 Solutii

Punct de restaurare OS 8 Solutii

Windows Event Viewer 6 Solutii

Reinstalare/reconfigurare VPN 8 Solutii

Optimizare client e-mail 12 Solutii

Optimizare PC 30 Solutii

Optimizare PC 20 Solutii

Reinstalare / Reconfigurare VPN 6 Solutii

Reinstalare OS 32 Solutii

Reparare sistem de operare 45 Solutii

Programare sistem operare 12 Solutii

Puncte de restaurare sistem de operare 14 Solutii

Instalare imprimanta 44 Solutii

Mapare si partajare 13 Solutii

Modificari firewall 12 Solutii

Migrare profil 8 Solutii

Transferuri de date 33 Solutii

Upgrade sistem operare 12 Solutii

Windows Event Viewer 7 Solutii

Verificare HDD 32 Solutii

Spatiu partitie 31 Solutii

Scanare cu MalwareBytes 5 Solutii

Setari servicii sistem operare 43 Solutii

Setari retea sistem operare 25 Solutii

Setari partitii 19 Solutii

Actualizare sistem operare 15 Solutii

Clonare HDD 11 Solutii

Compatibilitate program 13 Solutii

Instalare / Reinnoire Certificate 6 Solutii

Configurare si verificare setari de BOOT 15 Solutii

Configurare Sistem de operare 1454 Solutii

Identificare DLL-uri lipsa 2 Solutii

Depanare 1053 Solutii

Editarea politicilor de grup ale sistemului de operare 13 Solutii

Drivere 50 Solutii

How to Scan for Nearby AirTags Using an Android Phone

Here’s how this works: AirTags use Bluetooth so nearby devices on Apple’s Find My network can spot them. If you use a Bluetooth scanner app—the kind of app that shows nearby Bluetooth devices—you will see any nearby AirTags appear in the list of nearby Bluetooth devices.

It’s a little more complicated than it sounds. The Apple AirTag won’t show up as an “AirTag” in the list, but it will appear as an unnamed Bluetooth device—and it does say it’s an Apple device, so it might be easy to spot the AirTag if you don’t own any Apple-made Bluetooth gadgets.

How to Scan for AirTags on Android

To scan or nearby AirTags, you’ll need a Bluetooth scanner app. We used LightBlue, a free Bluetooth scanner app available on the Google Play Store. Install the app on your Android phone, launch it, and perform a scan. You’ll see all nearby Bluetooth devices here—everything from Bluetooth mice and keyboards to headphones to AirTags. If you live in an apartment building or you’re currently in a public location, bear in mind that you may see other people’s nearby devices in this list.

So, if you want an easier time spotting AirTags in the list, it might be helpful to get away from other people’s devices. You’ll have an easier time spotting an AirTag in your bag if you’re in the middle of an empty field than if you’re sitting in the middle of an airport.

The AirTag will appear as an “Unnamed” device. If you tap it, you’ll see that the “Manufacturer specific data” field says this particular entry is an Apple device, which is a hint that this particular device might be an AirTag. It could also be another piece of hardware made by Apple, of course.

Note: Note that the AirTag’s device ID—that’s the string of values that appears as “42:9A:35:A7:99:51” in the below screenshot—will automatically change to new random values over time. You can’t rely on the ID alone to spot an AirTag over time.

The LightBlue app on Android showing an AirTag.

How to Find a Nearby AirTag

If you’re pretty sure there’s an AirTag near you, you can use the device’s signal strength displayed in the app to help find it. The closer your phone gets to the AirTag, the more the signal strength meter will fill up. By moving your phone around, you might be able to get a better idea of where the nearby AirTag is located.

The signal strength for a nearby AirTag displayed in LightBlue.

Scan the AirTag with NFC

Once you find the AirTag, if it’s in Lost Mode and is tracking you, you can scan the white side of the AirTag with NFC to view contact information and a message the AirTag’s owner might have set. Just tap the back of your Android phone (or an iPhone) against the white side of the AirTag.

Obviously, This Isn’t Ideal

Clearly, this isn’t an ideal solution. With the launch of AirTags in early 2021, iPhone users will get a quick notification that an AirTag is following them—but Android users have to wait three days to hear a beep or scan for AirTags manually. That’s far from ideal.

What happens if Google releases a similar Bluetooth tracker in the future? Do Android users get a quick notification a Google Tag is following them, but iPhone users have to wait three days to hear a beep?

Clearly, more interoperability would be ideal—if Apple and Google created a cross-platform standard that would let Android quickly detect nearby AirTags in the same way, that’d be great. Unfortunately, we’re not holding our breaths for that kind of cooperation.

[mai mult...]

How to Test Whether Your VPN Is Working (and Spot VPN Leaks)

A hand about to press a big VPN button.

If you signed up to a VPN and want to make sure it’s safe to use before browsing the web, then the best way to do so is to test it yourself. There are several free tools that allow you to test your connection’s security and determine whether or not your VPN is doing its job. You need no special knowledge to do so, so let’s get started.

What Are VPNs?
In short, VPNs are services that will let you connect to the internet through their servers, effectively changing your IP address and partially protecting you from tracking by your ISP and any websites that you visit. If you want to keep yourself undetected while browsing, they’re an important part of your toolkit, although you’ll also need to use Incognito Mode and follow some other steps for anything resembling anonymity.

However, VPNs aren’t bulletproof: There are some problems that can pop up in even the best of VPNs that can potentially reveal your IP address to the sites or services that you visit, thus rendering your VPN useless. Thankfully, there are a number of free tools available on the web that can help you track down these issues and deal with them.

Types of VPN Leaks

When a VPN broadcasts your IP address instead of that of the VPN’s server, that’s called a leak. There are three types of leaks that you can easily detect with simple tools: IP leaks, WebRTC leaks, and DNS leaks. IP leaks come in two flavors: IPv4 and IPv6 leaks. (We have an article on the difference between IPv4 and IPv6). An IPv4 leak is when the VPN fails to protect your connection, pure and simple. You won’t see too many of these, if ever, as they only happen when a VPN fails.

According to Dimitar Dobrev, founder of VPNArea, IPv6 leaks happen if both you and the website you connect to support IPv6, but your VPN only supports IPv4. With the IPv6 connection effectively unprotected, the site can see your IP address. The only good way to prevent this is to upgrade to a VPN that uses IPv6 protection or has the option to shut it off. If your VPN has neither, then get another.

WebRTC leaks are a different issue: In the words of ExpressVPN Vice President Harold Li, Web Real-Time Communication (WebRTC) is a collection of standardized technologies that allows web browsers to communicate with each other directly without the need for an intermediate server. As this goes on, occasionally, a browser can accidentally reveal your IPv4 address and with it, your location. If this happens, you can disable WebRTC requests with a browser extension.

Last but not least are DNS leaks, which are quite common, and even high-end VPNs will occasionally suffer from them. They happen when your DNS requests are sent to your standard DNS servers directly without going through the VPN and using the VPN’s DNS servers. Changing servers should fix it, but if it happens regularly, you probably need to change VPNs.

VPN Testing Tools

Now that we know what we’re looking for, let’s take a look at how we can detect these three types of leaks. There are a number of tools to choose from: Our favorites are ipleak.net—owned by AirVPN—and ipleak.org, which is owned by VPNArea. Both do a fine job of showing you what you need to know, but since we like ipleak.net’s interface a little better, we’ll be using that one for the purposes of this article.

If you’re experienced in working with the backend of computers, our favorite VPN service, ExpressVPN, has put out its testing tools on GitHub. If you’re comfortable with more advanced tools like this, we recommend that you give them a whirl and get not just information on leaks, but also on a host of other data.

Testing Your Connection

To show you how the tests work, first, we’ll go to ipleak.net without enabling a VPN. There’s no introduction screen or anything. You’re immediately brought to your test results.

Test result without VPN enabled

At the top is your IP address. Under that are the country and the city you’re in (Hello from sunny Cyprus.). However, sometimes, your city might show up differently: For instance, ipleak.net usually shows my city as Larnaca or Nicosia (both of which are about 50 miles away). This is due to my ISP connecting to a server elsewhere on the island.

The IPv6 test is just to the right of your IP address. It showing up as “not reachable” means that you passed, in this case, so we’re safe. Below that is WebRTC detection. If it’s empty, you’re also good. Last but not least is your DNS test, which shows a host of IP addresses, which can be from anywhere. These are the different servers that your signal has bounced between before hitting ipleak.net’s server. As it is now, it’s also fine.

Since running a test on an unprotected connection is kind of pointless, let’s connect to a server in the Netherlands. All you need to do in this case is connect, and then reload the ipleak.net page. The test will be run again automatically.

Connect, and then reload the ipleak.net page, and the test will be run again automatically.

In this test, there are a few things to note: The results for the IPv6 and WebRTC tests are fine. To find out whether our VPN passed the DNS leak test, we need to look through the list of IP addresses and see whether or not our original IP is there: If it’s not, like now, we’re all good. This means that the connection is all good and that the VPN has passed.

However, there is one thing to note, and if you start running your tests yourself, you’ll come across this quite often: The location of the VPN’s IP address is different than what we selected. We chose a server in Amsterdam, but this IP places us in Overijssel, which is a province about 60 miles or 100km from Amsterdam.

According to Mr. Dobrev, this has to do with the way that IPs are registered. IP addresses can be moved around, but it often takes a while for the registrar to update this information. Also, to further complicate the issue, there’s more than one registrar. However, this is not a security issue. Usually, within a few days, the IP address will show up where it needs to be.

What Do Bad Results Look Like?

However, not all tests will look this rosy. Generally speaking, IPv4, IPv6, and WebRTC leaks will happen the least. Your author has tested a lot of VPNs and has only come across a few of these. However, DNS leaks are a lot more common, so always be sure to look carefully through the DNS servers to make sure that you don’t spy your own IP address among them.

[mai mult...]

How to Install Signal for Desktop on a Chromebook

A person holding an Asus Chromebook under their arm.

Signal, the secure encrypted messenger app, doesn’t offer an app for Chromebooks. The Android version won’t run on Chromebooks, either—but, by using the Chrome OS Linux subsystem, you can easily install and use Signal.

Privacy from the Ground up

Signal is a free, open-source application published by the Signal Foundation and Signal Messenger LLC. The design started with the need for privacy and security as its first and most important principle. The Signal Messenging Protocol (SMP) was developed to provide that security.

The source code of the protocol has been reviewed by an independent team from the German CISPA Helmholtz Center for Information Security, the Swiss ETH Zurich University, Cisco, and the Canadian University of Waterloo. They all declared the encryption to be world-class and the code to be free from backdoors and other weaknesses. The security of the protocol provides one type of privacy. No one can intercept a Signal message and read it. Signal holds virtually no information on you. It stores the smartphone number that you registered with, the date that you registered, and the date that you last used the service, and that’s all: a phone number and two timestamps.

They retain nothing about message contents, your contacts, your location, or anything else. And what little they do know they don’t share with anyone else unless a court demands it. And if that happened, the few bits of information that Signal would be forced to divulge wouldn’t reveal anything about your use of the system, apart from when you first started using it and when you used it last.

There’s been a huge migration from WhatsApp to Signal. WhatsApp changed its privacy policy in 2021 and has started sharing information about its users with Facebook. There was a backlash to this. When Elon Musk tweeted “Use Signal” in early 2021, the rush of people registering with Signal overtook the platform’s ability to spin up new servers to meet the demand.

Everything was running smoothly again within a few days, but it does demonstrate the tremendous growth that Signal has undergone.

Linux to the Rescue

Signal is primarily a smartphone app, but there are Signal desktop clients available for Windows, Mac, and Linux computers. Everyone seems to be using Signal—apart from Chromebook owners. Signal doesn’t provide a native Chromebook app and, although Chromebooks will run Android apps, the Signal Android declares itself to be incompatible with your device if you try to install it on your Chromebook.

Modern Chromebooks have a Linux subsystem that adds even more power and flexibility to your Chromebook. You can run Chrome apps, Google Docs, online services, Android apps, and Linux apps. We can use the Linux subsystem to install the Signal Linux client and use that on your Chromebook.

Note that you’ll need a Signal account in order to activate your desktop. There’s only one way to sign up for Signal, and that’s through your smartphone. So, if you don’t already use Signal, download the Signal app on your smartphone and register an account.

[mai mult...]

This is how you can crop a circle in Paint 3D

[mai mult...]

How to get a color picker on Windows 10

Windows 10 may not include a native feature to pick colors, but you can use the tool built into PowerToys to add a system-wide color picker. The Color Picker included with PowerToys allows you to quickly find the technical information for any color on the screen.

Once you install the application and enable the tool, you can use a keyboard shortcut to launch the experience. Then you can use the mouse pointer to identify the color of a particular element in various formats (including HEXRGBHSLCMYK, and more) and copy it to the clipboard. The tool even includes an editor to modify and create a new color from the original pick.

Although most users usually do not need to worry about knowing the color information of an element on the screen, this is an essential feature for many web and app developers, photo and video editors, and anyone who works with colors.

[mai mult...]

Cum se setează locații personalizate în caseta Windows „Salvare ca”

Acest ghid vă va conduce pas cu pas, deși procesul de setare a „comenzilor rapide” personalizate în caseta de dialog Windows „Salvare ca”. Este important să rețineți că nu toate aplicațiile Windows folosesc aceeași casetă „Salvare ca” – există mai multe. Deci, acest mic truc nu va funcționa pentru fiecare aplicație care are o casetă „Salvează ca”.

[mai mult...]