How to secure your torrent downloads

The problem

Revealing your identity by using your real IP address to download/transfer torrent files can turn into big trouble and even cost you a money in lawsuits. Many people don’t understand how the P2P downloads and copyright infringement work, so we will try to explain it.

Read more

Best VPNs for Popcorn Time

Popcorn Time is an innovative application that makes video watching a lot more easier, but not safer. You still need to protect your identity. Here are some of the best VPN providers to use with Popcorn Time

SSH & SOCKS5 tunnel howto

It’s a well-known fact that a VPN will encrypt all your traffic through the VPN tunnel gateway. But if you want to secure only your browser traffic, or a bittorrent client and any software that’s capable of using SOCKS5, then SSH+SOCKS5 is what you’re looking for.

Read more

How to setup a VPN connection on Mac OS X

Setting up a VPN connection on Apple’s Mac OS X is a straight forward process. The Operating system has built-in support for all the major VPN protocols and it can also provide detailed traffic statistics for each connection.

This guide was developed using Mac OS X 10.5 “Leopard” but it applies to all current OS X versions, including 10.6, 10.7 and 10.8.

Read more

5 things to look for when choosing a VPN Provider

There are several VPN providers out there and while their offers are pretty much in the same lanes as everybody else’s, there are some consideration and features that make some of those services stand out from the crowd. The following check list enumerates the top 5 features to look for when choosing your provider.

Read more