Home - 2018 - March

Month: March 2018

Find out what websites on Google Chrome slow your computer down

Posted on March 26, 2018 in Uncategorized

Although Google wants websites to be as lightweight and fast as possible, there comes a time when this is almost impossible. Webpages are getting larger and heavier, working with huge databases, which can cause some websites to load slower than usual. Additionally, webpages increasingly show more images, multimedia content and front-end content that is run directly on the user’s computer, like scripts. When such content is run and saved on the computer’s memory, the entire computer starts to work very slowly, especially if we have a low-end processor or little RAM memory.

After analyzing the consumption of a browser like Google Chrome, we can divide it into 3 sections: the resources consumed by the browser and all the essential components needed to function; all the installed extensions that are loaded individually on the memory; and all the webpages opened at the same time in the browser window.

Given that each element is loaded as a different process within the browser, it is really easy to know which element consumes most of our computer’s resources, causing it to perform poorly. If we use Windows Task Manager, we can see all the browser’s processes, although we will not be able to identify the source of the problem. (more…)

Routers Gaming: The best offers from Gaming Week

Posted on March 26, 2018 in Uncategorized

This week is gaming week on online stores. A specific week when manufacturers give big discounts on their gaming products. In Badawave we put together a list of the best high-performance routers with interesting discounts, up to 30% and even more. Do you need high-performance router? Get a hold of these offers.


ASUS, the manufacturer, has a large experience in gaming, since it has a group of devices specifically designed for gamers called ROG (Republic Of Gamers). ASUS has launched significant discounts on their top-of-the-range routers as well as on a middle-range neutral router with the best price-quality relation on the market. (If you don’t have a gaming laptop, check here to choose one.) (more…)

New Agreement in the EU for the implementation of 5G: 20-year licenses

Posted on March 17, 2018 in Uncategorized

Little by little the institutional road for the 5G is being built with concessions being given to operators by governments and authorities. If we knew which are Spain’s 5G bands, now we know how long will they be granted to operators and when will they have to have them.

5G Licenses of at least 20 years and liberalized bands for the end of 2020

The European Parliament has reached an agreement these last days that the governments of the member states and the European Parliament still have to ratify. In it, the rules are established for the management of the radio spectrum of the 5G across the European Union.

Thus, within the framework of negotiations of the European Code of Electronic Communications, the European Parliament and Council have decided on two key issues. The first one being that, after liberalizing the 3, 6 and 26GHz, the 5G will have to have all the needed spectrum granted before the end of 2020. (more…)


Firefox 60 will go beyond limiting the HTTP protocol by allowing us to disable the FTP protocol

Posted on March 15, 2018 in Uncategorized

The developers of the main browsers on the market, like Google Chrome and Mozilla Firefox, are trying to promote using secure connections as much as possible. A proof of this is that newer versions of the browsers, starting with Chrome 68 and Firefox 60, will flag HTTP pages as “not secure” to prompt developers to go for more secure HTTPS connections. However, it seems that the HTTP protocol is not the only insecure protocol to meet its end, as the FTP protocol is also targeted.

As we can read, it seems that Mozilla will not settle with flagging HTTP connections as “not secure” on Firefox 60. We now know that the company intends to offer its users the possibility of disabling insecure FTP connections.

The FTP and HTTP protocols are similar: they have improved versions with data encryption (there are several alternatives for the FTP protocol, like FTPS or SFTP), so it does not make much sense to still use these insecure connections nowadays.

Firefox 60 will have that option disabled by default, so users can connect to FTP servers seamlessly. If we want to block unsafe websites, we must do it manually as follows. (more…)


Google Chrome 64 will clean up the URLs that you share on Android

Posted on March 13, 2018 in Uncategorized

We have surely shared a URL from our computer or from our phone, meaning that we have seen how this web address has a lot of characters and other information that makes the web address look “ugly”. For example, said information shows the device on which we have accessed the webpage or the source from which we have come to the webpage. However, this information should not be shown when sharing the URL with a contact. After having this issue for a long time, Google Chrome for Android is finally getting rid of it.

For an example of an URL with a lot of characters, we just have to do a simple search on Amazon. We will see how every character after the / (which is placed before “ref=”) is totally unnecessary when sharing a URL with other people. (more…)


Google Project Zero reveals a major vulnerability in Windows 10

Posted on March 9, 2018 in Uncategorized

Google Project Zero is a team of security analysts employed by Google that is constantly analyzing the security level of all types of software in order to find vulnerabilities before hackers and allow developers to solve those vulnerabilities to make their apps safer. This team of analysts works with any type of software. However, Microsoft’s software are undoubtedly part of the team’s favorites given how it reveals the security flaws of the brand’s OS and Microsoft Edge.

A few days ago, Google Project Zero exposed a vulnerability in Microsoft Edge, the company’s new browser that will take over Internet Explorer sooner or later. The vulnerability allows an attacker to avoid the Arbitrary Code Guarantee (ACG) security module to put the OS’ security at risk. (more…)