A brief, high-level introduction to Linux networking architecture. Explains how the Linux kernel manipulates network traffic using a top-down approach and basic framework to route
Did you know in the United States, the NSA (National Security Agency) routinely monitors all internet traffic coming in or out of the United States?1 Were you aware
Thinking of combining a Virtual Private Network (VPN) service with a Smart DNS service? If you'll be running both services on the same device, before you leap forward with your plans it's wise to
Table comparing the complete list of all OpenVPN versions. See below for pertinent notes.
This article is about digital privacy and specifically, safeguarding your privacy online through the use of Virtual Private Networks and Domain Name System masking
Contemplating signing up for a Virtual Private Network (VPN)? Why? The truth is most people don't need them, most of the time. Here's how to determine if it truly makes sense for you.
WireGuard is the "new kid on the block" in the world of VPNs.
Protocol adoption in the VPN world is a very slow process. Yet a relatively recent upstart is garnering a lot of attention:
This article is Part 2 in a series of articles about how Virtual Private Networks (VPNs) work. Part 1 of the series,
This article is Part 3 in a series of three (3) articles about how Virtual Private Networks (VPNs) work. While I get into some technical details, the intent is to scratch the surface just enough
I wrote a separate article on versioning errors in Ubuntu (False Version Reporting in Ubuntu 16.04) and used
This article examines the relationship between OpenVPN and OpenSSL, why the former depends on the latter, and why it's important to remain cognizant of software version numbers
This article explains common network cryptographic concepts in plain-English.
A newly discovered security vulnerability exists in most modern operating systems which allows a malicious actor to hijack an active TCP-based VPN connection, without the need to break its
IKEv2 is a security protocol that facilitates cryptographic symmetric key exchanges between endpoints.
Internet security relies upon a fixed set of principles and tools to make the exchange and storage of data as secure as possible. Which methods are "best" depends on one's priorities. What is
The process of selecting a VPN provider should not be taken lightly. The more one is concerned with privacy or anonymity, the fewer good choices there are. VPNs are a crucial component of a
Although I'm a big proponent of VPNs, the industry has become littered with mis-information and outright shams, creating a mixed environment when it comes to advertised claims of privacy
Several processes control the flow of data through a Samba-managed network connection. Ironically, the most important of them has nothing to do with networking.