Jennifer Pelegrin -
DHCP meaning and how the Dynamic Host Configuration Protocol works17 mins
Ever wonder how your phone, laptop, or smart TV connects to the internet with zero setup on your part?...
Michael Pedley -
What is the IKEv2 VPN protocol?11 mins
IKEv2 is a key management protocol used in conjunction with the IPSec tunneling and encryption protocol—together, they form a...
Chantelle Golombick -
Linux for old laptop: Best lightweight distros and installation guide16 mins
Repurposing an old computer with Linux is a great way to create a secure and privacy-focused machine for free.
David Gilbert -
AircoveOS v5.3: Redesigned for you, engineered for peace of mind4 mins
We’ve made significant system-level improvements to make Aircove more stable and reliable—especially for Wi-Fi and streaming.
Ernest Sheptalo -
NAT “firewall”: Everything you need to know about network security17 mins
NAT (Network Address Translation) is a feature built into most routers, helping to manage traffic between your devices and...
Chantelle Golombick -
10 phishing red flags in emails and what to do about...12 mins
Protect yourself by learning to recognize the most obvious signs that someone is trying to scam you with a phishing email.
Chantelle Golombick -
What is IPsec? How this security protocol protects your network15 mins
IPsec, short for Internet Protocol Security, is a protocol suite designed to protect data as it travels across the...
Featured
Marcus Tsui -
How to track your own luggage4 mins
Vanessa Ko -
Is WhatsApp safe?5 mins
Featured video
Top 10 video games that will change how you view privacy
Play through our picks for some of the best video games about hacking, surveillance, and privacy.