Skip to content

Online Privacy

Your Privacy is Up for Grabs [INFOGRAPHIC]

Your IP address is just a number, right? Wrong. Yes, it’s a number (you can see it here). But it’s more than that. It’s also a window into your online life. People (advertisers, businesses) track your online activities by your IP address to profile your behavior. Plus, governments, and even your ISP, can follow your…

[Read More]
9 Great Tips for Strong Passwords

Pleeaassee!!! Be Smart About Passwords!

You won’t believe the passwords that some people STILL use. Microsoft has finally put its foot down—even though most people won’t even know it unless they start to create a dumb password. In May 2016, Microsoft started using a system that would reject password requests—when opening a new account or creating a new password—that had…

[Read More]

How do I use a Proxy Server?

Please be aware that the use of proxy servers without the express permission from the owner of the proxy server may be illegal in some states and/or countries. Use them at your own risk. Use your favorite search engine and search for ‘proxy server list’. You’ll find many sites with lists of proxy servers, their…

[Read More]
Tor: An Amazing Browser That Flies Under the Radar

Tor: An Amazing Browser That Flies Under the Radar

Here’s a beginner’s guide to what’s being called the Internet “anonymizer.” If you surveyed most of your friends and associates and asked them what is personally important to them while using the Internet, they might use one of the following words: Speed Security Access Privacy Anonymity What do you think they would say is the…

[Read More]
What is Tor?

There’s a Special Browser (Tor) That Leads to a Secret Web

Not too many computer users have heard of the terms “proxy” or “proxy server,” or understand what they mean or do. A proxy server is a website/server that acts as a middleman for you to get on the Internet. When you use a proxy server, you’re not contacting a website directly. Your information runs through…

[Read More]
What to do about a stolen laptop

What to Do if You’re the Victim of a Stolen Laptop or Stolen Phone

If you find yourself reading this article for any reason other than having had your laptop stolen, do yourself a huge favor and read this article about preventative steps for keeping your laptop (and the data on it) safe from theft. It’s always good to take steps that can help you avoid stress and anxiety.…

[Read More]

Rule 41, the FBI and the Power to Probe

The Feds can peer into your computer and life. What do hackers, Internet thieves, terrorist groups, and other cybercriminals have in common? They don’t play by the rules. They will hack, attack, mislead, and spread viruses and take over computers to do their dastardly deeds, without concern for the law or their victims. Internet crime…

[Read More]
Finally! A Helpful Comparison of VPNs, Proxies and Tor

VPN, Proxy or Tor: What’s the Difference and What’s Best?

This article shows you three different methods/services that could help you stay anonymous or untraceable online. The three services are VPNs, proxies and Tor.

[Read More]