LEARN MORE ABOUT DESKROLL

DeskRoll Blog

WiFi on Windows 10 (and other versions): problems, solutions, tips

WiFi is among today's most widely used technologies. While mobile broadband is readily available and sometimes even cheap, WiFi is still very popular. People use it almost everywhere: at home, at work, in public places. Tech savvy folks create ad-hoc access points to share mobile Internet. While WiFi is very handy, users often have problems with wireless networking. In this post we try to cover some simple tips and workarounds for the most common problems and provide some advice and insights on how it should work.

WiFi info screen

Maximizing Remote Access And Remote Desktop Security

VNC and OpenSSH

 

Remote access is obviously a very sensitive (often we’d call it intimate) matter. So, security is a major concern here. Many remote desktop software vendors claim their products are secure, but sometimes the details are a bit vague. Let’s try and figure out what we need to know when choosing remote access tools.

An Instant Messaging Guide to Privacy

We surely want all our private conversations to stay private. This is but simple and natural for any person. If we text or voice chat with someone, we want to be sure this space is personal and well-protected. Especially given that we occasionally send sensitive information that may be related to our family, health or business.

IPv6 and What It Brings To The Table

IPv6 is a network layer protocol which provides addressing and routing between hosts in a network. This is a new version that will supersede the older one (IPv4) someday. It also brings new features and aims to solve some problems, including the notorious depletion of available addresses for hosts. This is the main problem that exists today with IPv4.

Making Internet Access Safer: DNS Security

 

No doubt Internet has dramatically changed the way people live and work. All this has been made possible by a set of different technologies. But nothing is perfect. Those technologies are not an exception. One of the core parts of the Internet is the Domain Name System. DNS does have certain issues but the respective organizations are working hard to continuously improve it. Below we’ll explain what DNSCrypt is and how it helps users, and we’ll provide instructions how to set it up.

Setting Up Wake On LAN (Also On Macs)

Do you often need to remotely access a powered off machine? Even if it’s a rare occasion, it’s often “you get remote access or you drive 80 miles”. That’s why you rely on Wake on LAN. WOL certainly requires some setup, depending on the OS, and it has certain caveats that we explore in this guide.

This guide is now available in the Help section here.

Helping Clients Get Online – Checklist

Remote support saves time and effort but what if your user can’t get online? This simple troubleshooting checklist helps you get connected. It might be useful even for experienced technicians, especially at the end of a long business day.

Turning Your Laptop into a Wi-Fi Hotspot

Normally, we don't use laptop's Wi-Fi to create an access point. Still, it might come handy if we want to quickly create a hotspot and share an Internet connection with our friends and family.

If we have friends hungry for Wi-Fi Internet access and there’s a wired Internet connection, then we can start...

Remote Access to a Headless System: 10 Things to Consider

Headless of course means no physical display is attached to the machine. “Headless” naturally also applies to machines in the cloud. In this illustrated guide we’ll show that when it comes to no-display boxes, there are pitfalls and best practices worth keeping in mind.

Staying Safe - Being Anonymous on the Internet

Every person who wants to use Internet today should be aware of possible privacy and personal data issues. Governments of many countries want it to be controlled and companies strive to collect personal information and track users. Then this data ends up being used for targeting ads. Even if the use of such data is considered secure, there's always probability of a threat. The data could be stolen or it could become public. Nobody could gurantee absolute safety.