レポート

dvdfab-icon

DVDFab Sale Info Latest Sale Information and How to Buy

DVDFab sale information and purchase procedure ・ Introducing license registration method DVDFab can remove the copy guard developed by DVDFab Software (formerly Fengtao Software) in China […]

iobit-software-icon

Risk of using IObit app

Why IObit is criticized and the dangers of apps IObit is a Chinese software vendor that develops system utilities and security software, and while it is notorious, it is highly rated by IObit Uninstaller and others […].

Leawo-co-icon

How to purchase a Leawo product and register a license code

 Introducing Leawo's sale information, purchase procedure and license registration method Leawo is a brand of multimedia tools developed by software vendor Moyea Software based in Shenzhen, China, China […]

google-icon

Google's Personal Information Gathering and De-Google Guidance

Breaking away from and replacing Google services that collect personal information The DeGoogle activity is a grassroots movement aimed at removing Google from our net life, breaking away from Google and preserving privacy […].

google

Obtaining and setting up a Google account

Creating accounts and security settings required to use various Google services Google accounts are Gmail, YouTube, Chrome browser, Google Drive, Karen […] provided by Google.

dvd-shrink0011

Before using free software

Basic knowledge you should know before using free software As smartphones have become widespread and mobile apps can be monetized by collecting advertisements and personal information, the current free software running on Windows is open source [… ]

Microsoft-Tile-icon

Causes and remedies for unidentified networks

Unidentified network ・ What to do if there is no default gateway If you cannot connect to the Internet, it is often the case that the unidentified network is displayed on the network icon in the system tray!Is displayed. Wi […]

Proton-Mail-icon

Add your own ProtonMail domain

Send and receive email with your own domain with Proton Mail Proton Mail allows you to add your own domain with a paid plan and send and receive email with your own domain with the encrypted ProtonMail mail server […]

Proton-Mail-icon

How to use Proton Easy Switch

Import mail from providers that can use the IMAP protocol such as Gmail and Outlook to ProtonMail Proton Easy Switch is an IMAP program such as Gmail and Outlook […]

Proton-Mail-icon

Proton account password reset and data recovery

Password reset and data recovery procedures used with ProtonMail and ProtonVPN The password set in your Proton account decrypts data such as messages and contacts stored encrypted […].

Proton-Mail-icon

Install and configure ProtonMail Bridge for Windows

ProtonMail Bridge for Windows, an extension tool that allows you to send and receive ProtonMail with your email client app, is offered to users who have a paid ProtonMail plan […]

Reports-icon

Producing original pottery with Yaco oven pottery clay

Create an original water dish using Yako's oven pottery clay that can be fired in the oven. […]

Reports-icon

How to save videos from video streaming services

How to Save Amazon Prime Video and Netflix Content to Video Files When using video streaming sites such as Amazon Prime Video and Netflix, the titles I intended to watch later disappear […]

Reports-icon

Darknet accessed by Tor

Lawless Zones Accessed by the Anonymous Browser Tor Websites include the Surface Web (surface web) that appears on search engines such as Google, and the Deep Web (deep web […]) that does not appear on search engines.

Reports-icon

Security and benefits of using VPN services

Benefits of using a VPN service and indicators when selecting a VPN provider Using a VPN service offers the benefits of secure communication, concealment of communication content, and anonymization of communication, and the location of the connection source by specifying a connection server. […]

Reports-icon

Password management

Password management method and leakage risk With the authentication method using login ID and password, if account information is leaked, there is a high possibility that it will be accessed by a third party, and if it is misused, account hijacking or illegal deposit of docomo account […]

copyright

Copyright law and illegality of ripping and capture

Illegalness such as DVD / BD copy ripping and video download Article 30 of Japanese copyright law allows copying of copyrighted works for private use, but at the same time prohibits the avoidance of technical protection measures. So use the app to DV […]

Reports-icon

Ripping software that can release copy guard

An app that can remove copy protection for DVD / Blu-ray DVD and Blu-ray access control and removal of copy protection are illegal acts that violate the evasion of technical protection measures under Article 30 of the Copyright Law, but copy […]

Reports-icon

UHD Friendly Drive and Firmware Downgrade Method

BD drive required for ripping 4K UHD Blu-ray UHD Friendly drive can avoid copy protection AACS 4 of 2.0K UHD Blu-ray due to a firmware defect ASU […]

cloud

Comparison of free cloud storage services

Compare the storage capacity and available features of free cloud storage services The domestic share of online storage services is 2020 According to a survey by ICT Research Institute, Google Drive is the top, followed by iClo […]

virtualbox_icon

How to use Windows 11 with Oracle VirtualBox

Secure Boot-Install Windows 2.0 on VirtualBox that does not support TPM11 Window […] because Oracle VM VirtualBox does not support Secure Boot and TPM2.0.

paypal-icon

Introducing and using PayPal

Founded in 1998, FinTech's pioneer PayPal is an online payment agency service that originated in the United States and has a solid support system. When you call, an overseas operator who speaks fluent Japanese will respond.Business account […]

dvdfab-icon

DVDFab Deactivation and Reactivation Procedures

DVDFab deactivation and reactivation procedures required when moving a computer DVDFab is linked to the hardware information of the computer and saved as user information when the product is activated, so DVDF […]

Infect-icon

Phishing and spam emails

Definition of Spam E-mail and Examples of Spy E-mail Spam E-mail (Junk E-mail) is a junk e-mail that is unilaterally mass-transmitted using the recipient list, and is a luncheon meat SP sold by Hormel Foods in the United States […].

gmail-icon

Gmail delegation settings "proxy function"

Proxy function that grants access to Gmail Gmail has a proxy function that grants access to its own mail account, and the delegate who has been granted access can view / send / delete mail [… ]

Reports-icon

Plantronics Voyager Legend Reset and Firmware Update Procedure

Resolving Plantronics Voyager Legend Bugs with Firmware Updates Plantronics' Bluetooth-connected headset Voyager Legend is an ear-hook type, so […]

Reports-icon

Replacing the battery of the wristwatch and using the back cover closing machine

Surprisingly risky watch battery replacement The price of watch battery replacement is more than half the technical fee, so it is cheaper if you replace it yourself, but in some cases the back cover will not close or the dial will float when you open the back cover. There is a risk of. […]

Infect-icon

Malware type and overview

About the form and type of malicious software "malware" Malware is a portmanteau of Malicious softwere (malicious software), a virus, a worm, a Trojan horse, and a su […].

Infect-icon

What to do when you suspect a virus infection on your computer

What to do when computer virus infection is suspected for free and basic knowledge of malware The two major functions of security software are antivirus and firewall, and antivirus mainly performs prevention, quarantine, and removal, and phi […]

2checkout-icon

2Checkout Payment payment method and suspension of subscription

Global payment service 2 How to stop payment and subscription (subscription) with Checkout 2Checkout is a group that provides a general e-commerce system that is often used in payment services for overseas applications […]

gmail-icon

Gmail POP mail reception settings

Gmail can also be moved POP mail reception and sending account additional settings Gmail implements Google Mail Fetcher that can receive POP mail accounts, and Gmail account […]

dropbox_icon

Installing and using Dropbox for Gmail

Gmail extension that allows you to share files in Dropbox and save attachments to Dropbox Gmail integration is directly from Gmail provided by Dropbox in Dropbox […]

dvd-shrink0011

Business Email Basics and Manners

The basics you need to know when using email at work and business etiquette etiquette means social etiquette, and etiquette means customs that facilitate relationships, so Japanese business etiquette is called business etiquette in English. difference […]

Reports-icon

Cheap download MP3s from Russian site

Russian MP3 discount site Golden MP3 MP3s sold in Japan are almost the same price as CDs, but MP3s are 198 kbps to 320 kbps […] compared to CDs, which are uncompressed linear PCM sound sources.

gmail-icon

Using Outlook / Yahoo Mail with Gmail Gmailify

Send and receive from Gmail by associating Yahoo Mail and Hotmail / Outlook.com Gmailify is with Yahoo! Mail and Outlook / Hotmail / Live accounts […]

Reports-icon

Comparison and configuration of Fire TV Stick and Chromecast

Compare similar but different Amazon FireTV Sticks with Google's Chromecast Amazon's FireTV Sticks are entertainment-focused, easy-to-use, and Chrom […]

Reports-icon

Logitech FLOW vs Stardock Multiplicity

Logitech FLOW restrictions lifted with Stardock Multiplicity In June 2017, Logitech announced FLOW, which allows you to move between up to three PCs with a single mouse and copy and paste. […]

Reports-icon

How to set up and review Withings Steel HR

Withings Steel HR Setup with Heart Rate & Activity Monitor The Steel HR is a smartwatch developed by Withings. Withings (Wijin […]

Reports-icon

Restore internet connection with IIJmio and PIXELA PIX-MT100

IIJmio data communication setup procedure Due to the impact of Typhoon Jebi, which hit directly on September 2018, 9, the contracted "eo Hikari Service" failed and became unusable.On the day of the typhoon hit, I witnessed a vivid disaster […]

Microsoft-OneDrive-icon

OneDrive that has been repeatedly deteriorating

OneDrive's aggravation and phantom capacity unlimited The other day, Dropbox's free plan limited the number of devices available to three, and the paid plan Dropbox Plus was raised at the same time as the enhancement, but this change is […]