327

The Best VPN Service Providers Of 2020

There are now over a hundred VPN providers located across the world. To create this list of the best VPN service providers, I test customer service, the reliability of their network, and commitment to privacy.

11

The Best Blocklists To Use When Torrenting

A blocklist is simply a list of IP addresses to block when torrenting. Typically, these lists consist of the IP addresses of known snoopers or malware providers. Most of the good bittorrent clients support blocklists – for example Transmission or uTorrent. Where To Find Blocklists Bitsurge Blocklist The Bitsurge list is a list of “anti-torrent” group. It was created for …

4

The Best VPNs For Iran

To bypass the Internet restrictions in Iran, we recommend using the following VPNs (Virtual Private Networks):

360

The Best VPN For China In 2020

In China, VPNs have been blocked at the protocol level (including corporate VPNs). However, the VPN providers listed in this article use stealth techniques to hide their VPN traffic.

3

How To Use A Disposable Email Address (For Signing Up To New Services)

These days, many companies ask for your email address. Often you end up with spam in your inbox, or, worse still your email is sold to various other mailing lists. It makes sense to use a disposable email address, at least until you trust a company enough to give them your real address. I recommend these free disposable mail services: …

1

How To Run a VPN & Ad-Blocker On a Router

Why Run A VPN On Your Router? Using a VPN at the router level makes a lot of sense. It is a convenient way to make all your network connections private and encrypted. Every device that connects to your network will be able to access the VPN — there is no need to install a VPN application on each device. …

5

A List Of Free Public Domain Name Services (DNS)

A domain name service (DNS) translates a human-friendly Internet address such as “yahoo.com” into an IP address, such as “98.139.183.24”. DNS blocking is often used to censor web sites because it relatively easily to implement. However, it is also easy to avoid. For example, you can use one of the public servers listed below. Here’s how to change your DNS: …

14

How To Hide OpenVPN Connections In China

If you are using OpenVPN in China, even on port 443, you may find that your connections are unstable. The problem is that Chinese government can detect the difference between “normal” SSL encryption and VPN encryption.

Getting Started With Ethereum

Ethereum is a decentralized computing platform and crytocurrency. Ethereum uses Bitcoin’s blockchain technology to create a protocol for “smart contracts”.

Three Hardware Wallets For Storing Bitcoin and Other Cryptocurrencies

Here are three hardware wallets that can be used for the long term storage of bitcoin and other cryptocurrencies. These devices are separated from your computer — and thus virtually hacker proof. I recommend storing these wallets in a fireproof safe. For daily use, you can keep a small amount of bitcoins in a smartphone app like Breadwallet. I do …

3

Self-Destructing Cookies — Silently Dispose Of All Those Unwanted Cookies

Self Destructing Cookies is a Firefox add-on that automatically removes cookies when they are no longer used by open browser tabs. I’ve found this to be an excellent solution that works silently in the background. Websites will only be permitted to identify you while you actually use them and can not stalk you across the entire web. This is the …

A Field Guide To Malware In 2016

Malware is used for a wide variety purposes from sleazy business practices to blatant crime. Discussions of malware often mix up the technology of malware and their uses. You will see below that the same technology can be used to direct ads to you that normally you would not see, or steal your credentials to your online banking account. It’s …

6

A Guide To Avoiding Ransomware (Part 1)

Ransomware is malicious software that allows a hacker to access an individual or company computer, encrypt your data resident on it and then demand some form of payment to decrypt it. This lets hackers hold your data hostage – and hence the term “ransom”. Victims can regain access to their files only by paying the ransom, or by restoring from a backup that was hopefully not on a network that was accessible to the compromised computer.