SECURITY
-
Shanika W.
27 July 2020How to Encrypt Your Internet Connection – Complete GuideAs a regular internet user, you’ve probably heard the term encryption. Many internet users have no clue what encryption is, but it’s critical that you know why you need to encrypt your internet connection, and how you can do so. Prying eyes on the internet abound. That’s why most of the popular messaging applications, like […]
Read GuideSECURITY
-
Shanika W.
21 July 2020OpenVPN over TCP vs UDP: What’s the Difference, and Which Should I Choose?If you use a VPN regularly, you probably know that almost all VPN vendors provide OpenVPN protocol because OpenVPN is a secure and reliable open-source solution. Both Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are protocols for sending data packets through the internet built on top of the Internet Protocol. They’re also the […]
Read GuideSECURITY
-
Miguel Gomez
25 May 2020Dark Web Price Index 2020The dark web has a longstanding reputation as a haven for the worst kinds of criminal activity. This reputation is not wholly unjustified, as there are indeed terrible things happening around the world that can be bought and sold on the dark web. The privacy offered by software such as TOR creates an environment where […]
Read GuideSECURITY
-
Miguel Gomez
23 December 2019A Comprehensive Comparison of VPNs and Onion Routing (TOR)Although VPNs have long been associated with private and secure browsing, those who have a keen interest in this particular subject may also have come across the concept of onion routing, albeit perhaps not with that exact name. Also known as Tor, onion routing (OR) has been a way to navigate the web in virtual […]
Read GuideSECURITY
-
Miguel Gomez
30 November 2019Exposing The Myth of The Invulnerable Air Gapped SystemSaying that air gapping a system is anything but the most secure and invulnerable way to protect data is bound to burst some bubbles. After all, this is the gospel truth among IT professionals who live in a world of clean, sanitized, statistics that don’t always account for how dirty the real world can be. […]
Read GuideSECURITY
-
Howard Eldon
23 October 2019DNS Over HTTPS: What is it? Does it protect users?The Domain Name System (DNS) is the phone book of the Internet. When people use the web, they don’t type in the IP address of the website that they want to visit. Instead, they use a domain name, like www.google.com. The job of DNS is to convert this domain name into an IP address that […]
Read GuideSECURITY
-
Joe Robinson
14 October 2019Cyberwarfare statistics: A decade of geopolitical attacksThere have been almost 500 documented geopolitical cyber attacks around the world since 2009. Making cyberwarfare a major technological threat to nations and their citizens. In this article, we hope to break down some of the numbers and gain insight into the nature of these attacks, where they originate from, and who they’re targeting. Key […]
Read GuideSECURITY
-
Joe Robinson
1 July 2019VPN router vs VPN on deviceIf you’ve read a few of our guides you’ll know how strongly we advocate the use of VPNs to protect your online privacy and break down the walls of censorship. So today we’re going to look at setting up and using a VPN on your router so you can protect every device on your home […]
Read GuideSECURITY
-
Stephen Mash
29 January 2019What is a VPN Concentrator and How does it Work?The VPN Concentrator is a networking device that allows multiple VPN tunnels to use a single network. VPN tunnels are the name for a secure connection that uses advanced encryption techniques to protect the information flowing across the web. This facility allows the connection to transit across any network where it might be intercepted and […]
Read GuideSECURITY
-
Stephen Mash
15 January 2019What is VPN Passthrough and How does it Work?What is a VPN passthrough? In a nutshell, a VPN passthrough is a router feature that enables any device connected to that router to establish an outbound VPN connection. By contrast, a VPN router is a device that actively implements a VPN connection. The VPN passthrough is a passive enabler for VPN traffic.
Read GuideSECURITY
-
Alex Popa
18 December 2018VPN on Router vs. Computer? Which is Better?The use of Virtual Private Networks (‘VPNs’) is surging. Remote-first working, as well as increased use of internet-based entertainment, is putting the spotlight on VPNs. One question that needs to be asked is: Should the VPN be applied to the computer/device, or to the router? Here we set out the advantages and disadvantages of both […]
Read GuideSECURITY
-
Alex Popa
9 November 2018What is TestMyNet? Is it Accurate? – Full TestMyNet ReviewTestMyNet is a free internet speed test website that’s been around for some time now. It’s very easy to use because the interface is very intuitive, although some might claim the GUI looks dated.
Read GuideSECURITY
-
Elizabeth March
8 November 2018The Ultimate Parent Guide for Protecting Your Child OnlineAs parents, it is one of our many responsibilities to try to keep our children safe at all times. Technology has become of even greater importance in the lives of our children, and with the constant advancements, keeping up with what you need to know to keeps kids safe online in 2019 is more important […]
Read GuideSECURITY
-
Bogdan Patru
12 October 2018Best Peerblock Alternatives to Remain Secure OnlineIf you want to keep your online traffic secure and ensure your privacy is protected, you probably have, at some point, used or are still using Peerblock. While it might have been a good solution in the past, though we’ll get to that as well, but it’s no longer the case. There are too few […]
Read GuideSECURITY