Guides

Home » Archive by category "Guides" (paged 8)
Posted November 03 2017 By admin

Virtual Private Networks or VPN services use multiple security protocols to secure the online connection between their users and the VPN server. One of the most popular protocols used is the Point-To-Point-Tunneling-Protocol or PPTP. Even though it is not considered the most secure protocol available, yet it is one of the most popularly used protocols. This is why it is not highly recommended among other protocols yet some users prefer it and in some cases it is more reliab...
Posted November 03 2017 By admin

In this tutorial, we will show you how to easily chain Socks5 proxies Using SRelay on Ubuntu 16. Scroll down for more details. Getting Things Ready Before setting up a Socks5 proxy chain, you need to make sure that there are multiple proxies and that all proxies are working properly because if one proxy is not functioning, the whole proxy chain will not work and will collapse. In addition, if the connection at one proxy is lost, the whole connection to the remote server...
Posted October 26 2017 By admin

  The main purpose of having or using a Virtual Private Network or VPN is to keep your online identity private. The process of how this happens is that as soon as you are connected to the VPN your Internet Protocol address or IP address is automatically replaced with a shared IP provided by the VPN server that you are connected to. This address differs depending on the location of the server you are connected to. In most cases this is the perfect tool to bypass any online c...
Posted October 26 2017 By admin

In this guide, we will show you how to easily setup IKEv2 VPN connection on Windows 10 through simple steps. Scroll down for more details. Setting Up IKEv2 VPN on Windows 10 (Manually) Follow the steps below in order to successfully create a new IKEv2 VPN connection on your Windows 10 system: 1- Head over to the bottom left corner of your screen, and then click on the Start button. 2- Click on Settings. 3- Next, select Network & Internet. 4- From the men...
Posted October 26 2017 By admin

Tomato is a Linux based firmware that was developed to enhance wireless routers’ functions, controls and capabilities. It was originally released in 2008 and has since become very popular in that it gave the ability to regular, older routers to be upgraded to high-end wireless routers. A fully enhanced wireless router like that requires a higher level of online security. This is where securing your Tomato router with a Virtual Private Network or VPN connection comes in. B...
Posted October 26 2017 By admin

In this tutorial, we will show you how to easily use Shadowsocks to connect to your VPN on any iOS device (iPhones, iPads, etc). Scroll down for more details. Setting Things Up In order to connect use Shadowsocks on iOS to connect to a VPN server, you need to subscribe to a VPN service that includes a Shadowsocks client. In this guide, we will use bVPN as an example of a VPN provider that comes with a that includes a Shadowsocks service. The following steps should a...
Posted September 24 2017 By admin

In this tutorial, we will show you how to setup PPTP VPN on any Huawei router via simple and very easy steps. As a result, your network will be both secure and private. In addition, you will have the ability to bypass any geo-restrictions and get access to geo-blocked content on the internet. Set Things Up Before configuring PPTP on your Huawei router, first you will need to set things up: 1- You need an internet connection that works properly. 2- Make sure that y...
Posted September 24 2017 By admin

In this tutorial, we will show you how to setup L2TP VPN on any Huawei router via simple and very easy steps. As a result, your network will be both secure and private. In addition, you will have the ability to bypass any geo-restrictions and get access to geo-blocked content on the internet. Set Things Up Before configuring L2TP on your Huawei router, first you will need to set things up: 1- You need an internet connection that works properly. 2- Make sure that y...
Posted September 22 2017 By admin

Internet Key Exchange version 2 or IKEv2 is one of the multiple security protocols used by Virtual Private Networks or VPNs to secure their connections. There are 2 ways to secure your connection with the IKEv2 protocol; either by downloading the VPN application which has the IKEv2 protocol already built-in or you could manually set up an IKEv2 VPN connection on your computer. In this tutorial we will be showing you how to manually configure a VPN’s IKEv2 connection on yo...
Posted September 22 2017 By admin

In this tutorial, we will show you how to setup L2TP VPN on any ASUSWRT MERLIN router via simple and very easy steps. As a result, your network will be both secure and private. In addition, you will have the ability to bypass any geo-restrictions and get access to geo-blocked content on the internet. Set Things Up Before configuring L2TP on your ASUSWRT MERLIN router, first you will need to set things up: 1- You need an internet connection that works properly. 2- ...