Google Chrome Tips

Most Relevant Content

  • How to Clear Google Chrome History

    Google Chrome is one of the most popular web browsers to online users. It provides a lot of features which help to use this browser smoothly and securely. Google Chrome history is one of the useful features in Google Chrome which helpfully caches or remembers a lot of browsing information specially username and password or login credential of your important web account when you visit various websites in internet. If you are the only user of your desktop or laptop, it is very helpful to you if your Google Chrome browser caches your browsing information in its history but if you use a public computer or a share computer, it will be very harmful to you if your important or secret information are kept in Google Chrome history. So, it is a better habit to clear your browsing history from Google Chrome history before closing your browser. Otherwise, your browsing history may appear to others and it will be absolutely harmful for you. So, this article is designed to show you how to clear browsing history from your Google Chrome browser. Steps to Remove History from Google Chrome It is important to remove or clear your browsing history information from Google [...]

    READ MORE »

  • You May Also Like

  • »

    Apache2 Web Server HTTPS Configuration on Ubuntu Server |   August 15, 2021

    Data transmission between web server and web client over port 80 (HTTP) is not encrypted. So, any middle man between web server and web client can view transmitted data and can steal secret information. To overcome this limitation, HTTPS Protocol over port 443 has been introduced. HTTPS is a secure web server that is configured with SSL/TLS certificate. TLS (Transport Layer Security) and its predecessor SSL (Secure Sockets Layer) are web protocols used to wrap normal traffic in a protected, [...]

    READ MORE »

  • »

    MikroTik Router Integration and Configuration on GNS3 |   September 19, 2018

    GNS3 is a network simulator software used by hundreds of thousands of network engineers worldwide to emulate, configure, test and troubleshoot virtual and real networks. GNS3 can talk a large number of network vendors including MikroTik. MikroTik introduces Cloud Hosted Router (a RouterOS version) that is used to run as virtual machine and a virtual machine can easily be integrated with GNS3. So, network administrators who are fond of MikroTik Router can now configure, test and troubleshoot their MikroTik network [...]

    READ MORE »

  • »

    MikroTik Bandwidth Management using Simple Queue |   September 3, 2015

    MikroTik is one of the most popular routers in computer networking. It is said that no office or ISP company cannot go a single day without MikroTik Router. MikroTik Router is also a popular router to a network administrator because MikroTik Router is easily maintainable with graphical user interface software named winbox than other routers. A lot of services are available in MikroTik router to run a network smoothly. Among these services, Bandwidth Management Service is the most popular service in [...]

    READ MORE »

  • »

    Internet Connection Sharing Ethernet to Ethernet |   September 22, 2015

    Windows is the most popular operating system to any computer user. It is said that no computer user cannot go a single a day without windows operating system. Windows has a lot of default internet features which help to connect our computer to internet as well as it provides internet connection sharing facility. With Internet Connection Sharing (ICS) feature, you can turn your laptop into Wi-Fi hotspot or turn your desktop into a router to share your broadband connection with your family [...]

    READ MORE »

  • »

    How to Bind Hotspot User to MAC and Static IP in MikroTik |   November 6, 2020

    MikroTik Hotspot is usually a user based Hotspot access controlling system. Internet access and bandwidth can easily be maintained with Hotspot user based system. But sometimes we may require more control on Hotspot system which is not possible only username based system. So, we may need to bind hotspot user to MAC and static IP address. If we can bind hotspot user to static IP address, it is easy to control Hotspot users with MikroTik Router and Firewall. So, in [...]

    READ MORE »

  • »

    FreeRADIUS User Group Management with MySQL |   January 3, 2019

    FreeRADIUS is a high performance RADIUS Server. A number of network devices can be used with freeRADIUS Server as a RADIUS Client including MikroTik Router. As a modular RADIUS suite, freeRADIUS accepts MySQL module to query user authentication and authorization and to store accounting data. In my previous article, I discussed how to install and configure FreeRADIUS MySQL module. I also discussed how to authenticate MikroTik Login with freeRADIUS MySQL user. In this article, we will talk about how to [...]

    READ MORE »

  • »

    Virtual Web Hosting with Apache on CentOS 7 (Name Based) |   July 15, 2019

    Virtual Hosting is a method of hosting multiple domains on single server. If you have multiple domains (such as domain1.com, domain2.com and so on) and want to host on a webserver, Virtual Web Hosting is your right choice. Apache web server provides an easy way to manage Virtual Hosting. Virtual Hosting can be either Name Based or IP Based. In Name Based Virtual Hosting, multiple domains can be hosted on single IP address. On the other hand, in IP Based [...]

    READ MORE »

  • »

    MikroTik Backup and Restore Configuration using Winbox |   July 31, 2018

    Backup and Restore feature in MikroTik Router helps to recover router configuration when running router fails to operation due to hardware failure. If you have a backup copy of your failed router and purchase a new MikroTik Router and then upload and restore that backup file, you will get your running network without any hassle. MikroTik Backup file is also useful when you unfortunately forget your admin privilege user password. You can easily recover your forgotten password with backup file [...]

    READ MORE »

  • »

    System Restore in Windows 10 |   August 30, 2015

    Windows is the most popular operating system in the world. No computer user can go a single day without windows operating system. As windows is a popular and mostly used operating system, a lot of viruses or unwanted programs are creating everyday. So, you may face various unusual behavior in your windows operating system due to various virus attack or unwanted programs installation. But windows has integrated a lot features which help to prevent these unwanted programs and keep your [...]

    READ MORE »