Virtual private networks have many uses. Typically, businesses deploy VPNs so employees can securely access the corporate network from outside the office. However, we’ve seen a rise in third-party VPN services that use the same underlying technology, the encrypted tunnel, to simply provide a secure Internet connection.
The main window of the Freedome Windows application shows a big circle which tells you the connection status and serves as a connect/disconnect button. On the sides of that, you see the amount of traffic you have sent/received and the number of harmful sites and tracking attempts blocked while connected to the service. Below you see the VPN location, which you can click on to change to one of 21 countries. You can’t choose the exact city, but can select available regions, such as West or East Coast of the U.S.To read this article in full or to leave a comment, please click here(Insider Story)
VPNsVirtual private networks (VPNs) have many uses. When connected to a VPN service, the websites you access think you’re at the location where the VPN server is located. This can help anonymize your Internet traffic so it’s much harder for websites to track your personal browsing history. This also allows you to access content that’s restricted where you are currently located, such as Netflix or Hulu when traveling overseas. We evaluated seven third-party VPN services. Here are the individual reviews: On our Android device, we installed the Avast SecureLine app, version 1.0.7704. By default, you only see a status icon for the app on the status bar of Android and on the notification drawer when you’re connected to the service. However, you can optionally enable the icon and notification to be present when disconnected as well. The Android app is also very simple. There’s no shortcut to any help or documentation within the Android app or Windows application, but it really isn’t needed given how simple the apps and service are. Additionally, your Internet traffic would be encrypted when you’re on unsecured Wi-Fi networks, such as public hotspots. This prevents local eavesdroppers from capturing your browsing history and logins. Continue reading
Virtual private networks have many uses. Typically, businesses deploy VPNs so employees can securely access the corporate network from outside the office. However, we’ve seen a rise in third-party VPN services that use the same underlying technology, the encrypted tunnel, to simply provide a secure Internet connection.
Why would you ever need to do this?
When connected to a VPN service, the websites you access think you’re at the location where the VPN server is located. This can help anonymize your Internet traffic so it’s much harder for websites to track your personal browsing history.
This also allows you to access websites, services, and content that’s restricted where you are currently located, such as Netflix or Hulu when traveling overseas.To read this article in full or to leave a comment, please click here(Insider Story)
Smart switchesSmart switches offer functionality found in managed switches, such as VLANs, port mirroring, and link aggregation. However, smart switches are typically targeted towards small and midsized networks that don’t need the complete management capabilities and fine-tuning offered in fully managed switches. We looked at switches from six vendors, the same vendors from our recent small business router review. So if you’re building an SMB network, reference both reviews to find a matching router and switch that meets your needs. Vendors include the big-name Cisco, popular home and business brands D-Link, Linksys, and Netgear, and also lesser-known names DrayTek and UTT Technologies. We setup and evaluated each switch and in this review we compare product in regards to price, features, and user-friendliness. Read the full review.To read this article in full or to leave a comment, please click here
We looked at six VPN routers designed for small businesses, ranging from the popular Cisco brand to lesser-known names like DrayTek and UTT Technologies. We setup and evaluated each to determine how they compare in regards to price, features, and user-friendliness.
When choosing a VPN router, you want to pick one that supports the VPN protocol of your choice. If you’re look for an IPSec VPN, consider those that provide a way to simplify the configuration, such as the Cisco, Linksys or Netgear units. If you’re looking for a wide variety of VPN options, consider D-Link.
If you’re looking for an inexpensive option, consider UTT Technologies. And if you’re looking for unique features, consider the DrayTek unit, or their other models with integrated Wi-Fi, fiber, or VoIP support.To read this article in full or to leave a comment, please click here
Small businesses typically lack full-time IT staff. Taking a self-proclaimed techie who serves another role in the business and assigning that person to provide network and tech support can be a great idea. I call these people the business’s resident tech, someone who can help with first-level support. An outside IT service provider can be called in to help when more complex support is required. Here are nine key steps in building a successful small business network.To read this article in full or to leave a comment, please click here(Insider Story)
The second wave of 802.11ac is coming ashore and the new MU-MIMO technology (Multi-User, Multiple Input Multiple Output) is going to make a splash. It’s one of the biggest improvements to Wi-Fi we’ve seen to date with the potential to greatly increase wireless network throughput and make a huge difference in dense, high capacity networks.To read this article in full or to leave a comment, please click here(Insider Story)
It's become de rigeur to protect wireless networks with Wi-Fi Protected Access II (WPA2) security, but many small and even midsize businesses default to using the personal or pre-shared key (PSK) mode of WPA2, rather than its enterprise mode. Despite its name, however, the enterprise mode isn't only for large networks; it has a place in all businesses. Though you might think the simple personal mode is easier to use, the exact opposite can be true if you factor in the ongoing effort required to properly secure the business's network.Connecting devices that support enterprise modeTo read this article in full or to leave a comment, please click here(Insider Story)
Stumblers and analyzersWi-Fi stumblers and analyzers are a must-have when troubleshooting Wi-Fi interference and performance issues, or when checking channel usage. They’re also needed for Wi-Fi site surveys and for security audits to look for rogue or misconfigured APs. Each of these five tools gives you the basic wireless details of nearby APs, including SSIDs, signal strength, channels, MAC addresses, and security status. Most can also reveal “hidden” or non-broadcasted SSIDs. Some offer additional functionality, such raw 802.11 packet capturing, frame statistics, performance testing, and map-based surveying. (Read the full product review.)To read this article in full or to leave a comment, please click here
Wi-Fi stumblers and analyzers are a must-have when troubleshooting Wi-Fi interference and performance issues, or when simply checking channel usage on the wireless bands. They’re also needed for Wi-Fi site surveys during the network design and deployment phases, as well as for security audits to look for rogue or misconfigured access points.To read this article in full or to leave a comment, please click here(Insider Story)
Following up on our previous article highlighting 8 free Wi-Fi stumbling and surveying tools, here are 7 more tools that provide important details on known and unknown aspects of your WiFi network.
Though enterprise-level solutions like AirMagnet Wi-Fi Analyzer and Ekahau Spectrum Analyzer have much more functionality, the free tools discussed here can be useful in a number of scenarios. For smaller networks, you might be able to get away with just using simple freeware tools for all of your Wi-Fi surveying needs. For larger wireless LANs (WLAN), these tools come in handy for a quick peek at the airwaves during design, deployment, or troubleshooting. (See screenshots from each of these products here.)To read this article in full or to leave a comment, please click here
Stumbling and surveyingHere are 7 tools that provide important details on known and unknown aspects of your WiFi network. Each of these tools gives you the basic wireless details: SSIDs, signal strength, channels, MAC addresses, and security status. Some can even reveal “hidden” or non-broadcasted SSIDs, display the noise levels, or display statistics on successful and failed packets of your wireless connection. Two of the tools include Wi-Fi password cracking tools as well, useful for educational or penetration testing purposes. (Read the full review.)To read this article in full or to leave a comment, please click here
Access points put to the testWe put four new access points to the test, from Linksys, Xclaim, Amped and ZyXel, using the same test-bed and methods as our last review. The Linksys LAPAC1750PRO performed best in the throughput tests and was a feature-rich product. The Amped Wireless AP was a close second in the speed tests and is a solid business-class access point. The Xclaim unit did well given it’s only a two stream (2x2) AP. The ZyXEL unit was last in throughput, but has a number of advanced features in the areas of configuration, management and security. (Read our full review.)To read this article in full or to leave a comment, please click here
Continuing our ongoing series of 802.11ac reviews, we put four new access points to the test, bringing our total to 13. This time around, we looked at products from Linksys, Xclaim, Amped and ZyXel, using the same test-bed and methods as our last review.To read this article in full or to leave a comment, please click here(Insider Story)
The days are long past when a fast office Wi-Fi connection was a nice-to-have. These days it's essential for your business to provide clients and employees alike with a speedy, reliable wireless network.6. Disable lower data rates and standardsTo read this article in full or to leave a comment, please click here(Insider Story)
Monitoring or capturing Wi-Fi traffic on Android smartphones and tablets is possible. I’m not just talking about Wi-Fi stumblers or traffic usage apps, but full network sniffers that can capture and display the raw 802.11 network packets from the airwaves. Instead of having to run captures on your bulky laptop, you can walk around with your Android tablet or phone tucked away in your pocket.To read this article in full or to leave a comment, please click here(Insider Story)
Gigabit Wi-Fi access pointsLast year, we reviewed five of the first Gigabit Wi-Fi access points to hit the market. This time around, we’re testing three new entrants: the Cisco WAP371, D-Link’s DAP-2695, and the Edimax WAP-1750. Each product is a three-stream (3x3) 802.11ac access point designed for small and midsized business (SMB) environments and up. Each includes a built-in controller to centrally manage multiple access points. (Read the full product review.)To read this article in full or to leave a comment, please click here
Last year we reviewed five of the first Gigabit Wi-Fi access points to hit the market. This time around, we’re testing three new entrants: the Cisco WAP371, D-Link’s DAP-2695, and the Edimax WAP-1750.D-Link DAP-2695In addition to the regular access point mode, this Edimax unit supports WDS with or without the access point functionality running concurrently. It supports up to 32 SSIDs, 16 for each band. The access point also offers a simple load balancing feature and rogue access point detection. Like the D-Link access point, this unit has a built-in RADIUS server so you can easily utilize enterprise-class Wi-Fi security. However, the Edimax unit supports up to 256 user accounts. Another simple yet potentially very useful feature is its built-in beeper so you can make access points sound from the web GUI and physically locate them in the building.To read this article in full or to leave a comment, please click here(Insider Story)
You’re probably aware that hackers can try to crack your Wi-Fi passwords in order to gain access to your network. So, you’re already using strong passwords.To read this article in full or to leave a comment, please click here(Insider Story)
Connecting to wireless networks using the enterprise or 802.1X mode of Wi-Fi security is a bit different compared to using the personal or pre-shared key (PSK) mode. Though connecting to enterprise networks with your laptop may have been straightforward, Android presents you with additional settings you may not understand.To read this article in full or to leave a comment, please click here(Insider Story)