SOFTWARE – The printer driver https://theprinterdriver.com The printer driver Mon, 12 Oct 2020 21:20:18 +0000 fr-FR hourly 1 https://wordpress.org/?v=5.4.3 Solutions auto repair problem https://theprinterdriver.com/596-solutions-auto-repair-problem https://theprinterdriver.com/596-solutions-auto-repair-problem#respond Mon, 12 Oct 2020 21:13:46 +0000 https://theprinterdriver.com/?p=596 This tutorial shows you how to solve the auto repair problem that turn endlessly on Windows 10.

 

This problem is damn blocking because you cannot access Windows 10 and then your PC seems unusable.

You should have the following message on a blue screen :

Automatic Repair could not fix your PC

Click « Advanced Options » to try other PC recovery options or « Shut Down » to shut down your PC.

Fichier journal : C:WINDOWSSystem32LogfilesSrtSrtTrail.txt

Here are the solutions to solve this loop start problem on Windows 10 Automatic Repair.

# 1: Use the System Restart Tool

L’System restart tool (Startup Repair) is a recovery tool capable of solving some system problems that may prevent Windows from starting.

To know how to use it, follow this tutorial:

System restart tool: fix Windows 10 startup

Did the Crab help you? Help him back by disabling your ad blocker!
(thanks for the pinch )

# 2: restore Windows from a restore point

To fix auto repair looping issue, you can try to restore Windows from a restore point.

This solution allows you to find your Windows as it was on a specific date and time, when it was functioning correctly.

Note : to use this feature, System Restore must be enabled in Windows 10. If not, you will not have no restore point of available.

Here’s how to do it:

  1. Click on Advanced options.
  2. Click on Troubleshooting > Advanced options > System Restauration.
  3. After logging into an administrator account, System Restore starts.
  4. Then follow these instructions on how to restore Windows from a restore point:
    Restore your PC from a restore point on Windows
  5. After Windows has been restored from restore point, check if Windows 10 starts again correctly.

Congratulations! You have solved the problem of automatic repair running on loop on Windows 10 with the System Restauration. 👍

Did the Crab help you? Help him back by disabling your ad blocker!
(thanks for the pinch )

# 3: use System File Checker (sfc)

To fix the auto repair looping issue, you can try using the System File Checker (sfc).

This tool allows you to search for corruption in Windows system files and, in case of anomalies, to restore missing or damaged files.

Here’s how to use it:

  1. Click on Advanced options.
  2. Click on Troubleshooting > Advanced options > Command Prompt.
  3. Start the System File Checker (SFC) tool with the following command:
    sfc.exe /scannow /offbootdir=C: /offwindir=C:Windows
  4. Also take the opportunity to check the integrity of the file system of the volume on which Windows is installed (C 🙂 using the command chkdsk :
    chkdsk.exe /r C:
  5. Come in exit to exit the command prompt.
  6. Restart your computer and check if Windows 10 starts again correctly.

Congratulations! You have solved the problem of automatic repair that loops on Windows 10 with tools sfc and chkdsk. 👍

N ° 4: read the contents of the SrtTrail.txt file

To solve the problem of auto repair running on a loop, you can read the contents of the SrtTrail.txt log file.

This log file is important because it contains all errors encountered when starting Windows 10. By analyzing these errors, you will be able to identify the source of the problem and correct it so that Windows 10 starts again correctly.

To find out how, follow this tutorial:

SrtTrail.txt error during automatic repair of Windows 10

# 5: restore the registry

To fix auto repair looping issue, you can try to restore the registry from a backup.

Here’s how to do it:

  1. Click on Advanced options.
  2. Click on Troubleshooting > Advanced options > Command Prompt.
  3. Restore the registry with the following commands:
    cd C:WindowsSystem32
    mkdir configBak
    copy config configBak
    copy RegBack* config
  4. Confirm overwriting existing files.
  5. Come in exit to exit the command prompt.
  6. Restart your PC.

Congratulations! You have solved the issue of automatic repair that loops on Windows 10 by restore a registry backup. 👍

# 6: uninstall the latest Windows 10 updates

Installing a quality update or a Windows 10 feature update can cause the auto-repair issue to loop.

Uninstall these updates can solve the problem.

Here’s how to do it:

  1. Click on Advanced options.
  2. Click on Troubleshooting > Advanced options > Uninstall updates.
  3. Start with uninstall the latest quality update.
  4. Select your user account (with administrator rights) then enter your password.
  5. Click on the button Uninstall the quality update.
  6. Once the quality update is uninstalled, check if Windows 10 starts again correctly.
  7. If that didn’t work, uninstall the latest feature update :
    Downgrade Windows 10: Go back to the previous version of Windows 10

Congratulations! You have solved the issue of automatic repair that loops on Windows 10 by uninstalling the latest updates. 👍

# 7: turn off automatic repair

You can also try to disable automatic repair so that it no longer starts when Windows 10 starts up. You can thus see if Windows 10 startup continues to crash or if Windows 10 is finally accessible.

Here’s how to do it:

  1. Click on Advanced options.
  2. Click on Troubleshooting > Advanced options > Command Prompt.
  3. Turn off automatic repair with the following command:
    bcdedit /set {default} recoveryenabled No
  4. Restart your computer and check if Windows 10 starts again correctly.
  5. To re-enable automatic repair, use the following command:
    bcdedit /set {default} recoveryenabled Yes

Congratulations! You have solved the issue of automatic repair that loops on Windows 10 by disabling automatic repair. 👍

# 8: reset Windows 10

If none of the above solutions worked, then reset Windows 10 is probably the solution to consider. Don’t worry, this procedure keeps all of your personal files.

To find out how, follow this tutorial: Repair Windows 10 without losing its data (with the « Reset this PC » tool)

# 9: reinstall Windows 10

Still stuck on looping auto repair?

So the ultimate solution is to reinstall Windows 10 ! Don’t worry, this procedure does not delete your personal files.

Here’s how to do it:

  1. Create a USB key Windows 10 installer (from another PC).
  2. Start your PC on the USB key Windows 10 installer.
  3. Follow these instructions: Repair Windows 10 without losing data (with Windows 10 installer USB drive)

]]>
https://theprinterdriver.com/596-solutions-auto-repair-problem/feed 0
SrtTrail.txt error during automatic repair of Windows 10 https://theprinterdriver.com/589-srttrail-txt-error-during-automatic-repair-of-windows-10 https://theprinterdriver.com/589-srttrail-txt-error-during-automatic-repair-of-windows-10#respond Mon, 12 Oct 2020 21:10:36 +0000 https://theprinterdriver.com/?p=589

SrtTrail.txt is the log file that is created by the automatic repair of Windows 10. You should especially see it when the automatic repair is looping on Windows 10 and the blue screen « Automatic repair could not fix your PC » appears. poster.

This log file is important because it contains all errors encountered when starting Windows 10. By analyzing these errors, you will be able to identify the source of the problem and correct it so that Windows 10 starts again correctly.

In this tutorial we will see how read this log file StrTrail.txt in order to find the file (s) responsible for the Windows 10 crash.

Inventory

When you start your PC, you get a blue screen (BSOD) indicating that the automatic repair has failed and a StrTrail.txt log file was generated:

Automatic Repair could not fix your PC

Click « Advanced Options » to try other PC recovery options or « Shut Down » to shut down your PC.

Log file: C: WINDOWS System32 Logfiles Srt SrtTrail.txt

Take the next step to find out how read this StrTrail.txt file from that blue screen.

Did the Crab help you? Help him back by disabling your ad blocker!
(thanks for the pinch )

Read the contents of the StrTrail.txt file

  1. Click on Advanced options.
  2. Click on Troubleshooting > Advanced options > Command Prompt.
  3. Enter the following command to view the contents of the StrTrail.txt log file:
    type C:WindowsSystem32LogFilesSrtSrtTrail.txt
  4. The results of the various tests performed by the automatic repair of Windows 10 are displayed. Spot the test who failed and identify the responsible file (s) of this failure.
  5. Take the next step.
Did the Crab help you? Help him back by disabling your ad blocker!
(thanks for the pinch )

Fix StrTrail.txt errors

  1. If everything is OK, you will get the message:
    Cause initiale trouvée :
    --------------------------
    L'état du démarrage indique le système d'exploitation a correctement démarré.

    In that case, restart your pc. Windows 10 should start correctly.

  2. If any errors are found, you will get a message like this:
    Cause initiale trouvée : 
    ---------------------------
    Le fichier critique de démarrage C:EFIMicrosoftbootresourcescustombootres.dll est endommagé.
    Action de réparation : Réparation de fichier
    Résultat : Echec de l'opération. Code d'erreur = 0x4005
    Durée = 1094 ms
    

]]>
https://theprinterdriver.com/589-srttrail-txt-error-during-automatic-repair-of-windows-10/feed 0
delete a user account (6 methods) https://theprinterdriver.com/549-delete-a-user-account-6-methods-le-crabe-info https://theprinterdriver.com/549-delete-a-user-account-6-methods-le-crabe-info#respond Sat, 10 Oct 2020 21:10:15 +0000 https://theprinterdriver.com/?p=549 This tutorial explains how delete a user on Windows 10 thanks to 6 different methods. It doesn’t matter if this user account is a local account or a Microsoft account, the procedure is the same.

Did the Crab help you? Help him back by disabling your ad blocker!

(thanks for the pinch )

Informations

  • You cannot delete a user account currently logged in. You will need to log out the user first.
  • You must be logged in with an account with the administrator rights to be able to delete a user account.

To delete a user account on Windows 10, you have several options:

N ° 1: via Settings

  1. Open them Settings.
  2. Select Accounts > Family and other users.
  3. Under Other users, click on the user account to delete> Remove.
    4.Click on the button Delete account and data to confirm the deletion of the user account.
  4. There you have it, the user has been deleted!

Congratulations! You deleted a user account on Windows 10 using the Settings. 👍

Did the Crab help you? Help him back by disabling your ad blocker!
(thanks for the pinch )

N ° 2: via the Control Panel

  1. Open the Control panel :
    • via the Start menu> Windows System> Control Panel.
    • away there Run command : control.
  2. Select User Accounts> Delete user accounts.
  3. Select the user account to delete.
  4. Choose if you want remove or keep files of the user. If you decide to keep them, they will be saved in a folder  » [Nom d’utilisateur] On the Desktop of the currently logged in user account.
  5. Confirm the deletion of the user account by clicking on Delete account.
  6. There you have it, the user has been deleted!

Congratulations! You deleted a user account on Windows 10 using the Control panel. 👍

Did the Crab help you? Help him back by disabling your ad blocker!
(thanks for the pinch )

N ° 3: via Local Users and Groups

  1. Open the window Local users and groups :
    • away there Run command : lusrmgr.msc.
    • via Control Panel> Administrative Tools> Computer Management> Local Users and Groups.
  2. Open the folder Users.
  3. Right click on the user account to delete> Remove.
  4. Confirm the deletion of the user by clicking on Yes.
  5. There you have it, the user has been deleted!

Congratulations! You deleted a user account on Windows 10 using the window Local users and groups. 👍

N ° 4: with netplwiz

  1. Open Network Places Wizard aka. netplwiz :
    • away there Run command : netplwiz.
  2. Check the box Users must enter a username and password to use this computer if it is not done yet.
  3. Select the user to delete then click on the button Remove.
  4. Confirm the deletion of the user account.
  5. There you have it, the user has been deleted!

Congratulations! You deleted a user account on Windows 10 using netplwiz. 👍

# 5: with the command prompt

  1. Open a Command Prompt as administrator.
  2. View all user accounts on the system:
    net users
    
    comptes d’utilisateurs de \DESKTOP-OUDNFT2
    -------------------------------------------------------------------------------
    Administrateur           DefaultAccount           Invité
    La Langouste             Le Crabe                 WDAGUtilityAccount
  3. Delete the user account by entering its last name (eg: « La Langouste »):
    net user "Nom d'utilisateur" /delete
  4. There you have it, the user has been deleted!

Congratulations! You deleted a user account on Windows 10 using theCommand Prompt. 👍

# 6: with PowerShell

  1. Open PowerShell as administrator.
  2. View all user accounts on the system:
    Get-LocalUser
    
    Name               Enabled Description
    ----               ------- -----------
    Administrateur     False   Compte d’utilisateur d’administration
    DefaultAccount     False   Compte utilisateur géré par le système.
    Invité             False   Compte d’utilisateur invité
    La Langouste       True
    Le Crabe           True
    WDAGUtilityAccount False   Compte d’utilisateur géré et utilisé par le système pour les scénarios Windows Defender A...
  3. Delete the user account by entering its last name (eg: « La Langouste »):
    Remove-LocalUser -Name "Nom d'utilisateur"
  4. There you have it, the user has been deleted!

Congratulations! You deleted a user account on Windows 10 using PowerShell. 👍

Useful links

]]>
https://theprinterdriver.com/549-delete-a-user-account-6-methods-le-crabe-info/feed 0
ShellExecuteEx error on Windows 10 https://theprinterdriver.com/540-shellexecuteex-error-on-windows-10 https://theprinterdriver.com/540-shellexecuteex-error-on-windows-10#respond Sun, 04 Oct 2020 22:27:02 +0000 https://theprinterdriver.com/?p=540

On Windows 10, when running or installing an application, a erreur ShellExecuteEx is displayed.
An error code 2, 5 or others may appear which leads to different problems.
For example, ShellExecuteEx failed; code 5 indicates access denied.
While the code 2 gives « The specified file could not be found ».

Here are some solutions to fix these ShellExecuteEx errors on Windows 10.

Erreur ShellExecuteEx – code -2

 

ShellExecuteEx error on Windows 10

Execute as administrator

First, try to run your application with an administrator token.
This can work if the ShellExecuteEx error affects a particular application.

The procedure to follow is as follows:
Right click on the application shortcut then run as administrator

Launch an application as a Windows 10 administrator

If this fixes the problem, you can force administrator execution by right-clicking on the shortcut then properties.
Then click on the Shortcut tab then at the bottom right on Advanced.
Finally in the new advanced properties window, check the option « Execute as administrator« .

Launch an application as a Windows 10 administrator

Recreate user session

The proposal and method presented is not viable in the long term, especially if the ShellExecuteEx error is displayed on many applications.

To make sure that the problem is not related to a corruption of the user session, try to create a new one.

To do so, follow the article: How to add or create an administrator user on Windows easily

If it works on the new user, transfer all your data to that user and delete the old one.

Uninstall protection software

If you really can not achieve anything and the ShellExecuteEx errors persist: try to uninstall your antivirus and all protection software including MBAM.

Other solutions

Windows Repair

Windows Repair also sometimes helps with connection problems.
Download and launch the software then click on the Open Repair tab.
Click on Present Common Repair then Go to start the repair.

Follow the tutorial: Windows Repair Tutorial

Windows Repair Tutorial: How to Repair Windows

Repair Windows 10

Finally if nothing works, you can try to repair Windows 10.
The following article explains how to do it: How to fix Windows 10 without losing data.

You found this article useful and interesting, do not hesitate to share it …

]]>
https://theprinterdriver.com/540-shellexecuteex-error-on-windows-10/feed 0
which VPN to choose in 2020? The guide for beginners! https://theprinterdriver.com/497-which-vpn-to-choose-in-2020-the-guide-for-beginners https://theprinterdriver.com/497-which-vpn-to-choose-in-2020-the-guide-for-beginners#respond Sun, 19 Jul 2020 19:37:50 +0000 https://theprinterdriver.com/?p=497

Want to know which is the best VPN ? Forget the VPN reviews that you can find here and there, Le Crabe has selected four VPNs for you that meet the essential criteria: security, privacy, speed, price and service.

Did the theprinterdriver help you? Help him back by disabling your ad blocker!


(thanks for the pinch )

Then, if you want to know why I chose these VPNs , you can read the second part of this guide which explains point by point what makes a VPN good and worse and why in the end I think the VPNs I have selected are the best. 😉

The best paid VPNs

Trust.Zone: the VPN with the best quality / price ratio !

If you are on a budget, Trust.Zone is clearly the place for you: impeccable service at an unbeatable price. 👍

Price:
Note: 4

NordVPN: if you want to move upmarket , I recommend NordVPN: up to 6 simultaneous connections, more protocols supported, Android applications, iOS, macOS, Chrome and Firefox for a low price .

And thanks to an impressive number of servers (over 5000), NordVPN will be able to connect you to the least saturated servers, guaranteeing you a secure connection that is accessible and faster!

Price:
Note: 5

ExpressVPN: arguably the best performing VPN service . ExpressVPN invested for network quality and providing the pass upscale strip, which is why we get download speeds ( download and upload ) than those of the competition .

It’s the one I’ve been using for years and it’s the best of the best for me. 👌

Price:
Note: 5

VPN comparison table

Trust.Zone

NordVPN

ExpressVPN

Price (per month) € 3 (1 year)
€ 2.59 (2 years)
€ 6.14 (1 year)
€ 3.50 (2 years)
7,50 € (1 an)
Country Seychelles Panama British Virgin Islands
Bandwidth Unlimited Unlimited Unlimited
Log conservation No No No
Protocols L2TP/IPSec et OpenVPN PPTP, L2TP/IPSec, IKEv2/IPsec et OpenVPN PPTP, L2TP/IPSec, SSTP et OpenVPN
Control channel encryption ( SSL handshake ) RSA-2048 RSA-2048 RSA-4096
Data channel encryption ( SSL Record ) AES-256 AES-256 AES-256
Number of countries 32 62 94
Number of servers 130 5000+ 2000+
Peer-to-peer Authorized Authorized Authorized
Simultaneous connections 3 6 5
Applications Windows Windows, macOS, Linux, Android, iOS, Chrome and Firefox Windows, macOS, Linux, Android, iOS and BlackBerry OS
Router compatibility Yes Yes Yes
Bitcoin Yes Yes Yes
Free try Yes, 3 days Yes, 30 days (satisfied or refunded) Yes, 30 days (satisfied or refunded)
Link Trust.Zone (official site) NordVPN (official site) ExpressVPN (official site)
Note 4 5 5

My opinion :

I scoured all the offers available on the market: ExpressVPN, NordVPN and Trust.Zone meet all the selection criteria. By choosing one of them, you will not be disappointed !

I have been using ExpressVPN for 2 years and highly recommend it . Every time I tried another provider from the same range, I reverted to ExpressVPN. Speed, simplicity and quality of service: it’s perfect! 👍

Did the theprinterdriver help you? Help him back by disabling your ad blocker!


(thanks for the pinch )

The best free VPN

TunnelBear: among the mass of free VPNs, it is the one that respects users the most. No ads, no logging, just a bandwidth limit of 500MB. 👍

You can upgrade to the Premium offer at any time, which does not have the bandwidth limit of 500 MB: TunnelBear subscription at € 4.99 / month (1 year).

Price:
Note: 4

Details on TunnelBear

TunnelBear

Price (per month) 2 Free : 0,00 $ (0,00 €)
Premium : 4,99 $ (4,50 €) (1 an)
Adding advertisements No
Country Canada
Bandwidth Free : 500 MB
Premium : Unlimited (Premium)
Log conservation No
Protocols IPSec/IKEv2 (iOS) et OpenVPN (Windows, Android et macOS)
Chiffrement du canal de contrôle (SSL Handshake) RSA-4096
Chiffrement du canal de données (SSL Record) AES-256
Nombre de pays 20
Nombre de serveurs
Peer-to-peer Refusé
Connexions simultanées 5
Applications Windows, macOS, Android, iOS, Chrome et Opera
Compatibilité routeur Oui
Bitcoin Oui
Essai gratuit Premium Oui, 7 jours
Lien TunnelBear (site officiel)

Mon avis :

Je vous conseille toujours de choisir un VPN payant ! (voir les chapitres suivants)

But if you want to get your hands on it before getting down to business, or if you just need a VPN to access blocked content , you can turn to TunnelBear ! 🐻

Did the Crab help you? Help him back by disabling your ad blocker!


(thanks for the pinch )

Why these VPNs? Explanations!

If you have landed here, you have decided: you want to set up VPN access on your PC to protect your anonymity ! 💪

Yes but there you have it, you quickly realized that there are an immeasurable number of sites that offer their VPN solutions and you do not know where to turn.

 »  What is the best VPN ? » Is this one better than the one I just saw earlier? How to decide between them? Why pay for a VPN when there are free ones?  » 🤯

To crown on all full of sites offer comparative touting some VPN rather than others, and you do not know if you can trust them. 🤔

You feel your head is going to explode and despite you do not know if you can trust all these VPN comparators, in short, you are lost.

Hop hop hop my friend, let’s raise our heads!

By reading the following lines, you will have clear ideas and you will understand why you can trust my selection. You will understand why I selected Trust.Zone , NordVPN and ExpressVPN and why I consider them the best VPNs. ☝️

Ask yourself the right questions

Most people have the wrong questions when choosing a VPN. Here are examples of questions that immediately come to mind, wrongly:

  1. Which VPN is the cheapest (or free)?
  2. Which has the most servers?
  3. Which VPN has the most features?

As much to say to you that if you also ask yourself these questions… you are all wrong. 😜 Here are the (right) questions you should ask yourself when choosing a VPN:

  1. Which VPN offers the best security, the best anonymity?
  2. Can I trust this VPN?
  3. What is the fastest VPN?
  4. Does this VPN have a mobile app for iPhone or Android?
  5. Does this VPN have good customer service in case I have technical issues?
  6. Which VPN has the best value for money?

With these questions in mind, we are well equipped to choose the best VPN possible !

But wait and see… I see that the temptation of free is still in your head! Unhappy 😱 Let me explain why the free is really not a good choice and why you do not want it!

The problem with free VPNs

There is no Good Samaritan in business. There is also no Good Samaritan in the Internet security business. Business is business .

If you get something without paying a single penny , you have to ask yourself how the company offering you the service is making a living. It has to be paid somewhere, especially that for a VPN provider, offering bandwidth is expensive.

When you choose a « free » VPN , here’s what the provider of that VPN does 99% of the time:

  • It severely limits the download speed. You are limited to a certain speed and especially to a certain volume of data per day or per month.
  • It keeps logs of all your internet activity, the sites you visited, the files you downloaded… It sometimes sells these logs to marketing companies (or governments).
  • It inserts additional advertising on the pages you visit, it can even install adware / crapware on your system.
  • It protects (it happens) only your web browser, and not your entire Internet connection.
  • It offers very few features, few servers are offered, and it constantly solicits / attacks you to buy one of their paid solutions.

It cools, doesn’t it? 🙃 Honestly, if I only had one piece of advice for you: go for a paid VPN , you won’t regret it. For around € 5 per month, you will have a quality encrypted Internet connection. I find the amount reasonable given the service provided. 👍

Well, free VPNs can be useful if you want to discover and test the functioning of a VPN before you really start by turning to a paid solution.

Also, if your goal is to bypass censorship of the country you are in or to override geographic restrictions and only for that, then a free VPN will do the trick. However, you should be aware that your privacy will probably not be respected . 😕

If I still had to choose one, I would choose TunnelBear : it is the only provider to offer a free VPN that respects users (but limited to 500 MB).

Choosing a VPN: what not to do

To choose a VPN, do not jump on the one that offers the most features .

A VPN provider can offer a VPN with all the features in the world, that doesn’t mean it works well. Believe me, there are a lot of VPNs that do not work well, not well at all: incessant disconnections, connection to servers random / refused / saturated, connection software that freezes …

You know, anyone can offer a VPN service. Since the software to create a VPN is open source and free, the first of the incompetent can start offering its own VPN service.

Do not blindly throw yourself on VPNs  which are in first positions on Google . The first page at Google is (often) places gleaned through marketing and technical work that has nothing to do with the intrinsic quality of the VPN.

Likewise, don’t be fooled by these VPN comparators : most of them are funded by VPN providers who, in exchange for a few dollars, find themselves propelled into the top 3 VPNs to choose first.

VPN comparison sites are unreliable. 😬

The criteria for choosing the right VPN

The 3 essentials when choosing a VPN provider are: trust, security and reliability 👌

In general, if you want to be sure of your move, choose a  recognized VPN provider , having good press with users . If these VPN providers are popular, there is a reason. They tend to provide a good and reliable VPN, responsive customer service. Because of their popularity, they have a lot to lose if they betray the trust of users with an increasingly slower connection, a buggy application, a new privacy policy frowned upon … The slightest misstep would be dramatic for them.

The popularity of a VPN is a popularity that has been achieved through the satisfaction of several thousand users . It is a guarantee of confidence and a good starting point! 😎 FYI, here are two of the most popular providers: Proxy.sh and Private Internet Access .

But it’s not just the popularity of a VPN provider that counts it’s also a personal choice, you don’t have the same needs as the one who absolutely wants an Android application or the one who wants a server in Hong Kong!

This is why we are going to see the criteria on which you should base yourself in order to choose the VPN that suits you best .

Location of the supplier and its servers

When choosing a VPN provider, it is important to check where the company is based and where its servers are located .

A VPN provider installed, for example, in the United States is subject to United States laws. Some privacy advocates suggest that we should avoid any provider based in a country with laws that require data retention. Others suggest being particularly cautious of countries involved in the Five Eyes (alliance of intelligence services) such as Australia, Canada, New Zealand, the United Kingdom and the United States. United.

Also, it is important to be aware of the location of the servers offered by the VPN provider. Make sure that the latter offers servers suited to your needs. Most people use a VPN to access content that is not accessible in their country of residence.

If, for example, you want to watch videos that are only accessible to US residents, you will need a provider that offers one or more US servers. By being connected to one of these servers, it will be as if you were connected from that country, which will give you access to the multimedia contents of the site which are normally viewable only by the inhabitants of that country.

Encryption protocols

When you visit a VPN provider’s site, you are sure to see terms like OpenVPN, PPTP, IPsec, etc. These are all  encryption protocols . Before installing and configuring your VPN connection, you will need to think about the encryption protocol that you will use. This is a very important point. It is he who will define the  level of security of your Internet connection.

Most VPN providers offer a choice of several protocols. Long story short, see if the provider offers L2TP / IPSec or OpenVPN, which are the two best possible security options right now. The PPTP protocol should be avoided because of its too many vulnerabilities, which can be easily exploited. Same thing for the old L2TP protocol (unlike L2TP / IPSec).

This is the main information that you must remember regarding encryption protocols: favor L2TP / IPSec and OpenVPN , avoid PPTP and L2TP. But I feel you are hungry, you want to know more!

You said it ! What are the characteristics of each of these protocols?

To know everything, see this article:

https://lecrabeinfo.net/vpn-les-protocoles-de-chiffrement.html

Encryption key length

Small reminder on encryption. Encryption is the process that allows data to be encoded, so that only the machine with the correct decoder can be able to read the data transmitted to it. The code and the decoding of this data is done using an encryption key  (this is called symmetric encryption).

Now back to the VPN. From your PC, you send the message “downloads the Windows10.iso file” to the VPN server, which you encrypt using the encryption key. The encrypted message travels over the public network (Internet), it is indecipherable. Thanks to this same  encryption key  that you share with the VPN, the VPN server will decrypt the coded message and will be able to read your message « download the file Windows10.iso ». The principle is the same when the VPN sends you data: it sends you encrypted data and thanks to the encryption key, you can decode and interpret the data sent.

The  length of this encryption key  is an important security parameter. The length of the key determines how long it will take to break it through a brute force attack. As a reminder, a brute force attack consists of trying all possible combinations until you find the right combination. The longer the key, the longer it will take to decipher it . OpenVPN provides for example 128-bit (256-bit) encryption to establish a secure connection between your PC and the server and 2048-bit for secure authentication.

Choose VPN providers that offer at least the 128-bit AES encryption algorithm . You are guaranteed that your key will never be forcibly broken by any program.

privacy policy

If the confidentiality of your data and your activities on the internet is the reason why you chose to have a VPN, then you should pay particular attention to the privacy policy of the VPN provider and in particular its policy concerning logs. (logs of your connections and your activities).

Even if your connection is encrypted and no form of spying wants to see what you are doing, the VPN provider can still keep an eye on your activities. This is why it is important to choose a trusted provider who – as far as possible – does not keep logs of your data. I say “as far as possible” because for a company that provides bandwidth, logs are very useful: it is a way for them to facilitate maintenance and ensure that the network is functioning properly.

If you are extremely worried about your safety, try to find a provider that doesn’t keep anything, really nothing. However, keep in mind that keeping logs does not necessarily mean spying, it is also a way to ensure a stable and fast connection .

The privacy policy varies from one provider to another: some keep temporary logs which they delete regularly, some keep nothing at all while others keep all your connection data.

The supplier’s privacy policy also depends on the country in which the company is located and the laws to which it must be avoided.

i Info:If you’re really concerned about the privacy of your data, you can go even further and find a VPN provider that acceptscryptocurrency payments, like Bitcoin. This will allow you not to provide your payment card details (on which your first and last name appears).

Service: bandwidth, simultaneous connections …

Some providers offer VPN access but with some  limitations . It is important to learn about each of these possible limitations before choosing a VPN:

  • Bandwidth.
  • Access time.
  • Number of simultaneous connections.
  • Blocking of certain services.

Bandwidth

When you subscribe to a VPN offer, everything is not necessarily unlimited . It will be necessary to pay attention to the conditions – generally written in very small – concerning the use of the bandwidth. Today, we are still consuming more bandwidth: playing videos in 1080p, downloading files of several GB… And for a supplier, providing bandwidth is far from being free. This is why some of them limit the amount of data you can download per month.

If you want a VPN to download and send files (legally or illegally) in large quantities, then you will have to be careful that the VPN provider does not limit the amount of data you can download ! Do not choose a VPN that imposes a bandwidth restriction unless the limit is extremely high (multiple TB). Often there is a limitation to allow the supplier to take action against the customer in the event of abuse of the service. If you download for more than 100TB / month, you might get a warning 😀

In general, also remember that using a VPN can slow down your internet connection a bit . So don’t be surprised if you don’t download at 100 Mb / s. 😉


Access time

Some providers limit the time that you can stay connected to their VPN. If you want to have a secure connection 24/7, please choose a provider who offers this functionality.


Simultaneous connections

If you want VPN access on several of your devices (PC, mobile, tablet…), you will need a provider that allows multiple simultaneous VPN connections .

3 simultaneous connections is the union minimum. Also, see if you can use a different server on each of your machines: the PC on a Swedish server, the mobile on a Dutch server … If you need to of course!

i Info:you piuvez configure the VPN client directly on your box (I know that with the Freebox Revolution can do)! Like this, you will not need to configure VPN access on each of your machines. Afterwards, this implies that you will have the same type of connection (same server, same encryption protocol) on each device.

Blocages (peer-to-peer)

Thorny subject! We’re not going to lie to each other, some of us want a VPN to download illegal content (movies, music) without getting caught. And for that, the VPN is the ideal choice .

Before launching your head down, you will have to check if the VPN provider does not block certain protocols or certain services (in particular peer-to-peer ).

The best way to find out is to do a Google search to find testimonials or official statements from the supplier that stipulate whether or not they accept file sharing ( downloading torrents for example).

Mobile applications, OS supported

Surely it is not only on your PC  that you want to be anonymous.

In our ultra-connected society, we all have several devices that are connected to the Internet: laptop, smartphone, tablet … And each of these devices runs on a different operating system: Windows on the PC, Android on the smarphone, iOS on the tablet …

Be sure that the VPN provider offers a solution to connect you to each of your devices  thanks to compatible Windows, Linux, Android, iOS applications …

Price

As I told you in the preamble, it is better to turn to a paid VPN .

VPN providers generally offer several plans: 1 month, 3 month and 12 month subscription. The longer the duration of the subscription, the more attractive the monthly price will be .

A word of advice: start by taking the smallest possible subscription (usually 1 month) to test the VPN . If you are satisfied with the quality of the service offered, you can then opt for the 12-month subscription, which is more attractive. In any case, that’s what I did. 😉

Conclusion

I hope this guide has given you a clearer picture of VPNs and the criteria you should use to choose the one that is best suited to your needs.

What you need to remember is that only a paid VPN can give you a stable, quality encrypted connection with an honest privacy policy and high-end features. For just a few euros a month I’m sure you won’t regret it .

Trust.Zone, NordVPN and ExpressVPN meet all the important criteria that I have listed in the previous paragraphs.

Of course, you can turn to another provider: Proxy.sh, ProtonVPN or even OVPN (among others) also offer a quality service. 👍

]]>
https://theprinterdriver.com/497-which-vpn-to-choose-in-2020-the-guide-for-beginners/feed 0
Reset a lost or forgotten Windows password with MediCat USB https://theprinterdriver.com/468-reset-a-lost-or-forgotten-windows-password-with-medicat-usb https://theprinterdriver.com/468-reset-a-lost-or-forgotten-windows-password-with-medicat-usb#respond Fri, 17 Jul 2020 17:00:47 +0000 https://theprinterdriver.com/?p=468 Lost or forgot your Windows password? Have you tried everything but can’t find or reset your user account password? Don’t worry, one last solution exists: MediCat USB stick !

theprinterdriver helped you? Help him back by disabling your ad blocker!

(thanks for the clip )

MediCat is a backup operating system (live CD type) which is installed on a USB key and which allows access to a suite of tools to troubleshoot your computer and perform all kinds of operations on Windows such as … reset lost or forgotten password for a user account.

In this tutorial, we will see how to create a MediCat USB key and how to use it to reset a lost or forgotten Windows password.

Start MediCat backup USB key

  1. Download the ISO of MediCat (mini Windows 10 v19.10).
  2. Create a bootable MediCat USB key with Rufus.
  3. Start your computer from the MediCat USB key.
  4. Wait while MediCat loads.
  5. Change the keyboard layout for French using the keyboard shortcut Ctrl + Tab. A French flag icon should appear in the notification area.
  6. From now on, you have three software to reset the password of a Windows user account:
    • PCUnlocker Enterprise
    • Reset User Account Passwords
    • Windows Password Recovery
Crab helped you? Help him back by disabling your ad blocker!
(thanks for the clip )

Reset Windows password with MediCat

With PCUnlocker Enterprise

  1. Open PCUnlocker Enterprise:
    • on the desktop, double-click Reset User Passwords.
    • in PortableApps, select Reset User Account Passwords.
  2. Select the user account with the password to reset and click Reset Password.
  3. Confirm resetting the user account password by clicking on Yes.
  4. Here, the user password has been deleted!
  5. Restart your computer then log in with the user account. Don’t forget to set a new password!

Congratulations! You have reset the password for a Windows user account using MediCat and PCUnlocker Enterprise. 👍

With [email protected] Password Changer Ultimate

  1. Open [email protected] Password Changer Ultimate by selecting PasswordChanger in PortableApps. On the first screen, click on Next.
  2. Please select Search all volumes for Microsoft Security Accounts Manager Database (SAM) then click on Next. If you want to manually select the partition where Windows is located, select one of the other two options.
  3. Select the SAM file for your Windows installation then click on Next.
  4. Select the user account with the password to reset and click Next.
  5. Check that the box Clear this User’s Password is well checked then click on Next.
  6. Confirm password reset by clicking on Yes.
  7. Here, the user password has been deleted!
  8. Restart your computer then log in with the user account. Don’t forget to set a new password!
Congratulations! You have reset the password of a Windows user account using MediCat and [email protected] Password Changer Ultimate. 👍

Avec Windows Password Recovery Pro

  1. Open Windows Password Recovery Pro by selecting Windows Password Recovery in PortableApps.
  2. Select Windows installation, the user account with the password to reset and click Reset Password.
  3. Click on Yes. Here, the user password has been deleted!
  4. Restart your computer then log in with the user account. Don’t forget to set a new password!

Congratulations! You have reset the password for a Windows user account using MediCat and Windows Password Recovery Pro. 👍

theprinterdriver helped you? Help him back by disabling your ad blocker!
(thanks for the clip )

]]>
https://theprinterdriver.com/468-reset-a-lost-or-forgotten-windows-password-with-medicat-usb/feed 0
The 4 best torrent software (BitTorrent clients) https://theprinterdriver.com/443-the-4-best-torrent-software-bittorrent-clients https://theprinterdriver.com/443-the-4-best-torrent-software-bittorrent-clients#respond Fri, 17 Jul 2020 16:08:43 +0000 https://theprinterdriver.com/?p=443 BitTorrent is a data transfer protocol peer-to-peer (P2P) which allows you to download and share files with other users worldwide via the Internet faster and more effectively.

Crab helped you? Help him back by disabling your ad blocker!

(thanks for the clip )

Unlike the HTTP protocol where the download is provided by a single distributor that can cause overloads and slowness, with the BitTorrent protocol the download and file sharing is done decentralized : All users who download a file share the parts of the file they have downloaded with other users, thus creating a virtuous circle.

No more queues or saturated servers: availability is immediate, downloads are faster.

How do I download a file via BitTorrent?

To download a file via BitTorrent, you need two things:

  • A client BitTorrent.
  • The .torrent file of the file you wish to download. The .torrent file contains the IP address of the BitTorrent tracker which helps communication between the seeders – those who share the file – and the leechers – those who download the file. You can also recover the lien Magnet magnet: of the file (if available), it performs the same function as the .torrent file.

There are a plethora of BitTorrent clients but what is the best software to download these precious torrents?

In this guide, we will see the 4 best torrent software (BitTorrent clients) preferred !

Ranking of the best BitTorrent clients

N°1 : qBittorrent

qBittorrent is a cross-platform, lightweight and open source BitTorrent client available on Windows, macOS, Linux, FreeBSD and OS / 2.

If you are looking for the BitTorrent client the most complete, choose qBittorrent.

qBittorrent on Windows 10
  • Clear and easy to use user interface
  • No advertising
  • Integrated search engine (simultaneous search on many Torrent search engines)
  • Many BitTorrent extensions supported: Magnet links, DHT (Distributed Hash Table), PEX (Peer Exchange), LSD (Local Service Discovery), private torrents, encrypted connections…
  • Remote control via web interface
  • Sequential download (read files being downloaded)
  • Advanced torrents, trackers and peers control (queue, prioritization)
  • Bandwidth control
  • Torrent creation tool
  • IP filtering (compatible with eMule and PeerGuardian formats)
  • Compatible IPv6
  • UPnP and NAT-PMP port forwarding
  • Available on all platforms in ~ 70 languages
Options de qBittorrent

Download qBittorrent

N°2 : Transmission

Transmission is another open source BitTorrent client, extremely light and very easy to use, available on Linux, macOS, Windows and embedded systems.

If you are looking for the BitTorrent client the lightest and simplest, choose Transmission.

Transmission on Windows 10
  • No advertising
  • Minimalist and easy to use interface
  • Nothing to configure: everything is configured by default so that downloads and uploads work right away
  • Transmission uses less CPU and RAM than any other BitTorrent client. It even uses less CPU than some torrent clients without GUI
  • Advanced features: encryption, web interface, peer exchange, Magnet, DHT, µTP, UPnP and NAT-PMP links, port forwarding, download and upload speed limitation, etc.
Transmission Options

Download Transmission

N°3 : Deluge

Deluge is another lightweight, free, cross-platform BitTorrent client available on Linux, Windows, and macOS.

It’s a alternative interesting to qBittorrent and Transmission.

Unfortunately, the latest versions 2.0.x are currently only available on Linux. On Windows and macOS, we must for the moment be content with version 1.3.15.

Deluge sur Windows 10
  • No advertising
  • Three user interfaces available: GTK interface for desktop environments (Windows, Linux, macOS), web interface for web browsers (Firefox, Chrome) and command line interface
  • All the advanced functionalities are available: jamming of the protocol, DHT, discovery of peers in the local network (LSD), exchange of peers (PEX), UPnP, NAT-PMP, global speed limit and by torrent…
  • Many plugins are available to get the most out of Deluge and extend its functionality, developed by members of the Deluge community.
Options de Deluge

Download Deluge

N°4 : Tixati

Tixati is a 100% free, simple and easy to use BitTorrent client, available on Windows and Linux.

Tixati uses download algorithms which in some cases allow you to download faster.

Rather reserved for experienced users, Tixati is an ultra-complete BitTorrent client which allows you to configure the BitTorrent network and transfers to little onions.

Tixati on Windows 10
  • No spyware, no ads
  • Advanced configuration to configure your BitTorrent client perfectly
  • Ultra-efficient peer throttling / unblocking algorithms that guarantee the fastest downloads
  • RC4 connection encryption for added security
  • Detailed bandwidth mapping
  • Support for DHT, PEX and Magnet links
  • Easy and quick installation (no Java, no .NET)
  • Advanced features such as RSS, IP filtering, event scheduler
Tixati options

 

Crab helped you? Help him back by disabling your ad blocker!

(thanks for the clip )

BitTorrent clients not recommended

The following BitTorrent clients are not recommended:

  • µTorrent 3.x : closed source code, invasive ads, malware-infested installer, some features only available in the paid version.
  • µTorrent 2.2.1 : obsolete (software dating from 2001), makes your PC potentially vulnerable to hackers and malware due to unpatched security holes.
  • BitTorrent Classic : same as µTorrent 3.x (they are the same software). To avoid.
  • Vuze : too heavy, installer infested with malware. If you are nostalgic, turn to BiglyBT which is a fork of Vuze / Azureus.

Crab helped you? Help him back by disabling your ad blocker!

]]>
https://theprinterdriver.com/443-the-4-best-torrent-software-bittorrent-clients/feed 0
Backdoor.Linux.Bew.a and Client BitCoin https://theprinterdriver.com/394-backdoor-linux-bew-client-bitcoin https://theprinterdriver.com/394-backdoor-linux-bew-client-bitcoin#respond Fri, 17 Jul 2020 15:26:58 +0000 https://theprinterdriver.com/?p=394 Here is a little post about an infection found on servers that I have been administering recently.
It all starts with an alert by email from Munin freshly set up. Munin is an rddtools grapher who sends alerts when thresholds are exceeded, in this case it was the CPU.
Which is super convenient.

Les graphs :

hack_serveurs2 suddenly, a little tour on the server and I launch top and there the drama, I see a bfgminer process, which looks like a Bitcoin client from the name.

hack_serveurs3 I take a look at the processes and there I see a .bbb – which is not good.
Files starting with. under Linux are hidden.
The latter is executed as root.

hack_serveurs4

So I launch the command

find / -regextype egrep -regex ".*/.[a-z0-9_.-]+$" -exec file {} ;|grep executable

in order to list the hidden files likely to be executables.
Bingo is crowded:

/usr/local/psa/tmp/…/.tar: ELF 32-bit LSB executable, Intel 80386, version 1 (GNU/Linux), statically linked, stripped
/usr/local/psa/tmp/…/.bbb: ELF 32-bit LSB executable, Intel 80386, version 1 (GNU/Linux), statically linked, stripped
/usr/local/psa/tmp/…/.ew3: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, corrupted section header size
/usr/local/psa/tmp/…/.true: ELF 64-bit LSB executable, AMD x86-64, version 1 (SYSV), for GNU/Linux 2.6.9, dynamically linked (uses shared libs), stripped

A small recovery of files and scan on VirusTotal, we find a certain Backdoor.Linux.Bew.a whose detections are quite moldy:
https://www.virustotal.com/fr/file/b208643dbec66168ee66d8b7d8210a2156a2444e3bc9885be9ae07633a50cbf5/analysis/1395411155/
https://www.virustotal.com/fr/file/f4308d69578ffbe48216e99adfa1ac8c7fe357ac86a602c655e3241f29687323/analysis/1395411156/
https://www.virustotal.com/fr/file/7498e90c019f783c9e05abd33de746e78fb449f36d6a741d3c52502c0a45f815/analysis/1395411139/
https://www.virustotal.com/fr/file/7498e90c019f783c9e05abd33de746e78fb449f36d6a741d3c52502c0a45f815/analysis/1395411139/

Some files date from June 2013.

There is also a crond launched by Apache.

hack_serveurs5

The bitcoin process is in defunct, we can’t kill it directly.
You must kill the parent process (here httpd).

hack_serveurs4 hack_serveurs8

Note that ps does not show everything, at least it shows the process names with the desired names, suddenly it is possible to use already existing process names.
pstree lets see this:

hacklinux_pstree

A small egrep -r « base64 | eval | deflate | REQUEST » * php and there are some PHP Backdoor on the sites:hack_serveurs6 hack_serveurs7

It appears that the malware has been dropped on a Parallels Plesk Panel vulnerability
Note that the servers (fifteen) had no firewall, it does not help either.

When you know it is relatively conspicuous, especially by linking the processes the command find helps a lot.
We see here the importance of a minimum of monitoring tools that can warn of the presence of a Bitcoin client when the latter is a bit too much.

EDIT –

A small edit with a variant, cpio: open errors when using yum.

hack_linux_permissions This is because we cannot write in certain folders, in particular / usr / bin and / sbin
Hackers added s (secure deletion) i (immutable) a (append only) attributes in extended permissions.

The lsattr command is used to list the attributes and the chattr command to modify them, all the extended attributes must be removed at once: chattr -R -i -a -s
hack_linux_permissions2

 

]]>
https://theprinterdriver.com/394-backdoor-linux-bew-client-bitcoin/feed 0
Tutorial and Guide LogMein https://theprinterdriver.com/380-tutorial-and-guide-logmein https://theprinterdriver.com/380-tutorial-and-guide-logmein#respond Fri, 17 Jul 2020 15:09:20 +0000 https://theprinterdriver.com/?p=380

LOGMEIN is software that allows you to control your PC from any other computer with an internet connection.
In addition, several products are offered to you on the publisher’s site:
LogMein Pro, LogMein IT Reach, LogMein … (LogMein is the free version and the others are paid versions with a 30-day trial period …
At the end of this period you can either switch to the free version, or buy the product …).

Summary

  1. Tutorial et Guide LogMein
    1. Summary
    2. LogMein overview
    3. Installation
    4. Conclusion

LogMein overview

LogMein is a program which, like TeamViewer or Spark Angel, allows you to take control or share your desktop via the internet.
In this domain of grip, VNC is often used, only the big defect of VNC is that it acts as a service, the client connects to the server part to take control of the machine. At a time when the boxes are very popular, it is advisable to create a routing to allow the connection.

LogMein works differently, the two workstations (the one taking the hand and the one whose hand we want to take) acts as a client and connects to a third-party server.
There is no need to change your network configuration.

Installation

The LogMeIn site: https://secure.logmein.com/

  • Once on the publisher’s site, click on Download LogMein
  • Click on the button Next to go to the next step.
Tutorial et guide LogMeinFree
  • Complete by indicating your e-mail address …
  • Click on the button OK
Tutorial et guide LogMeinFree
  • Launch the downloaded application.
  • You then get the window below, click on following.
Tutorial et guide LogMeinFree
  • You must accept the software user conditions.
  • Click on I accept to accept the LogMein license agreement.
Tutorial et guide LogMeinFree
  • Choose the type of installation, (I recommend the type By default.)
  • Click on following to go to the next step.
Tutorial et guide LogMeinFree
  • Enter a brief description to identify the computer in the future. (Example: the name of the owner of the computer.)
  • Click on following to go to the next step.
Tutorial et guide LogMeinFree
  • You must choose the location where the application will be installed (by default C: Program Files LogMeIn)
  • If you want to change the destination folder, click on Browse.
  • Then click on following to go to the next step.
Tutorial et guide LogMeinFree
  • Installation is complete, click on Finish to complete the installation.

Tutorial et guide LogMeinFree

An icon has been added to the task bar at the bottom right of your screen.

Your computer is now accessible via the publisher’s site.

To control his / her PC from another computer, go to the publisher’s site:
https://secure.logmein.com/home.asp?lang=fr

Tutorial et guide LogMeinFree

Once on the site, connect using your E-mail and your password entered during the initial registration on the site.

You then get the window below.

  • Your / your « client computer (s) » is / are indicated there.
  • Then click on the name of a computer to connect to it. (If you wish to add a computer, then click on « Add a computer« and enter their name.)

You will find at the top left of this window several options:

  • Groups: to classify your computers by categories (ex: Family, Friends, Office …);
  • Alerts: Alerts are only available for computers with LogMeIn IT Reach subscriptions (Paid LogMein version). Alerts notify you of specific events or problems that occur on one or more IT Reach computers. You can set up multiple alerts and deploy them separately to specific groups of computers;
  • Configuration: Configuration management is only available for computers with LogMeIn IT Reach subscriptions. This feature allows you to configure LogMeIn security preferences and settings and deploy them to any group of IT Reach computers; Inventory: allows you to have an overview of the inventory of hardware, software … Options available only for computers with LogMein IT Reach subscriptions;
    • Users: allows you to add other administrators and secondary users who can control computers …;
    • Subscriptions: to consult the number of computers assigned to this or that product (Pro, free and IT Reach) …;
    • Installation links: to deploy paid products on remote computers;
    • Reports: generate reports for your computers (to know the type of subscription, start date, status …);
    • Account: modify your information;
    • Billing: only applies to you if you have a subscription for a paid product.

Just click on the name of a computer to connect to it.

Tutorial et guide LogMeinFree
  • The connection is made, you then get this window. Enter the username and password.
  • These are the ones used to open the windows session … It is then entirely possible to create a Windows user expressly for getting started with your own password that you will give to your correspondents, for more user management information, see Windows user management

Tutorial et guide LogMeinFree

You then get the window below.
When you take control of a computer for the first time, from a computer equipped with the Firefox browser, you will be offered the installation of an extension module for Firefox. It is advisable to install it.

Tutorial et guide LogMeinFree

You can, if you wish, modify the parameters and / or options (preferences) for the computer to which you are connected, which are among others:
(To set preferences, simply click on the « Go >> » button in the « Preferences » column)

Remote access control parameters:

  • View and change preferences for remote access sessions

Security settings:

  • Security settings on your remote computer

Network settings:

  • View and modify the connection data of your remote machine

Log settings:

  • Preferences for LogMeIn notification files

Restart options:

  • Look at the options to restart LogMeIn or restart your remote computer

Advanced options:

  • View and modify the advanced options that determine the behavior of LogMeIn.

You can now control the computer with which you are connected, for this you just need to click on the « Go >> » button in the « Remote control » column or click on the « Remote control » button in top left of the page.

Note : when you take control of a computer for the first time, from a computer equipped with the Firefox browser, you will be offered the installation of an extension module. It is strongly recommended to install it, because it makes rendering of what is happening on the remote computer fluid.

Tutorial et guide LogMeinFree

Once you have taken control of the remote computer, a message will appear on the top right of the screen, informing your correspondent that his computer is controlled remotely by …
Tutorial et guide LogMeinFree

This is what your screen looks like after you take control of a computer.
You can now do whatever you want (almost anything …) on the remote computer, as if you were sitting there in front of it!
It is also possible to switch to « Full screen » mode, for this you must click on the « Full screen » button. You will then have the impression of really being at the computer.

On the bottom right of the page you can see that there is a yellow padlock and the inscription « Encryption: 256 bits ». This means that all transactions made by LogMein are encrypted in 256 bits …

To stop controlling the computer, click the « Disconnect » button.

Conclusion

Any computer you want to take control of must have logmein software.
You can then take control of it from any computer (linux, mac, windows …) with an internet connection.
LogMein will be very useful if you take care of the computers of your family, your friends …
You can also work on your desktop PC from home or vice versa …

 

]]>
https://theprinterdriver.com/380-tutorial-and-guide-logmein/feed 0
CounterSpy Tutorial and Guide https://theprinterdriver.com/351-counterspy-tutorial-and-guide https://theprinterdriver.com/351-counterspy-tutorial-and-guide#respond Fri, 17 Jul 2020 15:00:55 +0000 https://theprinterdriver.com/?p=351 CounterSpy is an excellent anti-spyware by the software publisher Sunbelt. Sunbelt is also the editor of the famous free Kerio firewall: Tutorial and configuration of Kerio Firewall.

    Installation

    You can download CounterSpy from this download page
    This version is currently in beta version, which means that it is not finalized, it is not currently advised to use it.
    You must also register to download this version.

    • Execute the freshly downloaded file
    • Welcome to the installation program, click on the button Next to go to the next step

    Tutorial et guide CounterSpy

    • You must then accept the license to use, Click on the button I Agree
    • Click on the button Next to go to the next step

    Tutorial et guide CounterSpy

    • You must indicate in which folder CounterSpy will be installed, by default it offers you the folder C:Program FilesSunbelt SoftwareCounterSpyConsumer
    • You can modify this path using the button Browse
    • Click on the button Next to go to the next step

    Tutorial et guide CounterSpy

    • Copying files is then ready …
    • Click on the button Next to go to the next step

    Tutorial et guide CounterSpy

    • When the copying of files is finished, you get the window below

    Tutorial et guide CounterSpy

    • Once the copy is finished, click on the button Finish to complete the installation.

    Tutorial et guide CounterSpy

    Assistant de configuration de CounterSpy

    You can start CounterSpy from the Start menu / Programs / SunBelt Software / CounterSpy / CounterSpy
    At the first start, the configuration wizard is launched to configure the software.

    • Click on the button Next to go to the next step

    Tutorial et guide CounterSpy

    • You can register the software by clicking on the button Register CounterSpy Now, this allows you to keep the definition of spyware up to date. In case you plan to use CounterSpy only to clean your computer, you can skip this step.
    • Click on the button Next to go to the next step

    Update

    During the first start, CounterSpy updates the definition of spyware.
    When the download and installation is complete, click the button Close

    CounterSpy is then started. In the top part, an icon bar is available horizontally, you can navigate through the various options of the software from there.

    In the main window, you will find the classic information, namely:

    • The last scan carried out with the elements detected on the right side.
    • At the bottom left, the possibility to configure automatic scans.
    • At the bottom right, the date of the definition of spyware.

    To start a scan of your computer, simply click on the Scan now button on the software home page.
    The scan then starts:

    • Top left, you can view the item being scanned
    • Bottom left, the last infectious elements detected.
    • On the right, statistics on the progress of the scan.
    Tutorial et guide CounterSpy

    Active Protection checks the files you download and run on your computer. If the latter is potentially dangerous, an alert window will open (see below) to warn you.

    You can then stop the execution of the program by clicking on the button Block.
    If you are sure that this program is not dangerous, then click on the button. Allow.

    L’option Rember this action allows you to record the action for the said file, if you replay this file later, CounterSpy then performs the same operation (allow or block).

    Tutorial et guide CounterSpy

    Real-time protection is configured from the button Active Protection.
    Protected items appear in a list. You can deactivate certain elements by clicking on the button:

    Tutorial et guide CounterSpy

    System Tools

    My PC Explorers

    My PC Explorers allows you to configure Windows elements such as startup programs, running processes, BHOS, LSP etc … This option is therefore intended for an advanced audience.
    The various configuration options are accessible from a menu on the left.

    My PC checkup

    My PC Checkup allows you to scan your computer to increase the security of it.
    After clicking on the button Scan to start the scan of your computer, you get a list of the elements at risk.
    Click on the button Check All at the bottom to select all these elements then click on the button Continue.
    CounterSpy will then correct these risks.

    History Cleaner

    History Cleaner allows you to delete the histories of different elements and programs of Windows in order to protect the confidentiality of your computer.
    After clicking on History Cleaner, the list of different histories is displayed, you can then check or uncheck the items you want to clean.
    The button Clean history then starts cleaning.

    Tutorial et guide CounterSpy

    Quarantine

    From the Manage Quarantine menu you can manage quarantined files.
    These appear in the form of a list, by checking the elements you can:
    Delete items: Permanently remove selected item
    Remove items from quarantine:

    Note that the check all items button, you can select ALL the elements of the list
    Tutorial et guide CounterSpy

    Settings

    CounterSpy’s settings are accessible from the top menu View then Settings.
    A menu on the left allows you to navigate in the various categories, we find in particular a good part of the configuration which was carried out by the configuration wizard after the installation phase.

    Tutorial et guide CounterSpy

     

    ]]>
    https://theprinterdriver.com/351-counterspy-tutorial-and-guide/feed 0