Pages

Avast! Antivirus 6 released

Avast! Antivirus 6 released: "Avast! Antivirus 6 releasedAVAST Software a.s. has released new versions of its popular set of anti-virus and security products.



Used by over 130 million users worldwide, Avast! Antivirus is one of the most trusted and recommended solutions for protecting against virus and spyware infections. Using the Free version of the software does not put you at any great disadvantage compared to the Pro version, which is not something you can say for a lot of free anti-virus suites that have paid equivalents.



Using the free version does require you to register the program using a valid e-mail address, but this only takes a minute and you have 30 days to stop procrastinating and do it.



Time and time again, Avast! has been recognized for its effectiveness at protecting systems. In 2008, AV Comparatives awarded the software an 'Advanced' rating for its performance, and awarded it an 'Advanced+' rating in 2009. In 2010, Avast! claimed the VB100 award from Virus Bulletin for, amongst other accomplishments, detecting 100 percent of in-the-wild virus samples it was exposed to.



AVAST Software may have gotten something of an ego-boost in November 2010. During an episode of WWE NXT in Manchester, England, an announcement that the 'virus database has been updated' is audible over the PSA Announce system, prompting speculation that World Wrestling Entertainment uses Avast! products to protect its systems during broadcasts.



I downloaded the release candidate of avast! Free Antivirus version 6 to see what it offers and more importantly what has changed since v5 of the software, which already received considerable praise for its comprehensive changes.



Notable changes in Avast! 6

  • AutoSandbox - avast! 6 can be set to automatically run suspicious software sandboxed (incl. free version)
  • avast! WebRep - avast! 6 installs extensions for Firefox and IE9 browsers to display a website reputation rating calculated by a combination of virus lab data, and community input.
  • Script Shield - The Script Shield feature is now available in the Free version too.
  • Site Blocking - The Free version now also has the Site Blocking feature previously exclusive to Pro
  • SafeZone - This Paid-only feature provides a special virtualized environment for sensitive transactions, such as secure online banking.
  • Behavior Shield - The avast! Behavior Shield has had stability and compatibility improvements.
  • Boot-Time Scan - avast! 6 now lets you set Boot-Time scanning to automatically clean detected threats.
There are other changes in avast! 6 too, such as a 'protected by avast' message shown on Windows 7 boot, a Sidebar gadget, options to restore factory settings easily and more changes affecting performance of avast! features.



avast! 6 installation



One of the things I most like about the installation of avast! Antivirus is that you do not need a long reboot to complete installation (except for the Autosandbox features which we will see later). One noticable difference with the installation of avast! 6 compared to when I installed avast! 5 originally, is that the installer now runs some kind of a system scan. This might be a great idea as many of you might have noticed when you tried to install an anti-virus product on a badly infected system in the past.



Even with the scan added, the installation is painless and you only receive one nag about registering when it is completed, which you can easily just close and get out of your way. From that moment on, avast! 6 is more or less doing its job. It updates almost immediately (which will introduce you to the voice announcements of updates if you have not used avast! before) and its real-time shields will be up and scanning your system in the background in no time.



I have to say that of the many anti-virus products I have installed, the avast! 6 installation is easily the least annoying considering the features the software offers.



Real-time Protection in avast! 6



Prevention is always better than a cure as we have been told time and time again. This applies perfectly to the world of malicious malware and the arms race that is on-going on both sides of the war. It is not uncommon at all for a security suite to be able to completely prevent an infection of a certain malware variant by stopping it at the first step, yet the same security suite can fail, ultimately or partially, to remove exactly the same threat once it has taken hold of a system (if installed afterward, for example).



For that reason, a good security suite intended to be used by home users who may know little or nothing at all about malware protection better have a system in place aimed at preventing an infection at its source. Avast! Antivirus answers this call very well by fighting initial infections on many different fronts. Malicious file attachments delivered via e-mail? Avast has a solution! Dodgy P2P network downloads? Avast has a solution! Clicked on a malware-peddling web link or something delivered via IM? Avast has a solution!



In fact, Avast! goes out of its way to specifically target the sources of malware infections in order to stop the undesired from happening in the first place. This comes in the form of 'Real-Time Shields'.



avast! Real-Time Shields

  • File System Shield - The File System Shield is the main-component of the avast! real-time scanner. It monitors all files and programs stored on your computer, snooping on files as they are being opened, accessed or written to. Thanks to this shield, a user will be prompted with an alert by avast! if they click on a file that is detected as a threat (or even within a folder where that file resides.)
  • Mail Shield - Downloading bad attachments from e-mail applications has been one of the primary ways in which malicious software has been spread for a very long time now, and it still accounts for a lot of infections today. The avast! Mail Shield monitors your e-mail traffic and can prevent the threat from getting to your computer at all.
  • Web Shield - As you browse the web, the avast! Web Shield scrutinizes the pages and elements you load into your browser, continuously checking each item to protect against known threats.
  • P2P Shield - Peer-to-peer file-sharing networks are well known for harboring threats. The P2P Shield will check all downloads through known P2P networks to ensure the files are clean.
  • IM Shield - Instant Messaging programs can be used to spread worms and other nasty stuff. Infected computers can send bogus files to friends of the victim on IM networks that are infected. avast! deals with this by checking all downloads through IM networks
  • Network Shield - The Network Shield monitors traffic on your local area network to ward off malware that spreads through local networks. This shield is also responsible for protecting against known malicious websites, preventing them from being loaded before they can do any harm.
  • Script Shield - Available in the free version of the security suite for the first time through avast! 6, the Script Shield intercepts all scripts executed on your system locally and remote, looking for suspicious activity.
  • Behavior Shield - This shield is important in that it analyzes the behavior of running programs. Activity that is found to be suspicious will prompt an alert to the user. This means that even if avast! failed to detect a malicious piece of software as a threat, it may be able to point the finger at it anyway because of what it is doing, and these days with new threats popping up all over the world every day, this kind of thorough scrutiny is important.
Any of the above Real-Time Shields can be disabled at any time by simple clicking 'Stop'. The suite is able to protect itself against malware too. Malware often attempts to corrupt security suite software, or to attack its running services. For this reason, when you attempt to stop any Real-Time Shield, you will be asked to confirm your choice. Getting this message without ever trying to turn off a Real-Time Shield would not be a good thing, and maybe would indicate it is time for a Boot-Time Scan.



Disabling any shield will prompt Avast! to change its Status to 'ATTENTION'. It will inform you that your system is not fully protected and offer you the chance to fix it. Thankfully, in avast! settings, under 'Status Bar', you can instruct the program to ignore the status of any particular shield, which will result once again in the less alarming 'SECURED' status.







Of course, avast! 6 may fail to intercept a brand new threat that it is unfamiliar with before it manages to take hold over your system. Then, after a virus definitions update, it will be able to detect the infection on your system. So now instead of relying on the Real-Time Shield, you have to do some good old-fashioned scanning, and avast! has plenty of muscle here too.



Scan Computer



avast! Anti-Virus offers several different choices when it comes to running a system scan. One of these is a 'Boot-Time Scan' which runs before the vast majority of Windows loads, so we will look at that after we cover the scans you can run in the avast! GUI. Under 'Scan Computer', we have four main options.



Scanning options in avast! GUI

  • Quick scan - This option will just perform a quick scan of your system, focusing on areas of the System Drive. It also will look for signs of a Rootkit infection, scrutinize programs set to automatically run with Windows and operating memory.
  • Full system scan - If you don't mind waiting a bit longer just to be sure, then a Full system scan will do a more thorough examination than a Quick scan. In this case, all hard disk drives connected to the system (including external) will be checked for threats. It will also perform a rootkit scan and check the memory for signs of malware.
  • Removal media scan - If you have any removable media attached to your computer such as a USB key or a disc in a DVD drive, this scan will check only these media for threats, leaving out a rootkit, memory or any HDD scanning.
  • Select folder to scan - Exactly as it says, this option allows you to just pick a folder on any HDD connected to your computer to check for threats.
The above scanning options are great and are more than you would need from a free anti-virus suite. However, they are not perfect. It is entirely possible for these scans to fail. Malware running in memory can prevent avast! from effectively removing threats from the system and rootkits can hide themselves away from the scanner and never be found.



For this reason, it may be necessary to use the best scanning option that avast! offers to its users, a Boot-Time Scan.



avast! Boot-Time Scan



  • Boot-Time Scan - In avast! Antivirus, you have the option to schedule a boot-time scan for the next reboot of your computer. A Boot-Time scan will initiate before the vast majority of Windows is loaded. This allows it to scan for threats before they are loaded into memory in Windows, and before they can get any self-protection mechanisms in place.
Additionally, the avast! Antivirus boot-time scan utilizes direct hard disk drive access, which means it does not have to rely on the OS file system drivers, which can help to uncover the presence of stubborn rootkits on a system.



In avast! 6, you can now dictate what the boot-time scanner will do automatically if it finds a threat. This is very helpful as this option was unavailable before. Since the scan can take quite a while to complete, it wasn't safe to get up and leave your computer in case a threat was found, in which case your input would be required. But now you only need to go to the Boot-Time Scan settings and set it to Repair, Move to Chest, Delete, Ask or Take no Action. That's much better!



So we have covered how avast! Antivirus attempts to protect your system in real-time, warding off initial infections. Then we had a look at the options you have to scan your system within Windows or before it loads at all. The great thing is, it does not stop there. Avast! has yet more ways to protect your system from being damaged by malware in the form of Additional Protection.



Additional Protection



avast! Antivirus 6 provides additional protection that helps to keep your computer clear of threats. The three additional features that it offers us are AutoSandbox, WebRep and Site Blocking. But what are these and why are they useful?



AutoSandbox



avast! has had Sandbox features for a while now, but avast! 6 brings about the ability to have the program automatically run suspicious software in a Sandbox environment. Basically, when running a program Sandboxed, all the data it would try to write to disk will be captured in the Sandbox instead. No actual changes will be made to the files or registry keys it tries to modify.



A Sandbox can also stop kernel calls such as KeBugCheckEx which would result in a system halt (BSOD). This can stop malware from rebooting a system for example (some malware will modify a registry key such as the USERINIT key and then force a reboot).



So it is easy to see why running software in a sandbox environment can protect your computer (see a guide for Sandboxie here).



AutoSandbox is set to 'Ask' in avast! 6 by default, so a user needs to go to its settings to manually switch it to auto if they wish. AutoSandbox does require a reboot of the system before it works properly.



WebRep



WebRep is a feature added in avast! 6 that installs extensions to both the Internet Explorer 9 and Mozilla Firefox browsers. The extensions pull data taken from both the avast! virus lab and user input to give you an idea of the reputation of a website.



The WebRep extensions can be easily uninstalled in either of the browsers or from avast! itself under WebRep.



Site Blocking





One last thing to mention is the Site Blocking features available in avast! 6. Site Blocking allows you to specify any website to block access to. Combined with the ability to put a password on avast! to stop users from changing settings, this could work well for parents who don't want their children on certain websites.



Blocking a site is a easy as just entering the URL into avast! under Additional Protection / Site Blocking. When a user attempts to visit any blocked site in a web browser, they will be prompted with the message shown above.



Thoughts on avast! 6





The changes made in avast! 6 are certainly not as radical as those between v4.2 and v5, which included a whole new interface design, a powerful new anti-malware engine and much more. Regardless, adding new features such as the AutoSandbox feature has made the update important enough in its own right. The Free edition of the A/V utility is just as feature-packed and effective as many paid alternatives on the market, and this has been shown time and time again in broad lab tests of security software.



If you are looking to recommend an anti-malware utility to friends or family, then avast! Anti-Virus certainly has a compelling case for your backing. It sports an interface easy enough to be understood by novice users while running effective prevention mechanisms in the background. It has a relatively speedy scanning engine and can run a scan at boot to get even the most stubborn malware. Beyond that it can detect suspicious behavior from programs that it doesn't initially detect as a threat and automatically sandbox anything suspicious.



It is kept well up-to-date with daily updates to the virus definitions database and regular program updates delivered automatically. It promises to do a lot and all without killing your system's resources. For its purpose, it passes easily as an effective anti-malware suite, and its easy to see why it is used by 130 million around the world with that number likely to keep growing.



You can download the latest version of Avast! Free Antivirus directly from AfterDawn:



avast! Free Antivirus v6.0

Permalink | Comments




"

Source : Google Reader

First Windows Phone 7 update not going smoothly for some Samsung handsets

First Windows Phone 7 update not going smoothly for some Samsung handsets: "So this is why they do phased rollouts, eh? If Twitter is the font of truth and reality that we suspect it to be, it sounds like users of some Windows Phone 7 models by Samsung are struggling with that minor first update that Microsoft started pushing this week. Basically, it sounds like the update isn't consistently completing; it some cases, users get an error message, and there doesn't appear to be any way to roll back or restore the prior firmware and get the phone back to a working state. Mass bricking is probably the greatest fear of software engineers before deploying handset updates to the field, so it's a good thing they're taking it slow; of course, that's not much consolation to the folks who are stuck making a call (on someone else's phone) to Samsung support.



[Thanks, jdog25]

First Windows Phone 7 update not going smoothly for some Samsung handsets originally appeared on Engadget on Tue, 22 Feb 2011 12:19:00 EDT. Please see our terms for use of feeds.


Permalink Download Squad sourceZDNet UK Email this Comments"


Source : Google Reader


PhoneDirector 1.4.2 - Phonebook/SMS/Calendar for some Nokia phones.. (Shareware)

PhoneDirector 1.4.2 - Phonebook/SMS/Calendar for some Nokia phones.. (Shareware): "

PhoneDirector... Phonebook editing, SMS, Gallery, Calendar, To-Do, Java, Wap, Radio

Phonebook

  • reading phonebooks from the phone memory and the SIM card (extended phonebook from the phone memory is supported - 5 numbers, text fields and a person's picture for each entry)
  • editing, uploading and deleting phonebook entries
  • dragging contacts from the SIM card to the phone memory phonebook and vice versa
  • importing contacts directly from Apple Address Book
  • exporting and importing contacts as vCards

SMS messages
  • reading SMS messages from the phone (replying, forwarding, deleting)
  • SMS sending to multiple recipients
  • QuickFind feature for easy finding phonebook entries when sending SMS
  • SMS saving to archive folders on the hard disk

Gallery
  • downloading pictures, sounds and videos from the phone
  • uploading pictures, sounds and videos to the phone
  • deleting files from the phone
  • recording sound, video and grabbing pictures from Apple iSight camera
  • converting files to the phone acceptable format
  • setting the operator logo and the wallpaper (for Nokia 6230, 6230i, 6233, 6234, 6300, 7280, 7380, 8600, 8800)
  • copying pictures from the phone directly to iPhoto
  • creating and editing playlists

Calendar
  • adding and editing calendar events in the phone
  • importing calendar events directly from Apple iCal
  • importing birthdays directly from Apple Address Book
  • dragging calendar events to Apple iCal
  • exporting and importing calendar events as vCal files

To-Do
  • adding and editing To-Do items in the phone
  • importing To-Do items directly from Apple iCal
  • dragging To-Do items to Apple iCal
  • importing and exporting To-Do items as vCal files

Themes
  • themes editor (for Nokia 6230i, 6233, 6234, 6300, 6500, 6700, 7280, 7380, 8600, 8800)

WAP bookmarks
  • dragging Wap bookmarks from/to Mac desktop

Java
  • uploading Java applications to the phone

Radio
  • setting phone radio channels from the computer

Notes
  • adding and editing notes in the phone



Version 1.4.2:
  • minor changes and improvements


  • Mac OS X 10.4 or later
  • Intel, G5 or G4 Mac
  • built-in Bluetooth or Bluetooth USB adapter
  • Nokia 6230, 6230i, 6233, 6234, 6300, 6500, 6700, 7280, 7380, 8600, 8800 mobile phone



Download Now

"

Source : Google Reader

Motorola Xoom vs. Samsung Galaxy Tab 10.1 vs. LG G-Slate -- battle of the Tegra 2 Honeycomb tablets

Motorola Xoom vs. Samsung Galaxy Tab 10.1 vs. LG G-Slate -- battle of the Tegra 2 Honeycomb tablets: "

Hello, Moto -- no wait, Samsung... or is it LG? Three of the world's biggest smartphone makers have leapt at the opportunity to serve up Google's brand new Honeycomb build of Android, however their selection of menu items looks to be somewhat lacking in diversity. Motorola's Xoom matches Samsung's Galaxy Tab 10.1 in both screen size and resolution (1280 x 800), while LG's Optimus Pad / G-Slate offers only marginally smaller measurements with an 8.9-inch display spanning 1280 x 768. More than that, all three tablets run the bone-stock Honeycomb UI and are built around NVIDIA's 1GHz Tegra 2 system-on-chip, leaving little room for differentiation on the basis of user experience or internal performance (LG would have you believe its 3D camcorder is a big advantage for its slate, but we're not so sure). Most choices between the three, then, will come to things like brand loyalty, ergonomics and pure, basic aesthetic appeal. To help you judge the latter of those three points, we've prepared an exhaustive barrage of side-by-side photos below -- we expect you to view every last one of 'em... at least twice.





Motorola Xoom vs. Samsung Galaxy Tab 10.1 vs. LG G-Slate -- battle of the Tegra 2 Honeycomb tablets originally appeared on Engadget on Wed, 16 Feb 2011 12:22:00 EDT. Please see our terms for use of feeds.

Permalink | | Email this | Comments"



Source : Google Reader

Download WhiteD00r Version 4.2 Custom iOS 4.2.1 Firmware for iPhone 2G / 3G and iPod touch 1G / 2G




from BlackBerry Tablet Coming this November | TheTechJournal.com by Shohag
WhiteD00r has now been updated for the first time to the version 4.2 to support iOS 4.2.1 custom firmware file. Version 4.2 comes with a few new features including a new multitasking method; but WhiteD00r 4.2′s largest improvement is in performance. For those who don’t know, WhiteD00r is an initiative to allow users with older iOS devices like the iPhone 2G/3G and iPod touch 2G to be able to experience the iOS 4 firmware while actually running a modified 3xx firmware file.



A perfect way for users who are not able to upgrade their iDevice at this time to still use the latest iOS 4 firmware’s features. Take a look at the difference in performance an iPhone 3G has running the WhiteD00r firmware vs the stock iOS 4.2.1 firmware.

This custom firmware, dubbed WhiteD00r, includes everything from: wallpapers, new semi transparent dock (and UI), backgrounds, all new icons from iOS 4.x, Voice Control, multitasking, video recording, and more.

You can watch out this newly updated WhiteD00r 4.2 in action comparing with the iOS 4.2 from the video embedded below.

Popout

Thanks


Source : Google Reader







Verizon iPhone 4 Unlocked for Other CDMA Networks

Verizon iPhone 4 Unlocked for Other CDMA Networks: "

Wall Street Journal have reported that a Chinese carrier named China Telecom has managed to unlock the CDMA based Verizon iPhone to run on their CDMA network. The article seems a little confused as to the differences between a jailbreak or unlock.



Here’s the important line:


A screen shot from a Sina Weibo account registered to the Guangzhou branch of China Telecom shows an image of what appears to be a Verizon Wireless iPhone4 next to a Guangzhou China Telecom employee badge. The Chinese text above reads: “CDMA iphone4 registered, for the first time we invite everyone to feast their eyes!!!”


The only way for a CDMA iPhone 4 to make a call on another network would be if the device had been unlocked, freeing the iPhone from its carrier shackles. WSJ then references a picture of the CDMA iPhone 4 with a Cydia app on the homescreen, but that’s not much evidence considering the Verizon iPhone can be jailbroken using either GreenPois0n RC or PwnageTool 4.2.


Those familiar with developing iPhone unlocks have long stated that the CDMA iPhone presents a unique challenge because moving a CDMA device to another network typically requires that new networks assistance in order to activate the phone. This simple fact is also what makes this news from China Telecom most compelling, as it suggests the unlock is being developed directly by the carrier themselves, which would ensure carrier compatibility from the get-go. If China Telecom manages to pull this off, it could represent a blueprint for other CDMA carriers to follow that would allow them to unofficially offer the iPhone 4 on their networks too.


Thanks




"
Source : Google Reader

A window of opportunity: Hunter Douglas goes Google

A window of opportunity: Hunter Douglas goes Google: "Editor's Note: We're pleased to welcome guest blogger Brian Hobbs, IT Director of Hunter Douglas. Headquartered in Upper Saddle River, New Jersey, Hunter Douglas is the leading manufacturer of custom-made window fashions in North America. Learn more about other organizations that have gone Google on our community map or test drive life in the cloud with the Go Google Cloud Calculator.For more than 60 years, starting with our invention of the aluminum venetian blind in 1946, we have been designing custom window fashions for our customers, based on personal consultations and measurements. At Hunter Douglas quality and innovation are very important to us. We knew when we started looking at Google Apps that we’d be getting both.

Prior to moving 3,000 employees to Google Apps, we were using Novell Groupwise for email and calendar services, but this presented numerous challenges. First, Groupwise didn’t integrate easily with other applications. To continue to grow and work in more than 30 offices and plants across North America, we needed a platform that we could build on. We were also lacking the access and mobility that a good web application provides. Our employees wanted to easily access their email and calendars while on the road and out of the office with no disruption. Providing mobile access was a priority for us. Reliability and business continuity were also a concern. We were managing email servers at each of our locations and we knew if a server went down, business would stop until we were able to bring it back up. That wasn’t something we wanted to worry about. Finally, total cost of ownership was far less with Google Apps. Our return on investment is just over one year. The money we were able to save by switching to Google’s secure, web-based products combined with the value of Google Apps makes for a real win.

We’re just getting started with Google Apps, but already our employees have so much more flexibility now that all of their information is on the web. Because so many employees were already Gmail users, the transition has been extremely smooth. Plus, we’ve had the help of Google Apps reseller, Cloud Sherpas, to assist with deployment and provide materials and documentation for employees who are a bit less savvy when it comes to new technology.

Our IT Department is happy because now they can focus on more strategic projects instead of just maintaining servers, and our employees are happy because Google Apps is easy to use and accessible from any computer or mobile device. We’re happy to say that Hunter Douglas has gone Google.


Posted by Brian Hobbs, IT Director, Hunter Douglas


"



Source : Google Reader

2 Free VPN Services For Secure Browsing On Your iOS Device

2 Free VPN Services For Secure Browsing On Your iOS Device: "

vpn servicesWe recently published an article explaining what a Virtual Private Network (VPN) is, along with a list of free VPN services that allow you to anonymise the Internet browsing experience on your computers. If you want to do the same on your iPhone, iPad or iPod Touches, there are a couple of free options that are worth looking into.

The reason for using a free VPN service on your phone is exactly the same as using them on your computer. For example, you may want to access websites or apps that have been blocked by your ISP or are not available in your country, or you may want to encrypt all inbound and outbound data. It has to be said that, as with any free service, there are certain concessions you may have to accept such as limited bandwidth, while also bearing in mind the risk involved in using a free service when accessing sensitive information.

VPN Express

VPN Express [iTunes link] is a free iPhone/iPad app that gives you 100MB of free, encrypted browsing on your iOS device.

After installing the app on your device, the first thing you will need to do is register for a free account within the app, which requires only your email address and a password. If a VPN Express member referred you, you can also enter their email address, resulting in each of you earning additional free bandwidth.

vpn services iphone

After confirming your email address you can then manually configure your iOS device’s VPN setting. To do so, go to Settings > General > Network > VPN > Add New VPN Configuration.

vpn services reviewed

From there you can enter the settings by selecting the L2TP or PPTP tab and filling in the fields as follows:

Description: VPNVIP
Server: us.vpnvip.com OR vpn.vpnvip.com
Account: Enter the email address you used when registering with VPN Express
RSA SecurID: Off
Password: Enter your password
Encryption Level: Auto
Secret: vpnvip
Send all Traffic: On
Proxy: Off

vpn services reviewed

Once you’re settings are all in place, a new VPN selection will appear in the settings menu, where you can easily toggle the VPN service on and off.

vpn services reviewed mobile

When turned on, a small VPN icon will appear in the status bar.

free vpn services

The advantage of using an app like VPN Express on your iOS device is that the app displays all of your usage statistics, as well as displaying your remaining bandwidth on the account tab, so that you can keep track of it while you’re on the go.

free vpn services

If 100MB isn’t enough, VPN Express offers extremely competitive subscriptions and quotas, starting at $0.99 for 30 days and a quota of 2GB data transfer, or $.0.99 for a 1GB data plan.

free vpn services

Hotspot Shield

It is also possible to use Hotspot Shield, one of the 7 free services recommended on MakeUseOf before, on your iOS device.

Unlike VPN Express, you don’t have to install anything on your iPhone or iPad. First, in order to generate an account ID and password, go to the HotSpot Shield website and click on Get Account ID.

accountID.png

Make sure that your WiFi connection is turned off, and once again, navigate to Settings > General > Network > VPN > Add New VPN Configuration.

Select the IPSec tab and fill in the fields as follows:

Description: Hotspot Shield
Server: 68.68.107.101
Account: Enter the account ID generated in the previous step
Password: Enter the password generated in the previous step
Use Certificate: Off
Group Name: hss
Password: hss
Proxy: Off

vpn services

Turn your WiFi connection back on, and as with VPN Express, turn on the VPN and when the icon appears in the status bar, you can browse the Internet safely and securely.

If you have more than one VPN configuration on your iOS device, the VPN button in the settings menu will navigate to the VPN settings page allowing you to choose which configuration you wish to use.

If you want to be absolutely sure that everything is working as it should be, look up your IP address in Safari and make sure that your location has been changed.

Which VPN service do you use on your iOS device? Let us know in the comments.

Image credit: Shutterstock


Got Questions? Ask Them Now FREE on MakeUseOf Answers!

Similar MakeUseOf Articles



"


Source : Google Reader