This is the most detailed and insightful review of PIA VPN (Private Internet Access) you can find. Period.
Vulnerability information from weakdh.org: The Logjam attack allows a man-in-the-middle attacker to downgrade vulnerable TLS connections to 512-bit export-grade cryptography. This allows the attacker to read and modify any data passed over the connection. The attack is reminiscent of the FREAK attack, but is due to a flaw in the TLS protocol rather than an […]
Check our in-depth review of CyberGhost VPN to find everything you need to know about the service.
Looking for a Gmail, Yahoo alternative? these Email services respect the privacy and security of users.
It’s a well-known fact that a VPN will encrypt all your traffic through the VPN tunnel gateway. But if you want to secure only your browser traffic, or a bittorrent client and any software that’s capable of using SOCKS5, then SSH+SOCKS5 is what you’re looking for.
We all love free stuff. But when it comes to services, such as hosting, IT support, or VPN services – we can most likely agree that you get what you pay for. Hence VPN accounts are no exception. Here are some of the advantages/disadvantages of both free and paid VPN services 1. VPN Protocols Most […]
There are several VPN providers out there and while their offers are pretty much in the same lanes as everybody else’s, there are some consideration and features that make some of those services stand out from the crowd. The following check list enumerates the top 5 features to look for when choosing your provider.
VPN or Tor? A paid VPN account or free Tor access? – A highly debated topic. Here is a comparison that should help you decide which one suits your needs.
1. Secure your internet traffic A VPN connection provides encryption between you and the VPN server, which means you can browse securely from an open WiFi network (fast food, restaurant, airport etc.) reducing the risk of data sniffing/interception by unauthorized folks. Always keep in mind that online passwords and authentication cookies can be easily stolen by attackers […]
According to security researchers, PPTP VPN which utilize MS-CHAP V2 to authenticate users is insecure