The Best Blocklists To Use When Torrenting

A blocklist is simply a list of IP addresses to block when torrenting. Typically, these lists consist of the IP addresses of known snoopers or malware providers. Most of the good bittorrent clients support blocklists – for example Transmission or uTorrent. Where To Find Blocklists Bitsurge Blocklist The Bitsurge list is a list of “anti-torrent” group. It was created for …


The Best VPN Service Providers Of 2020

There are now over a hundred VPN providers located across the world. To create this list of the best VPN service providers, I test customer service, the reliability of their network, and commitment to privacy.


How To Run a VPN & Ad-Blocker On a Router

Why Run A VPN On Your Router? Using a VPN at the router level makes a lot of sense. It is a convenient way to make all your network connections private and encrypted. Every device that connects to your network will be able to access the VPN — there is no need to install a VPN application on each device. …

Getting Started With Ethereum

Ethereum is a decentralized computing platform and crytocurrency. Ethereum uses Bitcoin’s blockchain technology to create a protocol for “smart contracts”.


Using Firefox’s Reader View To Remove Web Clutter

The Firefox browser has a useful feature called “Reader View” which strips away clutter like buttons, ads and background images. It also adjusts the page’s text size, contrast and layout for better readability. You can find the Reader View button here: Here is an article from Reuters as it appears in Page View Mode: There is also a Firefox extension …


A Guide To Avoiding Ransomware (Part 1)

Ransomware is malicious software that allows a hacker to access an individual or company computer, encrypt your data resident on it and then demand some form of payment to decrypt it. This lets hackers hold your data hostage – and hence the term “ransom”. Victims can regain access to their files only by paying the ransom, or by restoring from a backup that was hopefully not on a network that was accessible to the compromised computer.

UsenetBucket Now Accepts WebMoney, Alipay, UnionPay & Dotpay

UsenetBucket is a Usenet provider from Netherlands that is sourced from XSNews (an independent Usenet feed). The service has integrated 70 new payment methods — to better support international customers. You can use these payment methods by selecting “Other local payment methods” during the order process. You’ll be redirected to the payment page and the local payment methods for you …


How To: Make A Strong Master Password

As we’ve already noted, password manager apps are a great way to make sure your passwords are as robust as possible. But to use a password manager you need a single master password. And you need it to be very strong. Here’s how to create an excellent master password. Password Myths Most people think that the best way to make …

Pros and Cons of Tor, VPNs, Proxies and More

Tor, VPNs, Web proxies and other strategies for circumventing censorship all come with pros and cons. Here’s a list of the advantages and disadvantages of various methods for accessing blocked websites. Tor Pros: Free of cost. Difficult for censorship authorities to block. Relatively easy to install if using the Tor browser. Cons: Usually only works for Web browser, not other …

How To: Configure Windows 10 Privacy Settings

Privacy concerns in Windows 10 have spawned a number of apps designed to improve privacy in Microsoft’s operating system. Here’s a list of several apps you can use to help stop Windows 10 from collecting private information about you and sending it to Microsoft. You can, of course, configure privacy settings on Windows 10 manually. But the following apps aim …

Using Anonymous Remailers for Email Privacy

Want to send email anonymously? Anonymous remailers provide a solution. Here’s an overview of how they work and where to access them. You can gain some privacy in email by using a provider that doesn’t track you. But that’s different from hiding your identity from the recipient. Anonymous remailers make it possible to obfuscate your identity when sending email. They …