Download ‘Advanced Penetration Testing – Hacking the World’s Most Secure Networks’ eBook For Free

Build a better defense against motivated, organized, professional attacks with this free eBook.

From the publisher: “Penetration testing consists of low-level hackers attacking a system with a list of known vulnerabilities, and defenders preventing those hacks using an equally well-known list of defensive scans. The professional hackers and nation states on the forefront of today’s threats operate at a much more complex level – today’s threats are organized, professionally-run, and very much for-profit. Financial institutions, health care organizations, law enforcement, government agencies, and other high-value targets need to harden their IT infrastructure and human capital against targeted advanced attacks from motivated professionals.

Featuring techniques not taught in any certification prep or covered by common defensive scanners, this book integrates social engineering, programming, and vulnerability exploits into a multidisciplinary approach for targeting and compromising high security environments. From discovering and creating attack vectors, and moving unseen through a target enterprise, to establishing command and exfiltrating data—even from organizations without a direct Internet connection—this guide contains the crucial techniques that provide a more accurate picture of your system’s defense. Custom coding examples use VBA, Windows Scripting Host, C, Java, JavaScript, Flash, and more, with coverage of standard library applications and the use of scanning tools to bypass common defensive measures.”

Written by Wil Allsop and published by Wiley in March 2017, this 288 page ebook (a $26 value) is free to download through January 22, 2019. The book is offered by TradePub. If you don’t have an account there, the registration process to create an account is on the long side.

How to Get a Kuwaiti IP Address from Anywhere

Getting a Kuwaiti IP address isn’t easy. After all, the government is rather proactive in filtering out and restricting access to internet content it deems offensive, pornographic or otherwise subversive to public order. Combined with its proximity to much larger regional powers, and you have a country which doesn’t register highly on most VPN providers’ wish-list of server locations.

Nevertheless, if you are searching for a Kuwaiti IP, you likely have a very good reason for doing so, and demand a solution. In today’s article, that’s exactly what we aim to do. We’ll first go over what makes a good VPN service, then recommend our favorite provider proven to provide outside access to IP addresses in Kuwait. We’ll then show you how to sign up, install, and configure your VPN. Finally, we’ll cover a few miscellaneous items on the subject that will help you stay safe online.

What makes a good VPN?

Picking a VPN provider is difficult enough, with all the competing claims from various services saying why they are the best on the market. Thankfully, there are a few core criteria which can help you weed out charlatans and settle on a truly reputable company:

  • Encryption – By default, everything you send on the internet is easy to view. If you want to protect your data, you’ll want to look for VPN providers who use modern, reliable encryption standards to protect your data.
  • Bandwidth and speed – The proxy routing and encryption processes add overhead to your connection speeds, but the best VPNs reduce slowdown to an unnoticeable minimum.
  • Logging policy – If a VPN doesn’t have a zero-logging policy, everything from your traffic logs to IP addresses and browsing history gets stored. This makes it easy for authorities and interested third parties to track you down. If you want to feel safe, look for providers that don’t log your info.
  • Device compatibility- If you are looking to browse on different devices, for example, an iPhone and a Windows PC, you’ll need a VPN with apps for different operating system. The same applies to video game consoles, routers, and other device types. If you want to use a VPN with your hardware, make sure your provider has the apps you need.
  • Network size – The bigger the network size of a VPN provider, the better chance you have of finding a quality connection in the country of your choice. Bigger networks also tend to have faster connections and lower latencies, since the more servers a provider has, the more routing options they have for your data.

PureVPN – Best VPN for getting a Kuwaiti IP address

PureVPN is unique in a lot of ways. For the purposes of this article, the provider stands alone in offering a server connection in Kuwait. In fact, PureVPN seems to specialize in covering the globe; their network spans 2,000+ nodes in 140 countries, with another 40 locations represented via virtual servers. This is well above the industry norm, and it’s truly remarkable that PureVPN is able to provide such variety of choice to their users.

Beyond the sheer breadth of their network, PureVPN offers incredible utility as an all-in-one cybersecurity solution. Packaged in their software is a massive variety of functionality including app filtering, DDoS protection, dedicated IP addresses, a NAT firewall, anti-spam filtering, and even antivirus software. Among VPN providers, this suite of tools is not only unusual, but practically unheard of.

But don’t let the bells and whistles fool you into thinking that PureVPN’s core functionality is anything other than outstanding. Once again, this provider stands out for their unique way of doing things, with a variable encryption method that allows you to set your level of security to the max 256-bit AES protocol (which is virtually unbreakable by any means of brute force), or to drop encryption altogether for optimal connection speeds (useful when you just want to use PureVPN as a proxy service and aren’t concerned about security). There are also intermediate settings, allowing you to dial in the right balance of privacy and performance.

Rounding out the package is a handsome no-logging policy, zero restrictions on bandwidth, and broad device compatibility including Windows, Mac OS, Android, iOS, Linux, DD-WRT routers, Amazon Fire TV devices, and even Kindle.

Getting started with your VPN

Step 1 – Download the VPN software

  1. Open your web browser and sign up with PureVPN.
  2. Download the app that is compatible with the device you’re using.
  3. Install the VPN and open it on your device; log in using your account details.
  4. Upon launch, you will be provided with a list of connection options; select a Kuwaiti server.
  5. Give the VPN a few moments to connect to the server.
  6. You are good to go! Open your browser or any app and start enjoying the internet with your Kuwaiti IP address.

Step 2 – Verify you’re safe

This step is not mandatory, but we recommend you go through with it since it only takes a few moments and verifies that the VPN is working properly. Once you complete this step you will be certain that you are connected and your information will remain fast and secure.

  1. Connect to a server in Kuwait through your VPN app.
  2. Open your browser and visit ipleak.net. This page will run an automatic IP address lookup.
  3. If you see “Kuwait” under “Your IP Address(es)”, your VPN is connected properly and you are ready to go! If you see your physical location, contact the VPN provider; there may be a DNS leak.

You are now ready to enjoy unrestricted access to the free and open internet. Have fun enjoying content without geo-restrictions, shopping for deals on everything from clothes to flights, playing video games with a low latency connection, and more.

Advantages of getting a Kuwaiti IP address

If you live or work in Kuwait, you probably have many online accounts that let you shop, bank, socialize and more. When you’re on vacation or a work trip in another country, you may find yourself unable to access these accounts and, for example, pay your credit card bill, access your social accounts or check your bank account balance. In all these cases, getting a foreign IP address using a VPN will help you access your local accounts hassle-free without being in Kuwait. This way you don’t need to worry about going away; you can access all the same websites and personal accounts without actually being back home.

Second, Kuwait is an excellent choice if you want to shop, play video games, or stream with individuals and businesses located in the Middle East. Neighboring nations include Turkey, Greece, Saudi Arabia, Egypt, and United Arab Emirates. Turkey alone has 36 million active internet users, and a Kuwaiti IP lets you game with them seamlessly. Other nations, like United Arab Emirates and Saudi Arabia, are known for their excellent shopping. Getting a Kuwaiti IP will let you enjoy what these countries’ retailers offer online, and give you access to content restricted to the area.

Last but not least, a Kuwaiti IP can remove regional restrictions that stop you from browsing the internet freely. For example, many EU countries severely restrict access to gambling websites and specific news outlets. Kuwait is fairly liberal in this department – so while it may have national blocks against some service and content categories, it can help you overcome various forms of censorship all the same.

What exactly is a VPN, and how does it work?

If you’re familiar with IP addresses, you’ve probably stumbled upon free or low-cost proxy services claiming to enable you to access the internet as though you were in another country. In many cases, such services do indeed allow some degree of flexibility in changing your IP address. However, there is a much better way to connect to Kuwait, or any other country for that matter: using a virtual private network, or VPN.

But what exactly is a VPN? Essentially, it is a software as a service which installs onto your phone or computer, then interfaces with a specially configured network of proxy servers. You can think of this network as a smuggler’s ring; you take a hidden path to reach their secret base, then they transport you discretely to your intended direction. In the process of doing so, they equip you with a new identity, and vow to keep your activity a secret from everyone.

Speaking more technically, the hidden path comes in the form of digital cryptography known as encryption, which basically scrambles all data traveling between your device and the VPN network. The only way to make sense of this scrambled data is to know the passcode, which is typically so absurdly complex, it would take a supercomputer millions of years to guess it via “brute force”. No, we’re not exaggerating that claim.

Once the link between your computer and the network is established, you choose a proxy server which will “smuggle” you into the corresponding country. In our case, we’ll choose a server located in Kuwait. From there, you’ll browse the internet as normal, sending out requests to various websites to retrieve content to display on your screen. However, the key difference is that those requests will be sent first to the Kuwaiti server, rather than your Internet Service Provider.

Why does this matter? Because the website you want to visit will recognize the request as coming from Kuwait, rather than your actual location. This has far-reaching implications, since different content is available or restricted based on your position in the world, thanks largely to copyright laws and government censorship. Your IP address is your digital passport, and being able to switch your IP at will is like handing in your French passport for a Kuwaiti, Indonesia, Japanese, or Canadian one whenever it’s convenient.

What about proxies and free VPNs?

While proxy services allow you to “spoof” your IP in much the same way, they lack the critical element of encryption, which forms the secure tunnel between you and the server network. This is inherently unsafe, and opens you up to prosecution by ISPs and governments who frown on such activity (which is to say, most of them). Worse still, many proxy services actively keep tabs on your activity, and sell this personal data off to the highest bidder. There are even free VPN providers which do the same thing–making you less safe. This is why we always recommend you go with an established and respected provider.

Conclusion

When searching for an IP address from more niche locations like Kuwait, it can be difficult to find a reputable service that enables you to do so. In this particular case, the VPN market truly offers slim pickings. Fortunately, one extremely high-quality provider is in the business of connecting you to Kuwait: PureVPN. With today’s guide, you have everything you need to get started spoofing your IP address in style. Whether you’re in it for unblocking content, accessing region-exclusive shopping deals, early access to video game releases, or just want a broader selection of media to consume, a VPN is your best bet.

What are you going to use your Kuwaiti IP address for? Leave us your ideas below!

 

Read How to Get a Kuwaiti IP Address from Anywhere by Diego Villena on AddictiveTips – Tech tips to make you smarter

How to Access Blocked Sites on Linux with a VPN

Having trouble opening a certain website on Linux? Chances are you’re being blocked by a censorship filter or other firewall put in place by an ISP. Don’t worry, you’re not powerless to fight back. There are several useful tools you can deploy on Linux to access blocked sites. These include proxies and traffic encryption software, as well as the most powerful unblocking tool of them all, virtual private networks.

VPNs are easy-to-use, multi-purpose apps that run quietly in the background of your device, protecting your identity and encrypting your traffic at all times. By simply running a VPN on your Linux device, you can hide your identity and location, allowing you to access blocked sites, watch Netflix movies from abroad, and a host of other things. Keep reading for our full guide on how to unlock censored sites on Linux using a VPN!

Getting the best VPN to access blocked sites on Linux

It’s surprisingly easy to access blocked sites on Linux once you have the right tools. VPNs make it extremely easy to sign in and break through censorship and geo-restriction walls. The best part is you don’t have to do any complex configurations or anything like that, just install the software, connect, and you’re set!

Best VPN features you need

Not all VPNs are capable of unblocking sites on Linux. Some have better encryption or privacy features, some are made for faster speeds, and some simply won’t run on Linux hardware. Before you run off and start trying VPNs, consider researching the features listed below. We used these criteria to rank and select the top VPNs for accessing blocked sites on Linux, all presented in the next section.

  • Linux availability – You need to run VPN software on your Linux devices in order to access unblocking features.
  • Good reputation – Can you trust your VPN? Using well-established services is a good starting point for keeping data safe.
  • Security extras – Does the VPN offer an automatic kill switch? DNS leak protection? These help you stay hidden and unblock different websites with ease.
  • Zero-logging policy – VPNs can store logs of your activity. To ensure this doesn’t happen, go with a service that has a strict zero-logging policy.

Top VPNs to access blocked sites on Linux

After careful evaluation of the VPN market, we compiled our findings into the following list. Below, we cover the top three VPN providers proven effective to shield Linux users’ data and identity secure around the globe.

1 – ExpressVPN

ExpressVPN is one of the easiest to use VPNs on the market. It has a well-deserved reputation for being fast and friendly, too, as anyone can sign up and use the service to stay safe and secure on any device with just a couple of clicks. ExpressVPN lets you unblock thousands of sites worldwide on PC, Mac, iOS, Android, Linux, and more, and you never have to worry about complicated configurations. With ExpressVPN, you’ll be able to take back the free and open internet on your Linux device in a matter of seconds.

ExpressVPN offers a good selection of privacy features to keep you safe. Data sent to and from your device is always secured with military-grade 256-bit AES encryption. It’s also backed by a strict zero-logging policy on all traffic, DNS requests, and IP addresses and is protected by an automatic kill switch and DNS leak prevention features. All of these work with ExpressVPN’s massive network of over 2,000 servers in 94 different countries, giving you a fast and secure connection anywhere in the world.

ExpressVPN is one of the few mainstream VPN services that has a dedicated app made just for Linux (Ubuntu, Debian, Fedora, and CentOS). This makes it extremely easy to download and set up, and it’s perfect for newcomers to the VPN scene, as well.

For more info about this VPN and its amazing features, check out our ExpressVPN review.

2 – NordVPN

NordVPN is a fast, secure, and popular VPN that countless users trust every day with their most sensitive data. The company runs a large network of servers and has apps for practically every modern device imaginable, including Linux. As soon as you join you get unlimited access to over 5,160 servers in 62 countries, one of the largest networks in the business. This variety delivers incredible speeds no matter where you connect from, and it allows NordVPN to offer unique click-to-activate features like double encryption, protection from DDoS attacks, and onion routing over VPN.

NordVPN comes with everything you need to stay safe online: 256-bit AES encryption, DNS leak protection, an automatic kill switch, and a zero-logging policy that covers time stamps, DNS requests, IP addresses, and traffic. It’s extremely easy to use on any device, offering lightweight yet powerful apps for PC, Mac, Linux, iOS, and other platforms. When you need solid, fast protection, and unparalleled unblocking features, you can’t go wrong with NordVPN.

NordVPN has a custom VPN app made just for Linux (Debian). You can install it directly from the NordVPN repository, as well. Other Linux distributions can deploy the VPN using customizable OpenVPN settings.

Learn more about the NordVPN experience in our full NordVPN review.

3 – CyberGhost

CyberGhost delivers one of the best VPN experiences on any platform. It’s fast, easy to use, secure, and it can run on nearly every device imaginable, including PCs, tablets, smartphones, and more. As soon as you sign up you’ll be able to freely access CyberGhost’s network of over 2,400 servers in 60 countries, all with unlimited data and no restrictions on speed or server switching.

CyberGhost’s privacy features keeps everyone secure with strong military-grade 256-bit AES encryption on all data, a zero-logging policy on traffic, time stamps, and IP addresses, and both DNS leak protection and an automatic kill switch. These features hide your identity each time you go online, allowing you to connect with fully encrypted data no matter where you go. Whatever kind of sites you need to access on Linux, CyberGhost can unblock them in an instant!

CyberGhost does not currently offer dedicated software for Linux users. However, it’s extremely easy to set up using OpenVPN on all Linux distros.

Learn more about CyberGhost’s great privacy features in our complete CyberGhost review.

EASY CONFIGURATION: CyberGhost excels at delivering maximum security with minimal user input. For a turnkey solution at a low price, sign up with our exclusive 77% reader discount.

Using VPN on Linux to access blocked sites

With a reliable VPN researched and chosen, you’re now ready to begin the easy part: installation and unblocking!

Setting up your VPN

Setting up a VPN on Linux is, for the most part, a straightforward affair. Many VPN services offer dedicated apps for a variety of distros you can add directly from the command line. Failing this, packages are often made available to download and untar yourself. Ubuntu and related distro users can even download certain VPNs from the package manager.

Some VPNs do not offer a dedicated app for Linux. Instead, you’ll need to configure the service to work through OpenVPN. If this is the case, install OpenVPN through your package manager, then check with your VPN provider for specific instructions on how to set up and install the VPN itself.

Once you have the VPN app installed, you’re ready to begin. Start by launching the app and signing in with your account credentials. The software should connect to a fast server automatically. It doesn’t necessarily matter where the server is located, just as long as it’s not in a country that’s likely to be blocked by many websites. To be on the safe side, try going with servers located in Europe or North America, if possible.

After connecting to the VPN you can safely minimize the program and let it run in the background. There’s no need to interact with the software unless you need to change settings or server locations. The VPN will quietly encrypt and protect your traffic while you work, unblocking sites automatically.

Verifying your IP address

Whether you’re a first time user or just experimenting with a new VPN for unblocking websites, it’s always a good idea to run a quick check to make sure your VPN is active and working. Having an anonymous, non-local IP address sits at the core of accessing blocked sites. By running an IP address lookup, you can check to see if you’re actually getting the VPN protection you need.

Before starting, make sure your VPN is connected to a live server. Next, open a terminal on your Linux device. Type in the following command to get your IP address:

  • curl ipinfo.io

This should return a simple IP on the next line. To see which country it’s from, all you need to do is add that to the end of the command above. While still in the terminal, type in the following, replacing ##### with the IP address returned from the previous command:

  • curl ipinfo.io/#####

Now compare the country returned in that search with your physical location. Are they different? Does the country match the VPN server you connected to? If so, you’re all set and ready to unblock websites!

If you don’t want to use the terminal for the IP address check, you can also open a web browser and visit ipleak.net. Wait for the page to load and it will automatically run an IP address lookup. When it completes, look at the box beneath where it says Your IP address. It should show a country other than your own, which means the VPN is working correctly.

Unblocking sites with a VPN

Now for the really easy part: accessing blocked sites. Once your VPN is installed, connected, and correctly configured all you need to do is try loading the website you couldn’t access before. Open a good, secure web browser and type in the URL. It should open automatically, all without proxy error or access denied messages.

If you still can’t access the website, it could mean the IP address associated with your server’s country is what’s causing the block. By changing VPN servers, you can quickly bypass the firewall. Open the VPN app and look for a server browser screen. Click it and choose a location that’s more friendly to online censorship and privacy concerns (European and North American countries are generally the best). Connect to this new server, then go back to your web browser. Reload the page and it should work right away!

More ways to access blocked sites on Linux

The best thing about Linux distributions is that they’re open source and highly extensible. You can customize just about everything, all with extremely powerful tools made by security and software experts. If a VPN doesn’t break through the firewalls you need, try one of the methods below.

Shadowsocks (SOCKS5 proxy)

Shadowsocks was made specifically for free and open internet access in China, but it works wonders anywhere in the world and is an incredibly powerful way to unblock sites. It operates by using the SOCKS5 protocol (Socket Secure 5) which transfers data packets between clients and servers by using a proxy server. It also provides a layer of authentication to make sure only the intended user can access the personal proxy, giving it VPN-like qualities.

You’ll need access to a shadowsocks server to make this method work, however, which either requires running your own or renting an external service. It can be complicated to manage a shadowsocks server of your own, and renting one is expensive. If you know what you’re doing, though, this can be both faster and more effective than a VPN. There are even both GUI and command line clients available for multiple Linux distros.

SSH tunnel

Secure Shell (SSH) tunnels are a unique method of wrapping data in a layer of SSH encryption, allowing them to pass through filtering services undetected. SSH is a widely used protocol with a number of legitimate purposes, such as securely sending files from hosts to servers over an internet connection. It’s extremely unlikely that SSH traffic will be blocked by any website or ISP, making it a viable option for accessing blocked websites from your Linux device.

The downside to SSH tunnels are that they can be slow. The technology wasn’t designed for large amounts of traffic, so if you’re downloading anything more complex than a simple website, you’ll probably have a difficult time. The good news is it’s easy to make an SSH tunnel on Linux, so with a little time and effort, you can try it out to see how it works.

SSL/TLS tunnel

SSL (Secure Socket Layer) connections usually remain unblocked by website and ISP firewalls, largely because they’re commonly used to encrypt traffic associated with online shopping, e-mail, web banking, and other online services. If you see a little lock icon in your browser’s URL box, that means the site is using SSL.

SSL tunnels can be used for more than just HTTPS sites. They can actually encrypt traffic to make it look like standard SSL connections, allowing you to bypass locked websites and geo-restrictions with ease. To use an SSL tunnel you’ll need to download the stunnel software. It’s not easy or quick to set up, and you’ll need a lot of technical knowledge to pull it off, so be sure to do your research before jumping in.

Tor Browser

Tor leverages onion routing to wrap data in multiple layers of encryption before sending it through a variety of nodes in the Tor network. Each layer is stamped with an address that tells the node where to send the packet next. When the final layer is peeled away, the data is sent to its destination, and it’s practically impossible to trace it back to its origin.

The encryption and anonymity provided by the Tor Browser makes it an excellent method for accessing blocked sites on any platform, including Linux. The downside is the software wasn’t made for heavy download use and can be extremely slow compared to a standard connection. You won’t be able to access most online videos, as technologies such as Flash, QuickTime, and ActiveX are blocked due to lack of security. Torrents and P2P downloads also shouldn’t be used through the Tor network.

Despite its drawbacks, the Tor Browser is still a safe and effective method of accessing blocked sites on Linux. Learn more about the technology that powers Tor, including full setup instructions, in our feature How to Use Tor: A Guide to Getting Started.

Conclusion

Accessing blocked sites on Linux isn’t as difficult or complicated as you might have thought. With a VPN, you can break through most censorship barriers and restore access to the free and open web with ease. Even if a VPN doesn’t provide the necessary leverage, Linux itself is a capable and extensible platform that hosts countless tools for cracking open difficult to access websites.

Got any particular sites you hope to unblock with a VPN? Share your thoughts, concerns, and success stories in the comments below!

Read How to Access Blocked Sites on Linux with a VPN by John Bardinelli on AddictiveTips – Tech tips to make you smarter

How to set a data limit for a WiFi connection on Windows 10

Mobile data plans are expensive compared to those that you buy from an ISP. It makes sense that you’d want to limit your use of a mobile plan.That said, even ISPs don’t give you unlimited bandwidth and if the plan you’ve purchased is conservative, you might want to set a data limit for a WiFi network. On Windows 10, that’s pretty easy to do without having to use third-party apps.

Data limit for WiFi

Open the Settings app and go to the Network & Internet group of settings. Select the Data Usage tab. Make sure that the correct network is selected under ‘Show settings for’. If it isn’t, open the dropdown and select the WiFi network that you want to set a data limit for. If it doesn’t show up, try connecting to it.

Alternatively, if you want to set a collective limit on the data for all the networks that you connect to over WiFi, you can simply select the ‘WiFi (all networks)’ option from this dropdown.

Once you’ve selected the correct network, click the Set Limit button under Data Limit.

In the window that opens, select the time period that the data must be used in. You can set it to monthly if you’re on a monthly plan which most people are. If you need a one-time limit e.g., if you’re using WiFi at a hotel, you can select the One-time option. Alternatively, if you have an unlimited plan, you can select the Unlimited option.

For the Monthly and One-Time options, you have to specify when the plan is renewed, and how much data you’re allowed to use. With the Unlimited option, you need only specify when the plan is renewed. In all cases, the data can be specified in MB and GB.

This will apply to all network activity. If Windows 10 downloads updates, they too will count towards the data measure by the app. Likewise, all background activity by apps that require downloading information will also be measured. You cannot set app exemptions for the data limit.

If you have the mobile hotspot turned on, and there are devices connected to it, their consumption will also be factored in when measuring your data usage.

When you exceed the data limit, Windows 10 will warn you about it. It won’t disable the internet so if you continue to use it, you may have to pay extra for any additional data that you use. The rules for this are of course dictated by the data plan you’ve purchased from your ISP.

Read How to set a data limit for a WiFi connection on Windows 10 by Fatima Wahab on AddictiveTips – Tech tips to make you smarter

How to change power plans on CPU load on Windows 10

Power plans allow you to manage your system’s performance and your battery. We covered an app that lets you change the power plan when your system has been idle for a brief period of time. It’s a good way to conserve your battery. GiMeSpace Power Control is a free Windows app that lets you change power plans on CPU load. If your CPU is under high load, you can switch to the high performance plan. If it’s under a normal amount of load, the power plan will switch to the balanced plan.

You can also configure it to switch to any custom plan that you’ve configured.

Power plans on CPU load

Download and install GiMeSpace Power Control. Before you click Finish on the final screen, make sure you uncheck the options for additional offers.

Run the app and select the CPU load that should trigger the low power scheme to activate. Next, select the CPU load that should trigger the high power plan to activate. You can customize how often the app checks the CPU load and the minimum amount of time a power plan remains active before switching to the other one.

One of the ways a power plan limits power usage on your screen is by limiting how much power your CPU can consume. A high performance power plan gives your CPU unlimited power whereas the balanced power plan restricts it.

Under a balanced power plan, your CPU will experience more load than normal. When you switch to a high performance plan and your CPU is allowed more power, its usage may drop. You should keep this in mind while you set the app up to switch plans.

For apps that exert considerable load on the CPU, or apps that fluctuate between high and low CPU usage, you should be extra careful when you set the low power plan to be triggered. We should also mention that if your system is idle, Windows 10 might start scanning it for viruses. This is normal but it exerts considerable load on the CPU so again, factor that in when you set the app up. Alternatively, you can disable Windows Defender for a brief period of time if you’re running an app that will tax the CPU. Make sure you enable it again once you’re done with the app.

It’s also a good idea to check how much power your CPU is allowed to use under the plans that you’re using if you’ve set up custom power plans.

Read How to change power plans on CPU load on Windows 10 by Fatima Wahab on AddictiveTips – Tech tips to make you smarter