327

The Best VPN Service Providers Of 2020

There are now over a hundred VPN providers located across the world. To create this list of the best VPN service providers, I test customer service, the reliability of their network, and commitment to privacy.

1

How To Run a VPN & Ad-Blocker On a Router

Why Run A VPN On Your Router? Using a VPN at the router level makes a lot of sense. It is a convenient way to make all your network connections private and encrypted. Every device that connects to your network will be able to access the VPN — there is no need to install a VPN application on each device. …

pCloud: A Cloud Provider That Offers Encrypted And Non-Encrypted Folders

pCloud is a secure cloud provider. The name is a bit unfortunate, but I’ve found their service to be reliable and well designed. pCloud is the first cloud storage provider to offer both encrypted and non-encrypted folders in the same account. The company explains why this makes sense: Although at first thought it is the most natural approach to just …

Tresorit: Cloud File Storage With End-To-End Encryption

Tresorit is a new encrypted cloud stroage provider, based in Switzerland. I’ve been testing their service for a few months, and it has performed well. Tresorit works in a familar Dropbox-type fashion. However, the difference is that Tresorit encrypts your files before they are uploaded to the cloud. This is what is called “end-to-end encryption”. It means your files are …

Three Hardware Wallets For Storing Bitcoin and Other Cryptocurrencies

Here are three hardware wallets that can be used for the long term storage of bitcoin and other cryptocurrencies. These devices are separated from your computer — and thus virtually hacker proof. I recommend storing these wallets in a fireproof safe. For daily use, you can keep a small amount of bitcoins in a smartphone app like Breadwallet. I do …

A Field Guide To Malware In 2016

Malware is used for a wide variety purposes from sleazy business practices to blatant crime. Discussions of malware often mix up the technology of malware and their uses. You will see below that the same technology can be used to direct ads to you that normally you would not see, or steal your credentials to your online banking account. It’s …

6

A Guide To Avoiding Ransomware (Part 1)

Ransomware is malicious software that allows a hacker to access an individual or company computer, encrypt your data resident on it and then demand some form of payment to decrypt it. This lets hackers hold your data hostage – and hence the term “ransom”. Victims can regain access to their files only by paying the ransom, or by restoring from a backup that was hopefully not on a network that was accessible to the compromised computer.

Two Ways to Make Anonymous Phone Calls

Want to make a phone call without revealing your real identity? There are several ways you can do this, ranging from using a throw-away phone to restricting caller ID settings permanently on your smartphone. But what if you just want to make private, anonymous calls occasionally, without purchasing a special phone for it? Here are two solutions. Use a Caller …

2

How To: Make A Strong Master Password

As we’ve already noted, password manager apps are a great way to make sure your passwords are as robust as possible. But to use a password manager you need a single master password. And you need it to be very strong. Here’s how to create an excellent master password. Password Myths Most people think that the best way to make …

2

Three Free Anti-Keylogging Apps For Windows

Keyloggers are one of the most effective ways for hackers to steal private information. Here are some solutions for preventing keyloggers from compromising your Windows system. Keyloggers come in two forms — those that are software-based and those that are embedded in hardware.  The latter can only be installed by someone who has physical access to your computer, but the …

1

NinjaStik: Boot To An Anonymous OS In 60 Seconds

The NinjaStik is a bootable USB 3.0 memory stick. It allows to you boot your computer into an anonymous operating system (via custom firmware and Linux-based OS). There are a host of privacy-related tools on the stick — including a Tor Browser, a Bitcoin Wallet and Thunderbird with Enigmail installed. According to the company the Ninjastik can be used  a …

1

Let Your Child Explore Your Computer Without Worries — Use A Virtual Machine

A virtual machine makes it possible for your child to explore your computer freely without fears of configuration problems or lost files. If things do stop working, you can delete the virtual machine, restore from a backup, and the child is back with a working machine in just a few minutes You create a Virtual Machine by running another operating …