Author: One _e

logo google chrome

CPU usage 100% caused by Google Chrome system

This time I will try to share tips for users of Google Chrome who experienced the CPU USAGE 100% caused by Google Chrom system. Here are the steps you can do to overcome CPU usage…

Read More
drop vpn using mikrotik

Block VPN Access Tutorials using MikroTik

Block VPN access using Mikrotik. To get to the configuration stage we must first understand how VPN (Virtual Private Network) works. Usually people use VPN access to be able to access the sites that we…

Read More
implementasi vrrp

VRRP : Virtual Router Redundancy Protocol

The Virtual Router Redundancy Protocol (VRRP) is a computer networking protocol that provides for automatic assignment of available Internet Protocol (IP) routers to participating hosts. This increases the availability and reliability of routing paths via…

Read More
5G Network

Getting to know the 5G Network

The 5G network has now been available in a number of regions in the United States since 2018. The 5G network for wider use in the upcoming 2020. 5G network is a mobile Internet connectivity…

Read More
Linksys-WAP54G configuration

Linksys WAP54G Access Point Configuration Tutorial

Linksys WAP54G Access Point Configuration Tutorial. Idnetworks will share a simple way to configure Linksys access point WAP54G access point. Steps by steps Linksys WAP54G Configuration Step 1: Device Remoot For Linksys WAP54G Remoot there…

Read More
opeating system debian 6

Tutorial set up IP Address on Debian 6

Tutorial how to set up ip address Debian 6 easily with images – IP settings are mandatory in the networking world. But the IP settings in Linux is very different from the IP settings in…

Read More
topologi-loadbalance-pcc

Load Balancing used to the MikroTiK (PCC Method)

MikroTik load balancing is a technique for distributing traffic loads on two or more connection lines in a balanced way, so that traffic can run optimally, maximizing throughput, minimizing response times and avoiding overloading on…

Read More
ransomeware-wannacry

WannaCry Malware Deployment Prevention

Ransomware WannaCry The last few months have carried out massive attacks happening in many countries of the world. Malware WannaCry uses security gaps in the SMB and RDP features that are used to share files…

Read More
block facebook

Tutorial Block Facebook access using MikroTik

This is a tutorial on how to block facebook access using proxy. Are you ready to try to block Facebook by using a Mikrotik intermediary tutorial on IDNetworks. How to block Facebook access using a…

Read More
netguard

Download The free NetGuard

IDNetworks – The rapid development of smartphones today makes humans very dependent on these devices. Whatever we can do looking for entertainment, friends, and work we can do with a smartphone. Immediately download the free…

Read More