Internet censorship is an essential problem and people living in (or traveling to) China get to experience it directly. To bring you this article, we discussed with two users from China and also with two VPN providers who are experienced in getting around the Great Firewall of China.
Revealing your identity by using your real IP address to download/transfer torrent files can turn into big trouble and even cost you a money in lawsuits. Many people don’t understand how the P2P downloads and copyright infringement work, so we will try to explain it.
A DNS leak is a problem with the network configuration that results in loss of privacy by sending DNS queries over insecure links instead of using the VPN connection.
A guide to install OpenVPN on your own VPS server running Debian or Ubuntu Linux.
It’s a well-known fact that a VPN will encrypt all your traffic through the VPN tunnel gateway. But if you want to secure only your browser traffic, or a bittorrent client and any software that’s capable of using SOCKS5, then SSH+SOCKS5 is what you’re looking for.
Setting up a VPN connection on Apple’s Mac OS X is a straight forward process. The Operating system has built-in support for all the major VPN protocols and it can also provide detailed traffic statistics for each connection.
This guide was developed using Mac OS X 10.5 “Leopard” but it applies to all current OS X versions, including 10.6, 10.7 and 10.8.
There are several VPN providers out there and while their offers are pretty much in the same lanes as everybody else’s, there are some consideration and features that make some of those services stand out from the crowd. The following check list enumerates the top 5 features to look for when choosing your provider.