Andreasson, Oskar. Iptables Tutorial 1.2.1. Chapter 6: Traversing of tables and chains. https://www.frozentux.net/iptables-tutorial/chunkyhtml/c962.html.
Andreasson, Oskar. 2006.
This category contains articles about Virtual Private Networks (VPNs), such as what they are, why you may or may not need or want one, how they function, and how to pick the best VPN service
This is a list of sources I found useful while writing my comprehensive guides on VPNs for Small Business Owners, Home Office Workers, and Split VPNs
VPN is an abbreviation for Virtual Private Network.
A VPN is a secure, virtual
If you could sum up the purpose of a Virtual Private Network (VPN) in one word, what would it be? My choice: Integrity.
Of course, I'm talking about data integrity. But, what
Contemplating signing up for a Virtual Private Network (VPN)? Why? The truth is most people don't need them, most of the time. Here's how to determine if it truly makes sense for you.
The process of selecting a VPN provider should not be taken lightly. The more one is concerned with privacy or anonymity, the fewer good choices there are. VPNs are a crucial component of a
A split gateway divides outgoing network traffic between two or more gateways. This is most common with traffic traveling from a private network out to the
Although I'm a big proponent of VPNs, the industry has become littered with mis-information and outright shams, creating a mixed environment when it comes to advertised claims of privacy
Which VPN service providers are worthy of your time and which should you avoid like The Plague?
There are so many VPN providers these days (over 300), and so many "reviewers," it has
How does someone who is not a VPN subject-matter expert choose a VPN provider? Often by reading reviews of various service providers. Yet, how can one tell the difference between a real review
Dedicated DNS. Dynamic DNS. Smart DNS. What the heck are these things???
Many consumers get confused between these very distinct services. It's not their fault. I blame the marketing
Table comparing the complete list of all OpenVPN versions. See below for pertinent notes.
The entertainment industry has developed numerous techniques to restrict end users' ability to access digital content based on geographic location. End users trying to dodge these geographic
This article is about digital privacy and specifically, safeguarding your privacy online through the use of Virtual Private Networks and Domain Name System masking
Thinking of combining a Virtual Private Network (VPN) service with a Smart DNS service? If you'll be running both services on the same device, before you leap forward with your plans it's wise to
This document is a comprehensive, high-level overview of what IPsec is and how it works.
IPsec is a flexible network security framework that may be applied to a number of different use
Did you know in the United States, the NSA (National Security Agency) routinely monitors all internet traffic coming in or out of the United States?1 Were you aware
This article explores why "Best" lists of VPN providers are not useful.
There are many, many VPN service providers on the market. Hundreds. No joke. VPNs are "in."
IKEv2 is a security protocol that facilitates cryptographic symmetric key exchanges between endpoints.
This article examines the relationship between OpenVPN and OpenSSL, why the former depends on the latter, and why it's important to remain cognizant of software version numbers
OpenVPN is an open source Virtual Private Network (VPN) software solution that rivals similar commercially available products. It allows you to use PKI (Public Key Infrastructure) and SSL/TLS
This article is Part 2 in a series of articles about how Virtual Private Networks (VPNs) work. Part 1 of the series,
This article is Part 3 in a series of three (3) articles about how Virtual Private Networks (VPNs) work. While I get into some technical details, the intent is to scratch the surface just enough
WireGuard is the "new kid on the block" in the world of VPNs.
Protocol adoption in the VPN world is a very slow process. Yet a relatively recent upstart is garnering a lot of attention:
A newly discovered security vulnerability exists in most modern operating systems which allows a malicious actor to hijack an active TCP-based VPN connection, without the need to break its
This article is Part 1 in a 3-part series on how Virtual Private Networks (VPNs) work. Part 1 delves into the nuances of VPNs at a high-level, scratching the surface on the inner workings of VPN