All of us use passwords, PIN codes, or some other kind of authentication to access websites, withdraw money from the ATM, or verify our identity online. Websites are usually the big thing, seeing that…
Articles regarding online privacy, integrity and security.
All of us use passwords, PIN codes, or some other kind of authentication to access websites, withdraw money from the ATM, or verify our identity online. Websites are usually the big thing, seeing that…
This guide is directed for advanced VPN users. VPN and Tor are two different network protocols that can offer good anonymity. There are of course pros and cons for both of them, and each of them is …
Computers purchased this fall from manufacturer Lenovo could have a root certificate called Superfish installed on them. This certificate belongs to the product Superfish, a preinstalled adware direct…
This guide will show you how you can easily set μTorrent to shutdown if your connection to OVPN is lost at any time. This guide pertains specifically to Windows 7, 8 and 8.1. 1. Run Powershell Most l…
This is a guide explaining how you can set your OpenVPN client to run automatically when you start your computer. The guide is specific to Windows. 1. Task Scheduler Click the Start button and go to …