Web Analytics

Supercookies, Flash cookies and Even Zombie Cookies

Privacy activists have consistently addressed the threats that cookies represent to privacy. In fact, the European Union passed a law that states that any company based in the EU (or any company targeting EU citizens), cannot place “non-essential” cookies on users’ computers, without their knowledge and authorization. Thanks to the awareness raised by campaigners and … Read more

VPN vs. Proxy vs. Smart DNS – How do they differ?

Many beginners get confused when comparing proxy servers and VPNs for the purpose of masking or changing one’s IP. Both can be used to bypass geo-restrictions on content and websites from countries where services are blocked. Therefore, the two are sometimes misidentified as being the same. VPNs and proxies are similar in that they both allow … Read more

How To Set Up a VPN On Windows 8

Windows 8 VPN Setup

Keeping the Windows 7 architecture intact, Windows 8 introduced several changes that were unique to it. The interface was redesigned and based on the Metro design language; while optimizations were done for a touchscreen. Out of the many quirks that were fresh and new, the start menu design was of the more striking and visible … Read more

Best Secure and Anonymous Linux Distros

Various Linux Distributors or ‘distros’ Built For Anonymity

If you have been following the news carefully, you’ll probably be aware of the San Bernardino incident that has rekindled a very old debate. Should personal security and freedom be absolute, or should there be limitations on it, just for the sake of safeguarding ourselves collectively from foreboding threats. In such a world, if security … Read more

How to Combine Tor and VPN

Tor and VPNs Tor and VPN networks may not be two peas in a pod, but there’s definitely a similarity between them. Most importantly, they are both made for online anonymity and security through encrypted connections, as well as unblocking restricted content. While VPN services and their uses are known by many, Tor is is … Read more

How to Stop and Prevent DNS Leaks

The main goal of a VPN connection is to encrypt your data online. This includes encrypting your web browsing, and generally all inbound and outbound traffic. It can be used to mask visited websites from your ISP, as well as unlock geographically blocked sites. This is often essential for journalists in dozens of countries, who need to … Read more

How to Chromecast Popcorn Time

Popcorn Time on Crhomecast Are you a movie buff or a popcorn addict? If so, you’re going to love Popcorn Time. Despite its massive success, setbacks, and media attention, there are still a lot of film aficionados that don’t know what Popcorn Time is. Even less know how to use it with Chromecast. For that … Read more

How to Setup an FTP on DD-WRT

Some may think it’s a bad idea to setup a File Transfer Protocol server through a DD-WRT router. The truth is its use has become popular when making large data backups. Are your documents extremely dear to your heart? If so, wouldn’t it be a nightmare to have this sensitive data wiped out? Quite a … Read more

How to Use Comodo Firewall as the perfect ‘Kill Switch’ for your VPN

How to Use the Comodo Firewall as the perfect ‘Kill Switch’ for your VPN

The very essence of a Virtual Private Network lies in its ability to provide greater security using an encrypted connection over a less secure, or open connection. When the foundational security infrastructure of a public internet network isn’t up to standard, users resort to VPNs for security. The ability to traverse restrictions imposed by online … Read more

The Best BitTorrent Clients

BitTorrent was designed by programmer Bram Cohen with the purpose of creating a peer to peer file sharing network. It would distribute data all over the virtual world and came as a boon to many. A BitTorrent client is used to perform this function, without having to store the data on centralized servers. The article … Read more