327

The Best VPN Service Providers Of 2020

There are now over a hundred VPN providers located across the world. To create this list of the best VPN service providers, I test customer service, the reliability of their network, and commitment to privacy.

The Best Seedboxes With VPNs 2020

A seedbox is a dedicated, high-speed server for downloading and uploading files. Most people rent seedboxes to achieve very fast torrent or Usenet transfers.

4

The Best VPNs For Iran

To bypass the Internet restrictions in Iran, we recommend using the following VPNs (Virtual Private Networks):

3

How To Use A Disposable Email Address (For Signing Up To New Services)

These days, many companies ask for your email address. Often you end up with spam in your inbox, or, worse still your email is sold to various other mailing lists. It makes sense to use a disposable email address, at least until you trust a company enough to give them your real address. I recommend these free disposable mail services: …

1

How To Run a VPN & Ad-Blocker On a Router

Why Run A VPN On Your Router? Using a VPN at the router level makes a lot of sense. It is a convenient way to make all your network connections private and encrypted. Every device that connects to your network will be able to access the VPN — there is no need to install a VPN application on each device. …

pCloud: A Cloud Provider That Offers Encrypted And Non-Encrypted Folders

pCloud is a secure cloud provider. The name is a bit unfortunate, but I’ve found their service to be reliable and well designed. pCloud is the first cloud storage provider to offer both encrypted and non-encrypted folders in the same account. The company explains why this makes sense: Although at first thought it is the most natural approach to just …

14

How To Hide OpenVPN Connections In China

If you are using OpenVPN in China, even on port 443, you may find that your connections are unstable. The problem is that Chinese government can detect the difference between “normal” SSL encryption and VPN encryption.

Getting Started With Ethereum

Ethereum is a decentralized computing platform and crytocurrency. Ethereum uses Bitcoin’s blockchain technology to create a protocol for “smart contracts”.

Three Hardware Wallets For Storing Bitcoin and Other Cryptocurrencies

Here are three hardware wallets that can be used for the long term storage of bitcoin and other cryptocurrencies. These devices are separated from your computer — and thus virtually hacker proof. I recommend storing these wallets in a fireproof safe. For daily use, you can keep a small amount of bitcoins in a smartphone app like Breadwallet. I do …

A Field Guide To Malware In 2016

Malware is used for a wide variety purposes from sleazy business practices to blatant crime. Discussions of malware often mix up the technology of malware and their uses. You will see below that the same technology can be used to direct ads to you that normally you would not see, or steal your credentials to your online banking account. It’s …

6

A Guide To Avoiding Ransomware (Part 1)

Ransomware is malicious software that allows a hacker to access an individual or company computer, encrypt your data resident on it and then demand some form of payment to decrypt it. This lets hackers hold your data hostage – and hence the term “ransom”. Victims can regain access to their files only by paying the ransom, or by restoring from a backup that was hopefully not on a network that was accessible to the compromised computer.

2

How To: Make A Strong Master Password

As we’ve already noted, password manager apps are a great way to make sure your passwords are as robust as possible. But to use a password manager you need a single master password. And you need it to be very strong. Here’s how to create an excellent master password. Password Myths Most people think that the best way to make …

How To: Manage Passwords Securely

Passwords are often the only thing standing between your private data and people who would like to steal it. Creating and managing secure passwords can be difficult, but password management tools make it much simpler. Here’s how to use them to keep your data private. The best way to make sure all of your passwords are strong and secure is …

How To: Use Your Ubuntu Computer as a VPN Router

Want a VPN router but don’t have the cash to buy new hardware? Here’s an easy and free way to create a wireless VPN router for all the devices on your network using the Ubuntu Linux operating system. First, a little background on VPN routers. A VPN router is a router that is connected to a VPN service and routes …