Menu
Close
Search
Search
English
EN
Italian
it
French
fr
German
de
Spanish
es
VPN
By Use
Best VPNs of 2024
Business VPN
Netflix
Kodi
Torrenting
Hulu
Sky Go
Gaming
BBC iPlayer
Tor
By OS/Device
Mac
Windows
Linux
Windows 10
Firestick
iPhone and iPad
Android
Windows Phone
DD-WRT Routers
By Country
All VPN Country Guides
China
Japan
US
UK
Canada
Australia
Germany
France
UAE & Dubai
Guides
Fastest VPNs
Cheapest VPNs
Free VPNs
How to access the deep web
Is torrenting safe and legal?
Build your own VPN
Facebook privacy and security
How to encrypt email
How to stay anonymous online
How we test VPNs
Reviews
NordVPN
Surfshark
ExpressVPN
IPVanish
PrivateVPN
StrongVPN
CyberGhost
PureVPN
See all
Antivirus
Reviews
Norton Antivirus
TotalAV
Intego VirusBarrier X9
McAfee
VIPRE
Panda Security
Eset
See all
By OS/Device
Mac
Windows
Linux
Android
iPhone
Guides
Best Antivirus in 2024
Best Free Firewalls
Free Antivirus Software
Malware Statistics & Facts
Compare providers
McAfee vs Kaspersky
Norton vs Kaspersky
McAfee vs Norton
Online backup
Streaming
Streaming Hub
Kodi
Plex
Sports Streaming
TV Streaming
IPTV
Blog
VPN & Privacy
Cloud and Online Backup
Information Security
More Comparisons
Password Managers
Identity Theft Protection
Usenet
Privacy & Security Tools
Internet Providers
Parental Control Software
Net Admin Tools
Data Privacy Management
Data Recovery Software
Crypto
Utilities
News
About Us
About Our Company
Press
Software Testing Methodology
Editorial Process
Careers at Comparitech
Contact
Blog
Blog
Using a VPN in China still legal, but expect downtime in coming months
A new government campaign in China will crack down on VPNs in 2017. Using a VPN is still not illegal
By
Paul Bischoff
in
VPN & Privacy
on June 9, 2020
How to build a Linux VPN server using Amazon EC2 and OpenVPN
OpenVPN is the most widely used VPN package on the planet. We'll show you how to build your own Linu
By
Jon Watson
in
VPN & Privacy
on January 21, 2018
Browser hijacking: What is it and how do you prevent and remove it
Browser hijacking is a type of malware that takes over your browser to make it do things you do not
By
Jon Watson
in
Information Security
on March 18, 2017
Should you ditch WhatsApp for a more private messenger?
How serious is WhatsApp's end-to-end encryption "backdoor"? What alternatives are out there? How to
By
Paul Bischoff
in
Information Security
on July 27, 2017
Setting up a SOCKS5 proxy on a virtual private server: Step-by-step
A SOCKS proxy is more limited in that it cannot provide access to remote resources, but it can mask
By
Jon Watson
in
VPN & Privacy
on May 24, 2018
How Windows 10 users can delete and manage their Microsoft account history
How to delete your Windows web browsing, search, location, and Cortana history using Microsoft's new
By
Paul Bischoff
in
VPN & Privacy
on March 24, 2022
How Airbnb hosts can make their property cyber secure
How to secure your wifi router and other appliances to protect your and your Airbnb guests from hack
By
Paul Bischoff
in
Information Security
on March 18, 2017
Buyer beware: Amazon scammers posing as real merchants to swindle customers
Fraudulent merchants purposefully fail to fulfill orders. When emailed for assistance, scammers then
By
Lee Munson
in
Information Security
on April 13, 2022
30+ VPNs rated on privacy and security side-by-side
Comparitech assessed over 30 VPNs using over a dozen criteria to learn which providers take customer
By
Paul Bischoff
in
VPN & Privacy
on September 14, 2018
Page
253
of
264
Previous
1
…
252
253
254
…
264
Next
Comparitech uses cookies.
More info
.
Close