Speed up your Internet

Windows reserves 20% of your available bandwidth for their own purposes, like Windows Updates and interrogating your PC, etc.

You can get it back. Just follow the steps below to enjoy more internet speed:

  • Click Start>Run and type “gpedit.msc” without quotes. This opens the group policy editor.
  • Then go to Local Computer Policy
  • Choose Computer Configuration
  • Then go to Administrative Templates>Network
  • Now head to QOS Packet Scheduler>Limit Reservable Bandwidth.
  • Now Double click on Limit Reservable bandwidth
  • It will say it is not configured, but if you look under the ‘Explain‘ tab, you will find, ” By default, the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection, but you can use this setting to override the default.”
  • So the trick is to ENABLE reserved bandwidth, then set it to ZERO.

This will allow the system to reserve nothing, rather than the default 20%.

Enjoy faster speed!

Access Internet from MS Calculator

Don’t have a browser? or just wanna have some fun? or wanna show something new to your friends?

Follow the steps to access the web through the Microsoft Calculator:

Multiple logins in Yahoo Messenger

To enable multiple logins in you Yahoo! Messenger, Follow these steps :

1. Click Start Menu And Click On “RUN”
2. Type
“regedit” and click OK

3. You will see the REGISTRY EDITOR

4. Navigate to

5. Here in
right side panel, right click to create a new Dword value with name
Plural and give it value 1.

6. Close the registry editor and enjoy multiple yahoo logins

Surf Blocked websites

Has ur school or parents blocked some sites..??

Below are some free proxy sites from where you can surf your blocked sites:

* http://kproxy.com

* http://backfox.com

* http://anonymouse.org

* http://www.stupidcensorship.com

* http://www.vmathpie.com

* http://www.xroxee.com

* http://mathtunnel.com

These websites use their servers to let you access blocked websites….

Two Factor Authentication Benefits

With identity theft becoming a significant problem, Internet security is becoming more important every day. For many companies, creating a secure login process for identity verification is critical to keeping sensitive information safe from unauthorized access. One method available for secure login is 2 factor authentication, which allows the user to prove their identity using more than one type of authentication factor, such as a password or security question along with a USB card, ID badge, or some other form of identification that is kept by the person. A good example of this is an ATM machine, which requires the ATM card along with the PIN number to gain access. Neither items is usable without the other.

There are several benefits to using two factor authentication with identity verification software. One of those benefits, of course, is enhanced security. Passwords alone can be easily lost or stolen, but with two factor authentication, a stolen password alone would be useless to the criminal. Without the second factor of authentication in their possession, they would be unable to pass the online identity authentication process, which keeps the account securely protected.

Another benefit of two factor authentication is reduced risk. With single factor identification, thieves have only one factor to break, such as guessing the password with the use of brute force software. By adding an additional layer of protection, identity authentication becomes more difficult to crack and increases the risk of a hacker being caught, which may encourage criminals to move on to easier targets, resulting in greater security and a reduced risk of loss for the company.

With the use of two factor authentication, the identity verification process becomes much more secure, but it is still not unbreakable. The proper education of end users is still necessary to ensure that identifying information is being kept secure and that passwords are not easy to guess or steal. Adding as much complexity to the login process as possible increases the security of the system and reduces the risk of unauthorized access.