<< Все статьи9 Апреля 2015
Your Internet service provider tracks what IP addresses you are contacting, what websites and pages you are loading. It can also read anything you send and receive over the web that isn’t encrypted. Besides that, ISP has a logging of your every move and keeping the logs up to 2 years. подробнее...
9 Апреля 2015
VPN blocking is a technique to block the secured tunneling communications methods used by VPN. This technique is used by big companies or network administrators. For example, the China tries to block all VPNs in the country by using The Gread Firewall of China. подробнее...
7 Апреля 2015
BitTorrent and anonymity are not the same. If you use BitTorrent, you absolutely need to take precautions to hide your identity. If you really want to keep your activity private, your best way involves routing your BitTorrent connection through an external services - proxy or VPN. подробнее...
7 Апреля 2015
A VPN, or Virtual Private Network is a point-to-point connection across a private network or Internet. Much like a firewall protects your data on your computer, VPN protects it online. подробнее...