Category Archives: Technology

.

HOW TO SEARCH FOR HIDDEN FILES IN WINDOWS

informationsecret.com

Have you ever lost some important files in your system? Or do you think some files should be present in your system but you cannot find them? This article analyse the steps in which you can setup your system in order to be able to view hidden files. In some cases, hackers, malwares and viruses have used this ways of hiding their files to destroy your system so that you cannot find those harmful files to delete. But knowing how to discover such unwanted files can prevent your PC from malware or virus attack.

Below are the following steps and various versions of windows

Windows 95

To enable the viewing of Hidden files follow these steps:

  • Close all programs so that you are at your desktop.
  • Double-click on the My Computer icon.
  • Select the View menu and then click Options.
  • After the new window appears select the View tab.
  • Scroll down until you see the Show all files radio button and select it.
  • Press the OK button and close the My Computer window.
  • Now your computer is configured to show all hidden files.

Windows 98

To enable the viewing of Hidden files follow these steps:

  • Close all programs so that you are at your desktop.
  • Double-click on the My Computer icon.
  • Select the View menu and then click Folder Options.
  • After the new window appears select the View tab.
  • Scroll down until you see the Show all files radio button and select it.
  • Press the Apply button and then the OK button and close the My Computer window.
  • Now your computer is configured to show all hidden files.

Windows ME

To enable the viewing of Hidden files follow these steps:

  • Close all programs so that you are at your desktop.
  • Double-click on the My Computer icon.
  • Select the Tools menu and click Folder Options.
  • After the new window appears select the View tab.
  • Under the Hidden files and folders section select the radio button labeled Show hidden files and folders.
  • Remove the checkmark from the checkbox labeled Hide file extensions for known file types.
  • Remove the checkmark from the checkbox labeled Hide protected operating system files.
  • Press the Apply button and then the OK button and shutdown My Computer.
  • Now your computer is configured to show all hidden files.

Windows NT

To enable the viewing of Hidden files follow these steps:

  • Close all programs so that you are at your desktop.
  • Double-click on the My Computer icon.
  • Select the View menu and then click Options.
  • After the new window appears select the View tab.
  • Scroll down until you see the Show all files radio button and select it.
  • Press the OK button and shutdown My Computer.
  • Now your computer is configured to show all hidden files.

Windows 2000

To enable the viewing of Hidden files follow these steps:

  • Close all programs so that you are at your desktop.
  • Double-click on the My Computer icon.
  • Select the Tools menu and click Folder Options.
  • After the new window appears select the View tab.
  • Under the Hidden files and folders section select the radio button labeled Show hidden files and folders.
  • Remove the checkmark from the checkbox labeled Hide file extensions for known file types.
  • Remove the checkmark from the checkbox labeled Hide protected operating system files.
  • Press the Apply button and then the OK button and shutdown My Computer.
  • Now your computer is configured to show all hidden files.

Windows XP and Windows 2003

To enable the viewing of Hidden files follow these steps:

  • Close all programs so that you are at your desktop.
  • Double-click on the My Computer icon.
  • Select the Tools menu and click Folder Options.
  • After the new window appears select the View tab.
  • Put a checkmark in the checkbox labeled Display the contents of system folders.
  • Under the Hidden files and folders section select the radio button labeled Show hidden files and folders.
  • Remove the checkmark from the checkbox labeled Hide file extensions for known file types.
  • Remove the checkmark from the checkbox labeled Hide protected operating system files.
  • Press the Apply button and then the OK button and shutdown My Computer.
  • Now your computer is configured to show all hidden files.

Windows Vista

To enable the viewing of Hidden files follow these steps:

  • Close all programs so that you are at your desktop.
  • Click on the Start button. This is the small round button with the Windows flag in the lower left corner.
  • Click on the Control Panel menu option.
  • When the control panel opens you can either be in Classic View or Control Panel Home view:

 

If you are in the Classic View do the following:

  • Double-click on the Folder Options icon.
  • Click on the View tab.
  • Go to the last step.

If you are in the Control Panel Home view do the following:

  • Click on the Appearance and Personalization link.
  • Click on Show Hidden Files or Folders.
  • Go to step 5.
  • Under the Hidden files and folders section select the radio button labeled Show hidden files and folders.
  • Remove the checkmark from the checkbox labeled Hide extensions for known file types.
  • Remove the checkmark from the checkbox labeled Hide protected operating system files.
  • Press the Apply button and then the OK button.
  • Now Windows Vista is configured to show all hidden files.

Windows 7

To enable the viewing of Hidden files follow these steps. Please note a guide with images that shows the same steps can be found here:

  • Close all programs so that you are at your desktop.
  • Click on the Start button. This is the small round button with the Windows flag in the lower left corner.
  • Click on the Control Panel menu option.
  • When the control panel opens click on the Appearance and Personalization link.
  • Under the Folder Options category, click on Show Hidden Files or Folders.
  • Under the Hidden files and folders section select the radio button labeled Show hidden files, folders, or drives.
  • Remove the checkmark from the checkbox labeled Hide extensions for known file types.
  • Remove the checkmark from the checkbox labeled Hide protected operating system files (Recommended).
  • Press the Apply button and then the OK button.
  • Now Windows 7 is configured to show all hidden files.

Windows 8

To enable the viewing of Hidden files follow these steps. Please note a guide with images that shows the same steps can be found here:

  • From the Windows 8 Start Screen, click on the Control Panel app.
  • When the Control Panel opens scroll down to the bottom and click on the More Settings option.
  • The traditional Windows 8 Control Panel will now open. When it is open, click on the Appearance and Personalization link.
  • Under the Folder Options category, click on Show Hidden Files or Folders.
  • Under the Hidden files and folders section select the radio button labeled Show hidden files, folders, or drives.
  • Remove the checkmark from the checkbox labeled Hide extensions for known file types.
  • Remove the checkmark from the checkbox labeled Hide protected operating system files (Recommended).
  • Press the Apply button and then the OK button.
  • Now Windows 8 is configured to show all hidden files.

Windows 10

To enable the viewing of Hidden files in Windows 10, please follow these steps:

  • From the Windows 10 Start Screen, click on the File Explorer button  on the task bar.
  • When File Explorer opens, click on the View tab and then select Options.
  • When the Folder Options screen opens, click on the View tab.
  • You will now see various settings you can select.
  • Folder Options category, click on Show Hidden Files or Folders.
  • Under the Hidden files and folders section select the radio button labeled Show hidden files, folders, or drives.
  • Remove the checkmark from the checkbox labeled Hide extensions for known file types.
  • Remove the checkmark from the checkbox labeled Hide protected operating system files (Recommended).
  • Press the Apply button and then the OK button.
  • Now Windows 10 is now configured to show all hidden files.

Now, that you have known these steps, you can protect your PC from the presence of malware, viruses and other harmful vices. See how

How to remove a Trojan, Virus, Worm, or other Malware from your PC manually without antivirus

You will be able to see icons not previously there and also you will see a file called desktop.ini all over your PC. There is no problem with these files as they are legitimate hidden files and can be ignored.

Please follow and like us:
.

How to remove a Trojan, Virus, Worm, or other Malware from your PC manually without antivirus

informationsecret.com

I know you have heard a lot about computer viruses or other malware. These are those malicious programs that once they infect your machine, they will start causing havoc on your computer. What many people do not know is that there are many different types of infections that are classified into different category of Malware.

Malware – Malware is a program or files that are developed for the purpose of causing harm. Thus, malware includes computer viruses, worms, Trojan horses, spyware, hijackers, and certain type of adware.

The aim of this article is to focus on those malware that are considered Trojans, worms, and viruses, though this information can be used to remove other types of malware as well. We will be providing a broad overview of how these infections can be removed. For the most part these instructions should allow you to remove a good deal of infections, but there are some that need special steps to be removed and these won’t be covered under this tutorial.

Before we continue it is important to understand the generic malware terms that you will be reading about.

Ransomware – Ransomware are programs that encrypts the files on a computer and then demand a ransom in order to decrypt them. The ransom is typically in a digital currency called Bitcoins.

An example of a Ransomware is shown below:

 

informationsecret

 

Adware – A program that generates pop-ups on your computer or displays advertisements. It is important to note that not all adware programs are necessarily considered malware. There are many legitimate programs that are for free but display ads in their programs in order to generate revenue. As long as this information is provided up front then they are generally not considered malware.

An example is the image below:

informationsecret

Tech Support Scams – Tech Support Scams are programs that pretend to be a security alert from Microsoft or another company. These fake alerts indicate that something is wrong with your computer and that they locked you out of it until you call a listed phone number. Once you call that number, though, the scammers will try to sell you unnecessary remote support services and software. You can see an example from your windows operating system below.

informationsecret

Backdoor – A program that allows a remote user to execute commands and tasks on your computer without your permission. These types of programs are typically used to launch attacks on other computers, distribute copyrighted software or media, or hack other computers.

Dialer – A program that typically dials a premium rate number that has per minute charges over and above the typical call charge. These calls are with the intent of gaining access to pornographic material.

Hijackers – have you ever wondered why your browser directs you to another page when you tried to open a page? A program that attempts to hijack certain Internet functions like redirecting your start page to the hijacker’s own start page, redirecting search queries to a undesired search engine, or replace search results from popular search engines with their own information is called a Hijacker and it is harmful to your PC at times.

Spyware – A program that monitors your activity or information on your computer and sends that information to a remote computer without your knowledge.

Trojan – A program that has been designed to appear innocent but has been intentionally designed to cause some malicious activity or to provide a backdoor to your system.

Virus – A program that when run, has the ability to replicate itself by infecting other programs and files on your computer. These programs can have many effects ranging from wiping your hard drive, displaying a joke in a small box, or doing nothing at all except to replicate itself. These types of infections are harmful to your computer and not have the ability to spread to another computer on their own. The word virus has incorrectly become a general term that encompasses Trojans, worms, and viruses.

Worm – A program that when run, has the ability to spread to other computers on its own using either mass-mailing techniques to email addresses found on your computer or by using the Internet to infect a remote computer using known security holes. You can be infected through browsing some websites.

 

How do these infections start?

Just like any program, in order for the program to work, it must be started. Malware programs are no different in this respect and must be started in some fashion, in order to do what they were designed to do. For the most part these infections run by creating a configuration entry in the Windows Registry in order to make these programs start when your computer starts.

Unfortunately, though, in the Windows operating system there are many different ways to make a program start which can make it difficult for the average computer user to find manually. Luckily for us, though, there are programs that allow us to cut through this confusion and see the various programs that automatically starts when windows boots. We recommend this program to help figure out which program is running once windows starts booting, and its free and detailed, is Autoruns from Sysinternals.

When you run this program it will list all the various programs that start when your computer is booted into Windows. For the most part, the majority of these programs are safe and should be left alone unless you know what you are doing or know you do not need them to run at startup.

At this point, you should download Autoruns and try it out. Just run the Autoruns.exe and look at all the programs that start automatically. Don’t uncheck or delete anything at this point. Just examine the information to see an overview of the amount of programs that are starting automatically. When you feel comfortable with what you are seeing, move on to the next section.

 

Use an anti-virus and anti-malware program to remove and protect yourself from infections

Make sure you are using an anti-virus program and that the anti-virus program is updated to use the latest definitions. If you do not currently have an anti-virus installed, you can select one from the following list and use it to scan and clean your computer. The list below includes both free and commercial anti-virus programs, but even the commercial ones typically have a trial period in which you can use now to scan and clean your computer before you have to pay for it.

 

It is also advised that you install and scan your computer with a good Anti-Malware programs. Many times these programs are quicker to update their definitions than a standard anti-virus program and also target more adware and unwanted programs.

The recommended anti-malware programs are:

After performing these instructions and you are still infected, use the instructions below to manually remove the infection.

How to remove these infections manually

We have finally arrived at the section you came here for. You are most likely reading this article because you are infected with some sort of malware and your standard anti-virus or antimalware tools are not detecting it. With this knowledge that you are infected, it is also assumed that you examined the programs running on your computer and found one that does not look right. You did further research by checking and searching in Google and have learned that it is an infection and you now want to remove it.

If you have identified the particular program that is part of the malware, and you want to remove it, please follow these steps.

  • Download and extract the Autorunsprogram by Sysinternals to C:\Autoruns
  • Reboot into Safe Modeso that the malware is not started when you are following through these steps. Many malware monitor the keys that allow them to start and if they notice they have been removed, will automatically replace that startup key. For this reason booting into safe mode allows us to get past that defense in most cases.
  • Navigate to the C:\Autoruns folder you created in Step 1 and double-click on exe.
  • When the program starts, click on the Options menu and enable the following options by clicking on them. This will place a checkmark next to each of these options.
  1. Include empty locations
  2. Verify Code Signatures
  3. Hide Signed Microsoft Entries
  • Then press the F5 key on your keyboard to refresh the startups list using these new settings.

The program shows information about your startup entries in 8 different tabs. For the most part, the filename you are looking for will be found under the Logon or the Services tabs, but you should check all the other tabs to make sure they are not loading elsewhere as well. Click on each tab and look through the list for the filename that you want to remove. The filename will be found under the Image Path column. There may be more than one entry associated with the same file as it is common for malware to create multiple startup entries. It is important to note that many malware programs disguise themselves by using the same filenames as valid Microsoft files. It is therefore important to know exactly which file, and the folder they are in, that you want to remove.

Once you find the entry that is associated with the malware, you would want to delete that entry so it will not start again on the next reboot. To do that right click on the entry and select delete. This startup entry will now be removed from the Registry.

Now that we have identify it so it will not start on boot up, you should delete the file using My Computer or Windows Explorer. If you cannot see the file, it may be hidden. To allow you to see hidden files you can follow the steps for your operating system found in this article through the link below

How to search for hidden files in Windows

When you have finished removing the malware entries from the Registry and deleting the files, reboot into normal mode as you will now be clean from the infection.

How to protect yourself in the future

In order to protect yourself from this happening again it is important that take proper care and precautions when using your computer. Make sure you have updated antivirus and spyware removal software running, all the latest updates to your operating system, a firewall, and only open attachments or click on pop-ups that you know are safe. These precautions can be a tutorial unto itself

 

Conclusion

Now that you know how to remove a generic malware from your computer, it should help you stay relatively clean from infection. Though if you find it difficult to do, get a guide from the link below

Virus, Spyware, Malware Removal Guides

Please follow and like us:
.

How to secure your PDF files with password

informationsecret.com

It is not so difficult to protect your pdf files from people gaining access to your information if you don’t want to. The steps to secure your pdf is outlined below. Luckily, there are supports for password-protected encryption built directly into PDFs Format, no matter the operating system you are running (windows or mac OS).

If you would want to make some few changes to your pdf contents, there are editors that can help with that. And also if you wish to merge or join two or more PDF files together.

I will first explain the use of windows to password-protect PDF files. Mac Os has features you can use to create password for your pdf files easily, unlike windows. This enable us to look at two different methods in pass wording your files through

  • Adobe Acrobat pro DC and
  • PDF merger (free)

Using Adobe Acrobat

  • Go to this link Adobe Acrobat Pro DC free trial page and click the blue “Get started” button. You need to sign up for an Adobe creative cloud account. Once everything is done, the download begins.
  • Download and install Adobe Acrobat Reader (Dc pro version) if you don’t have one. If you are asked whether you want to buy or simply continue your trial version for now, pick option to continue.
  • Launch Adobe Acrobat pro Dc and sign in through the link at the top right-hand corner.
  • Click “file” menu in the upper-left corner, and select “open”.
  • Choose the pdf file you want to secure with password from its location in your PC and click open
  • After the document is opened, click “file” menu again, and then “properties” and then click the “security” tab.
  • Where you see “security method”, click the drop down arrow to select “password security” from the lists of options
  • A window will pop out asking you for a password. Check the box beside “require a password to open the document” and enter your desired password in the corresponding text field

Note: try picking a stronger password preferably one with a combination of lower-case letters, capitalization and numbers

How you can Restrict editing and printing with Adobe Acrobat

With the “document security” menu of Adobe Acrobat Dc, you can restrict people from editing or printing your content. How? Follow the steps below

  • Open the pdf document and access the “security” panel as outlined above
  • Select “change settings” to access the password security menu.
  • Then check the box beside “Restrict editing and printing” and enter a password in the box to the right of “change permissions password”

 

Get some factors that can limit editing:

  1. Inserting, deleting, and rotating pages: it allows the person with access to the document to get rid of parts of the document, add pages, and flip the pages around.
  2. Commenting, filling in form fields, and signing existing signature fields: This allows the person to leave comment on the document, fill in sections that have boxes to add text, and electronically sign the document.
  3. All edits except extracting pages: This allows others to make any necessary changes to the document except for cutting it down.

 

With all steps above, your PDF document is protected. When someone tries to open it, the password prompt will appear.

Using PDFMate to password or protect your PDF Document

If you choose not to use the above method due to financial constraint, you can opt for the free tool “PDFMate” as long you don’t mind for a third – party utility with it limited features and design.

Using PDFMate you can set permission and specific passcodes for task such as editing, copying and printing.

Follow the steps below to learn how:

  • Click on this link PDFMate Free PDF Merger website
  • Click the green “free download” button near the top of the page and follow the on-screen instructions
  • Launch it when complete
  • Click the “Add Files” button with the addition sign in the upper – left corner and double click the PDF document you want to password protect.
  • When your PDF File appears, you need to check the box beside “Open Password” and enter your password into the corresponding text field. You can as well choose to select the box beside “Permission Password,” which allows you to enable password protection for editing, coping, and printing by clicking the appropriate losses that appears after checking “permission password”.
  • Select “Build” in the bottom – right corner of the application window page you are done!!! With your password protected PDF prompting out showing you the folder that is been protected.

To protect your PDF file with Password on MAC Os

Your Mac OS comes with preview, a piece of software that can open most documents including any image formats, offers basic editing capabilities. It can also encrypt any PDF file in first few steps.

These are:

  • Launch Preview
  • Click the “File” menu in the upper – left corner and select “Open”
  • Choose the PDF file you want to password – protect from its save in your PC and click “Open” button
  • Once editing is done on the PDF file document, click the “file” menu again and select “Export” from the resulting drop – down
  • Name and select where you wish to save your file.
  • Check the box directly left of “Encrypt,” and enter your desired password in the space provided verify if prompted.
  • Make sure you check that your PDF document is protected by clicking on preview. A prompt screen will appears asking you to slot in password. This indicates it is successful and you can go on using the file the way you like.
Please follow and like us:
.

How to install and setup a CCTV camera

informationsecret.com

I have been searching and researching all through the internet to gain knowledge on how to install a CCTV camera, either at home or at working place. I have found some steps that can help you too start with installation at least if you also want to learn how to install a CCTV camera. These are the steps below:

  • To install a CCTV camera, first of all locate the direction or position you want to install the CCTV camera
  • Before preparing the tools,look out for the areas you need to watch out for like doors, driveways, off-street windows, even open spaces around you.
  • Take note of the type of camera you should buy and how it connects with the DVR box. Either to plug it directly or routing the camera`s cable through your house if the DVR box is placed far from the camera.

 

informationsecret.com

Now, you can buy a security camera depending on how you want it. Either you get the one that is coupled together which of course is cheaper and easier, or you buy them individually. Buying them individually, you will need:

  1. DVR (digital video recorder) box
  2. 1-4 cameras
  3. Appropriate wiring (Siamese and BNC cables)
  4. Power cords

There are different types of camera you can buy. We have the wireless and the wired ones

A good example of camera you can buy is NYXCAM 4mp Home Security Camera System

Tools needed to install a wired camera system

  • Ethernet cable
  • A power drill with drive bits and space bits
  • Steel fish tape
  • Masking tape
  • A monitor, mouse, and keyboard

Since you now know the tools to use, you can check the manual that come with the purchased package for a guide to connecting these tools together. A DVR system can be directly connected with a TV or computer monitor for live viewing. Some people may prefer watching footage remotely (online). What you need to do is, to configure port forwarding on your router so that you gain access to your DVR (NVR) from the internet. A simpler solution is using a regular IP cameras with cameraFTP cloud recording.

There are two kinds of recording; cloud and local recording

Cloud recording: this is the kind of recording in which footage cannot be deleted even though it is stolen or the DVR and cameras is destroyed. With this type of recording, you can view or playback recorded footage online with web browser or cameraFTP mobile view apps.

Camera software to use with your cameras are; Blue iris, isPV, Noxcam APP (free) access to certain functions. You can use these softwares with your mobile to record videos on a local micro SD card or do a cloud recording with the monthly subscription. You can live stream, take pictures.

Take the bold step to start your own installation. Be inspired and start working…

Please follow and like us:
.

What really is “VPN”?

VPN informationsecret

VPN stands for Virtual Private Network.

It simply means browsing on the internet while your data or information you are browsing about is been secured from any external bodies or preventing hackers from gaining access to your data or websites history.

It is also a private network that extends across a public network or internet. As a user, you can send and receive data across shared or public networks

What are the uses of VPN then?

  • Accessing business networks from any place in the world: you can decide to connect with your appliances anywhere you are, to a business network; though you will be required to connect with security codes which was kept in VPN-only to ensure safety.
  • To hide your browsing data from ISP (internet service provider) and local users: Internet service providers like Glo, MTN and Airtel operators can spy on your browsing history and sure have access to your data. Since they log the data of your IP address. So VPN can stop them from spying on them and also those that connect to a public network (Wi-Fi) because Virtual Private Network protect your privacy on public unsecured Wi-Fi connection. As you may or may not know, users of this networks may spy on your browsing history.
  • To access blocked sites all over the world: VPN can bypass any restrictions to any site that is not available in your country. Have you seen instances like “This content is not available in your country”? Even some YouTube videos can be overcome with VPN.
  • To bypass internet censorship: some countries does not permit or restricts the use of certain type of website. Chine for example block access to some websites in their country. VPN can help you fix such challenges
  • To access home network from anywhere : if you have private files in your home network, you can setup home network VPN to access the network anywhere you are
  • To download files: for those that like to live stream and also download files from restricted sites. VPN is important for use.

There are different VPN available for different operating systems, mobiles and desktops. There are paid ones as well as free ones you can use

We have highlighted some for you here with links to download

https://www.opera.com/computer/features/free-vpn   for computer

https://play.google.com/store/apps/details?hl=en&id=com.opera.vpn for smart phones

Others here below

Top Free VPN Services For Apple iPhone
Free VPN For iPhone | Free Iphone VPN | Free VPN iPhone
Free VPN For Android | Free Android VPN Apps | Free VPN Android App
Free VPN service for Iphone(Browse Youtube and all blocked sites in your area)
Benefits of iPad VPN

Step by step: How to set up a VPN in Windows 10

  • Click on the Cortana search bar or button on the taskbar and type vpn.
  • The top choice should be Change virtual private networks (VPN) or open the Settings app and go to Network & Internet > VPN.
  • At the top of the VPN screen in the Settings app, click Add a VPN connection.
  • In the screen that appears, enter the details for your VPN connection. Under “VPN provider” click on the drop-down menu, and select Windows (built-in). This will also change “VPN type” to Automatic, and “Type of sign-in info” to User name and password.
  • Next fill out the “Connection name” and “Server name or address.” These vary based on your VPN provider—whether a third-party service or an employer. For this example, we’re using Acevpn, a clientless VPN service that supports various connection types such as IKEv2, L2TP, and PPTP.
  • Scroll down this screen and you’ll see a spot to enter your username and password for the VPN—again provided by your VPN service. Once the information is entered, click Save, and close the Settings app.
  • Click the Wi-Fi icon in the system tray on your taskbar, and select your newly created VPN connection, which should be right at the top of the list. It should automatically start to connect, and if all goes well the connection process should happen relatively quickly.

The above process works for the easier VPN connection types such as PPTP and L2TP, but if you want to use IKEv2 that requires installing a root certificate from your VPN provider. Keep in mind that not every service supports IKEv2 so using this method depends greatly on your VPN service provider or employer.

Regardless, here’s how it works on Windows 10.

First, download your VPN provider’s IKEv2 certificate to your desktop or somewhere else that’s convenient. Next, double-click on the certificate file and a security warning pops-up. Click Open.

On the next window that opens click install certificate…

  • Now we’ve arrived at the Certificate Import Wizard. Select the Local Machine radio button and click Next.
  • On the next screen make sure to select the radio button labeled Place all certificates in the following store, and click Browse…
  • A smaller window opens with a folder tree. Select Trusted Root Certification Authorities and then click OK. Now we’re back at the Certificate Import Wizard window. From here click Next.
  • The hard part is over. On the next screen click Finish and then OK in the smaller window.

Now that the certificate is installed we can set up the IKEv2 VPN using the same step-by-step instructions above. Just make sure that you select IKEv2 under “VPN type,” and then use the server name, address, and username and password provided by your service provider.

Once you’ve connected to the VPN, check to see that your VPN is working by visiting IPleak.net. You should see an IP address, and DNS servers that are different from your non-VPN state. If you don’t, there are a number of potential causes that we can’t go into here. Your best bet is to check with your company’s IP department or the support service of your VPN.

However, one easy and common fix for IKEv2 problems is to right-click on your Wi-Fi or ethernet icon in the system tray, and select Open Network and Sharing Center from the context menu.  When the Control Panel opens click Change adapter settings on the left side, then right-click the name of your VPN connection and go to Properties > Internet Protocol Version 4 (TCP/IPv4) > Properties > Advanced… > IP Settings. Check “Use default gateway on remote network” and click OK. Close up all the windows and try IP Leak again.

Step-by-step: How to set up a VPN in Windows 7

  • Click the Start button. In the search bar, type vpn and then select Set up a virtual private network (VPN) connection.
  • Enter the IP address or domain name of the server to which you want to connect. If you’re connecting to a work network, your IT administrator can provide the best address.
  • If you want to set up the connection, but not connect, select Don’t connect now; otherwise, leave it blank and click Next.
  • On this next screen, you can either put in your username and password, or leave it blank. You’ll be prompted for it again on the actual connection. Click Connect.
  • To connect, click on the Windows network logo on the lower-right part of your screen; then select Connect under “VPN Connection.”
  • In the “Connect VPN Connection” box, enter the appropriate domain and your login credentials; then click Connect.
  • If you can’t connect, the problem could be due to the server configuration. (There are different types of VPNs.) Check with your network administrator to see what kind is in use—such as PPTP—then, on the “Connect VPN Connection” screen, select Properties.
  • Navigate to the Security tab and select the specific “Type of VPN” from the drop-down list. You may also have to unselect Include Windows logon domain under the Options tab. Then click OK and Connect.

It takes a little work, but setting up a VPN using the Windows built-in client is relatively quick, and as a user it’s a helpful skill to have.

Please follow and like us: