How to Test a VPN Tunnel for IP, DNS and Browser Leaks

Nick Congleton Informative Internet Guides

VPN leaks are bad news. Not only can they easily go unnoticed, but they also undermine the entire purpose of using a VPN tunnel. You want to be sure your VPN connection is not leaking your private information. Thankfully, LiquidVPN provides a hardened client and well-tested VPN configurations. So, when you connect to LiquidVPN’s servers, your information is going where you want it to be. Of course, that claim doesn’t mean much of you cannot test it out yourself. So, this guide will walk you through the steps that you …

Connect Your DD-WRT Router To LiquidVPN

Nick Congleton Informative Internet Guides

DD-WRT is a great router operating system. It’s one of the few that supports OpenVPN. So, you can configure your DD-WRT router to connect to your LiquidVPN account. Then, every device connected to your router is also connected to the VPN. That’s pretty awesome. Plus, it’s perfect for home networks with lots of streaming devices. The process isn’t very complicated, thanks to the great tools provided by both LiquidVPN and DD-WRT. It’ll only take a few minutes, so get yourself ready to get started. Generate Your OpenVPN Configuration DD-WRT is …

Which Password Manager is Better LastPass or KeePass?

David Cox Informative Internet Guides

In a recent blog post about how to protect your on privacy and I got quite a bit of feedback on a free for the desktop app called LastPass that promises to work with any browser seamlessly and for a 12 dollar per year fee you can even set it up on your smartphones. Having to install unofficial ports of KeePass on my smartphone and tablet is something I always disliked about KeePass. So I decided to take LastPass for a spin and give you an honest comparison of the …

How To Protect Your Online Privacy 2017 – Desktop Web Browsers

Nick Congleton Informative Internet Guides

Think about how you use your computer. Most of the time, you have your web browser open, right? Web browsers are among the most commonly used applications across all devices. So, choosing the right one one is important. Browsers go deep. Desktop web browsers are than they appear to be. Browsers are massive programs written by huge teams of developers. In a way, they’re like a second operating system running on your computer. Web browsers need to be able to read and execute code. It’s a critical part of …

How To Create A Free AWS VPN Server With Streisand On MacOS

James Ashmore At LiquidVPN, Informative Internet Guides

After Turkey had blocked access to social media in March 2014, Streisand was devised as a way to circumvent the government ban by providing secure encryption at minimal cost. It does so by allowing the user to set up a VPN via cloud services with minimal effort. If you want to keep your browsing history safe, encrypting the data is the safest way to do it. Setting up your own is a great option, and Streisand is the perfect tool for beginners and pro’s alike. The process is automated to allow …

How To Protect Your Online Privacy in 2017 – VPNs and Tor

David Cox Informative Internet Guides

VPN is and acronym for Virtual Private Network. VPNs virtualize a local network (LAN) over a distance. With a VPN computers in two locations work together like they are on one local network.   The business applications of VPNs are obvious. Employees in different offices can resources like they’re on one local network. The data travels through the Internet inside an encrypted VPN tunnel.   What does that have to to do with privacy?   Of course, this guide isn’t for business applications. When a computer connects to a …

How To Protect Your Online Privacy in 2017 – Introduction

Nick Congleton Informative Internet Guides

I think everyone will agree with me when I say: 2017 has been a ROUGH time for the Internet. On privacy is under attack from politicians, corporations, and criminals.  Cyber security threats are on the rise. Governments and large corporations are launching a full-scale assault on individual rights and privacy. The Internet we know and feels like it’s dead. Or is it? Thankfully, there are some simple steps you can take to protect your on privacy. This guide is here to help teach you how to fight for the Internet …

VPNs for Absolute Beginners – A Handy Privacy Guide

Geoff Walters Informative Internet Guides

On privacy has become a major topic of discussion in recent years. With ISPs tracking personal information and hackers constantly snooping for data, staying safe on the web is important than ever. There is a number of easy to use security solutions that help protect your privacy, the most reliable of which are virtual private networks. VPNs are safe, comprehensive, and inexpensive, and they’re not as complicated as they sound. ISPs and Your Data Every time you connect to the internet you send information through an internet service provider …

Is it Illegal to use a VPN Service?

Andrew Orr Informative Internet Guides

*Feb 3, 2017: Because of new anti-VPN laws passed recently this article has been updated* Virtual Private Networks (VPNs) are excellent tools to uphold the principles of privacy and anonymity. But is it legal to use them? Further Reading Here’s why the United Arab Emirates outlawed VPNs How IP Modulation Improves Your VPN Experience As we recently saw last month, the United Arab Emirates made it illegal to use a VPN. Their reason? They don’t want you using any system that is capable of hiding the fact that you are committing a …

Unblock Blocked Websites at School

David Cox Informative Internet Guides

Content filtering on the internet has become and common. As a matter of fact, some governments such as Saudi Arabia, Pakistan, China and Iran have put into place Internet-censorship laws that have extended the censorship to almost each and every locally-available site. This is also quite popular in a number of institutions especially schools and offices. Each institution has its reason for blocking websites. In most cases, they do not want their students or employees to waste time on ‘useless’ sites. The most commonly-blocked sites include social sites, Yahoo!, YouTube, , Orkut, , , and the like.