Ivacy VPN Review

Honest review of Ivacy VPN.

A quick summary:

Ivacy is a privacy-friendly no-logs VPN service based in Singapore. As you will see in this review, it unblocks most major streaming services, is blazing fast, offers servers just about everywhere, and implements great technical security.

VPN stats:
  • Server Locations : 50
  • Average Speed : 81.08 Mbit/s
  • Simultaneous Connections : 5
  • Jurisdiction : Singapore


  • 30-day refund
  • Split tunneling (not Mac)
  • P2P allowed
  • No logs
  • Blazing fast speed performance


  • Support wobbles on very technical questions

All Ivacy customers have access to all basic features this provider has to offer. As is common, however, heavy discounts are available to those willing to buy lengthy subscriptions up-front.

The dedicated IP addresses and a NAT firewall with port forwarding features require purchasing additional add-ons. This could be viewed as slightly annoying, but year+ packages are very cheap in the first place, and these are not features most users will likely use.


A 7-day money back guarantee is available for one-month subscriptions, and a 30-day money back guarantee for all longer ones. An exception is if you pay in cryptocurrencies, which are understandably not refundable.


I’m impressed to note that Ivacy is effective at unblocking my benchmark US Netflix and BBC iPlayer streaming services. And although not tested, it should also be effective at unblocking many others.

It should also be noted that if any services proves particularity difficult to access, paying a little extra for a dedicated IP address should fix the problem.

Speed and Performance

With a Weighted Speedtest Result of 81.08 Mbits/s and Max Speed/Burst Result of 258.28 Mbits/s, Ivacy is currently the fastest VPN service on my books making it ideal for streaming in HD.

Drilling into my data more deeply, Ivacy’s DNS lookup times Average 0.61 seconds and Max 1.95, while connection times Average 5.2 seconds and Max 6.0 seconds. All of which is about average for VPN services.

IP leak tests

I ran DNS and WebRTC leak tests using Ivacy’s Windows and macOS clients (I would love to also test for leaks in mobile apps, but for various technical reasons this is not possible at the present time).

Ivacy told me that to ensure IP addresses are not leaked via the WebRTC browser “feature,” users should use its Chrome or Firefox browser add-on in addition to its client software.

I would normally criticize Ivacy for not warning users more clearly about this, but in my tests I detected no leaks anyway. This includes any regular IPv4 and IPv6 DNS leaks, but also WebRTC (tested with IPv6) leaks even when not using a browser add-on.

How to easily transfer data to a remote PC


have you been wondering how to transfer data to a remote PC on the easy way? You might now that Remote Desktop Connetion is only available if you own a Windows 10 Pro.

If you have Windows 10 Home edition that won’t work and you will be struggling to transfer any data to a remote PC. But I can tell you know that’s so easy to do if you know what you need.

The only thing you need is that both PC’s have installed TeamViewer which is for non commercial use Free. Just start a new TeamViewer session and when you will be connected to the remote PC

select the File Transfer tab:

Once selected you will get an tab from where you can select which data should be transfered to the remote PC:

And that’s it. Job done and it should take only 2-5 minuts to install the app and get it done.

Hopefully this will help you out.

SOLVED: How to change back from GutenBerg editor to the Classic editor


Did you get any trouble when updating WordPress to it’s latest core? We recieved a new editor which is called “Gutenberg”. At first it seemed like a good move from the WordPress team, but I was soon disappointed because my blog wasn’t working as it should. I tried to make a new portfolio item and I just couldn’t saved it. Was strugling to find a the category tab but with no success. At first I was already thinking of changing everything ( theme, plugins, etc..) That would cost me a lot of “time” to rebuild everything so I was thinking of an alternative. Why just I don’t get back the Classic Editor. Searching over the internet was such pain, because I didn’t find any useful articles about it. Then I went searching on the WordPress Plugin database where I finally found my solution. The Classic Editor plugin was there and it saved me hours of fixing and recreating the website.

Just follow those 3 easy steps and you should be back to normal with the Classic Editor!


  1. step = upload the plugin Classic Editor
  2. step = install the plugin
  3. step = active the plugin

And that’s it! Everything should go back to normal 🙂

Hopefully this will help you out!

Can’t see network computers after upgrading to latest Windows 10

Homegroup removed! How to get network sharing work with Windows 10 update v1803.

Here is short description how I get my network sharing work with Windows 10 v1803.

1.)All PC’s: Check network profile and network discovery and share settings


Sometimes this selection to change between Private and Public network profile is missing from Settings / Networks page. In that case profile must be changed by PowerShell. Right Click Windows Icon (Start button) and open PowerShell (Admin) and use following commands to get interface index number and change profile to Private (or Public):

Set-NetConnectionProfile -InterfaceIndex <index number> -NetworkCategory Private


1.2 )All PC’s: Check Network Discovery and Share settings


1.3)All PC’s: Set Start type to Automatic and start following services that allow PC’s to be visible on Network. (Reboot required!)

Push Win Key and type “Services” and locate these services:

  •    Function Discovery Provider Host
  •    Function Discovery Resource Publication
  •    SSDP Discovery
  •    UPnP Device Host


2.) All PC’s: Setting shares.

2.1.) Check your current shares.

Open file explorer and type \\localhost to address bar to see what shares are made in this computer.


2.2. ) Create new share. This way you can share any folder you like.

(Setting “Turn on sharing so anyone …” in Step 1.2.  make this share for C:\Users automatic.)


Folder is now shared and Network share path is: \\PCNAME\FolderToShare

2.3.) Security settings.

Right click “FolderToShare” and:

  • Open Properties
  • Select Security tab and click Edit
  • On Permission dialog click Add
  • New dialog open and you can add “User” (3 options)
  • Everyone (Access allowed all users even if they don’t have account on that PC. (Very unsafe setting! Think carefully do you need to select this!)
  • Authenticated Users (Access allowed all users who have account on that PC)
  • “User Name” (Access allowed only that user)
  • When back to Permissions dialog select which rights you want to give other users.
  • This same work for any folder you create and want to share your home network.



Now anyone on your home network should have access to shared folders without credentials or having user account on your computer.

3.) Now when click Network on File Explorer all your PC’s should be visible in Computer and Network sections.


This should be cover the essentials to sharing your data over local network. This share is not limited to C:\Users folder, every folder can be handled like shown in steps 2.

Now your PC’s should visible, but if you start getting error message “Windows cannot access \\PC_NAME” you need to go continue to step 4.

4.) There is some bug on Windows 10 1803 and because of that PC’s can’t always connect to each other by Name.

If you get error “\\PCNAME path not found” you can solve this by adding your PC’s and IP addresses to hosts file.

Instead of using \\PC_NAME\Folder use \\IP_OF_PC\Folder which will also help and you won’t need to add ip addresses to host file.

4.1) New routers (or modems) may have feature to remember which IP-addresses are assign to each device, but with older routers (or modems) you have to check that your router or modem is set give predefined IP-addresses linked to each PC’s MAC-address.

This way PC’s will get same IP-address every time when it ask IP-address form router (or modem) DHCP-server.

There should be some kind of list of PC names with MAC addresses and given IP-addresses of each connected PC.

Picture show that list on my router. In my case with old router I had to select manual assignment  in each line.


4.2.) Add all PC’s IP-addresses and Names to C:\Windows\System32\drivers\etc\hosts file.

You can check your IP-address and PC’s name by opening command prompt (CMD)

For IP-address type command: ipconfig you get line like this: IPv4 Address ……….

For PC name type command:  hostname

Take down IP-address and Names of each PC and add those to that hosts file.

To edit copy hosts file to some another location, right click it and use notepad to edit and save it. Replace original file with edited file. Because hosts file is located on system folder replace will ask administrators rights to perform it.

# localhost name resolution is handled within DNS itself.
#             localhost
# ::1                   localhost  PC1   # Ethernet  PC2   # Ethernet  PC2   # Wi-Fi

Cake, Bake is not recognized as an internal or external command

I wanted to start using CakePHP framework but I’ve encountered an error when trying to bake something:

'cake' or 'bake' is not recognized as an internal or external command

So I was wondering how to fix it. When I searched over the internet I found a lot of articles which weren’t helpful at all. That’s why I want to share a quick fix for everyone.

Here is the fix:

  1. Right click on My Computer
  2. Select Properties
  3. Go to Advance system settings
  4. Click on Environment Variables
  5. Go to System variables
  6. Select PATH and edit or add this:

After this restart your PC and you will see that now it’s working.

Also I’ve notice that some have written the command as bin\cake bake … but for me it’s working as cake bake … without bin\. For a notice I’m using Windows 10 Pro.

Hopefully it will spare you some time fixing it and if you like it shares are welcome!

Beta Tester for HIRE


I’m happy to announce that i’m available for beta testing.

It doesn’t matter if you are a web , game or app developer I can cover your back.

I can give you a honest review and report of your product. All my progress can be tracked true my CRM system, where you can see what I’m doing at the moment.

My pros:

  • honest review and report
  • bug search
  • tips
  • simple tracking of my doing

My rates:

  • Hourly Rate: 9.40$
  • Hourly Tips: 1.25$
  • Overtime: 10$

The rates can be communicated depending on your project requirements.

If you think I’m the right person please don’t hesistate to contact me.


Trouble solver


do you need any extra help with your project ?

You run into the next troubles:

  • installation issues
  • running issues
  • security issues

I’m here to help you out! I will try to fix the issue as soon as possible but before I will do my work I will need some details such as:

  • admin credentials
  • a review of the issue
  • registration to my CRM system

After all details are collected and reviewed I will start working on the issue itself. The time needed to finish an issue really depends and it can’t be provided in before.

Please don’t hesistate on Contacting Me

Would recommend SiteGround Hosting

I’ve been managing the SiteGround account for many months now and I haven’t encountered any major issues yet. My site is loading fast and is always up. One thing worth noting about their service is that they have a built-in caching system called SuperCacher. Users who don’t want to tinker with caching options or plugins could activate SuperCacher with a few clicks and this will give their site a decent speed boost.

Also their support is insane! Twice I’ve had server issues, because some of my scripts. The scripts weren’t working at all and I couldn’t figured it out. So I’ve asked the SG support team and they’ve told me the solution for both errors.

I would really prefer and recommend SiteGround as your hosting provider, because you really get what you pay for!

SiteGround is a definitely a decent host. You can be sure your sites will be up most of the time and their support team is friendly.

Sign up below

Web Hosting

Best Operating System For Ethical Hacking And Penetration Testing

Kali Linux

Developed by Offensive Security as the rewrite of BackTrack, Kali Linux distro tops our list of the best operating systems for hacking purposes. This Debian-based OS comes with 600+ preinstalled pen testing tools that make your security toolbox richer. These versatile tools are updated regularly and are available for different platforms like ARM and VMware. For a forensic job, this top hacking operating system comes with a live boot capability that provides a perfect environment for vulnerability detection. Now Kali Linux is based on a rolling release model.

Download Kali Linux


In the next article I will explain how to make a Kali Linux Bootable USB, that you will have your Kali everywhere with yourself.

Let’s see what Kali is:

Kali Linux is a Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. Kali contains several hundred tools which are geared towards various information security tasks, such as Penetration Testing, Security research, Computer Forensics and Reverse Engineering. Kali Linux is developed, funded and maintained by Offensive Security, a leading information security training company.

Kali Linux was released on the 13th March, 2013 as a complete, top-to-bottom rebuild of BackTrack Linux, adhering completely to Debian development standards.

  • More than 600 penetration testing tools included: After reviewing every tool that was included in BackTrack, we eliminated a great number of tools that either simply did not work or which duplicated other tools that provided the same or similar functionality. Details on what’s included are on the Kali Tools site.
  • Free (as in beer) and always will be: Kali Linux, like BackTrack, is completely free of charge and always will be. You will never, ever have to pay for Kali Linux.
  • Open source Git tree: We are committed to the open source development model and our development tree is available for all to see. All of the source code which goes into Kali Linux is available for anyone who wants to tweak or rebuild packages to suit their specific needs.
  • FHS compliant: Kali adheres to the Filesystem Hierarchy Standard, allowing Linux users to easily locate binaries, support files, libraries, etc.
  • Wide-ranging wireless device support: A regular sticking point with Linux distributions has been supported for wireless interfaces. We have built Kali Linux to support as many wireless devices as we possibly can, allowing it to run properly on a wide variety of hardware and making it compatible with numerous USB and other wireless devices.
  • Custom kernel, patched for injection: As penetration testers, the development team often needs to do wireless assessments, so our kernel has the latest injection patches included.
  • Developed in a secure environment: The Kali Linux team is made up of a small group of individuals who are the only ones trusted to commit packages and interact with the repositories, all of which is done using multiple secure protocols.
  • GPG signed packages and repositories: Every package in Kali Linux is signed by each individual developer who built and committed it, and the repositories subsequently sign the packages as well.
  • Multi-language support: Although penetration tools tend to be written in English, we have ensured that Kali includes true multilingual support, allowing more users to operate in their native language and locate the tools they need for the job.
  • Completely customizable: We thoroughly understand that not everyone will agree with our design decisions, so we have made it as easy as possible for our more adventurous users to customize Kali Linux to their liking, all the way down to the kernel.
  • ARMEL and ARMHF support: Since ARM-based single-board systems like the Raspberry Pi and BeagleBone Black, among others, are becoming more and more prevalent and inexpensive, we knew that Kali’s ARM support would need to be as robust as we could manage, with fully working installations for both ARMEL and ARMHFsystems. Kali Linux is available on a wide range of ARM devices and has ARM repositories integrated with the mainline distribution so tools for ARM are updated in conjunction with the rest of the distribution.

Kali Linux is specifically tailored to the needs of penetration testing professionals, and therefore all documentation on this site assumes prior knowledge of, and familiarity with, the Linux operating system in general. Please see Should I Use Kali Linux? for more details on what makes Kali unique.