Blog
Botnets are enslaved computers that hackers use to hide their identities when they launch attacks. T
By Stephen Cooper in Information Security on August 24, 2018
A VPN can help ensure net neutrality, at least on an individual level. Here are our top picks for th
By Paul Bischoff in VPN & Privacy on February 18, 2021
What are the Patriot Act, Freedom Act, and FISA? Why are they dangerous? Do they really stop terrori
By Paul Bischoff in VPN & Privacy on mayo 15, 2020
Netflix is good at blocking users from outside Japan from accessing Japanese exclusive content. We explain how to use a VPN to access Netflix Japan from abroad securely.
By Paul Bischoff in VPN & Privacy on octubre 11, 2024
Getting lots of spam text messages? You're a victim of what's known as "smishing," a text message form of phishing that's getting worse every year. We find out how smishing works and how to stop it.
By Sam Cook in Information Security on noviembre 22, 2023
We reveal everything you need to know about Google Analytics and privacy, including the steps you ca
By Aimee O'Driscoll in VPN & Privacy on January 15, 2018
Find out how to turn your Raspberry Pi into a DNS server that will block annoying mobile ads on any device connected to your wi-fi network.
By Aaron Phillips in VPN & Privacy on septiembre 1, 2023
Our favorite free NZB search engines (a.k.a. NZB indexers) include Binsearch and NZBIndex. NZB index
By Paul Bischoff in VPN & Privacy on enero 27, 2023
Wondering what SWATTING is? We reveal how this dangerous prank practice works and how you can protect yourself from becoming a victim. 
By Paul Bischoff in VPN & Privacy on enero 27, 2023
Página 241 de 268