Puppy Linux Discussion Forum Forum Index Puppy Linux Discussion Forum
Puppy HOME page : puppylinux.com
"THE" alternative forum : puppylinux.info
 FAQFAQ   SearchSearch   MemberlistMemberlist   UsergroupsUsergroups   RegisterRegister 
 ProfileProfile   Log in to check your private messagesLog in to check your private messages   Log inLog in 

The time now is Wed 13 Nov 2019, 23:55
All times are UTC - 4
 Forum index » Advanced Topics » Additional Software (PETs, n' stuff) » Security/Privacy
VPN Comparison Chart & How to choose the best VPN
Post new topic   Reply to topic View previous topic :: View next topic
Page 18 of 18 [262 Posts]   Goto page: Previous 1, 2, 3, ..., 16, 17, 18
Author Message

Joined: 13 Nov 2013
Posts: 2048
Location: Canada

PostPosted: Thu 10 Oct 2019, 13:37    Post subject: NordVPN
Subject description: independent app security audit completed


NordVPN is famous for its incredibly proactive approach to privacy. After their no-logs policy audit performed by PwC late last year, the company returns with another banger – a full-fledged independent application security audit aimed at ensuring that NordVPN software matches the absolute highest security standards.

During the NordVPN app security audit, 7 low-level, 6 medium-level, and 4 high-level vulnerabilities were found and fixed. At the same time, NO critical-level vulnerabilities were detected by VerSprite.

According to NordVPN, the low-to-medium-level vulnerabilities provide “minimal access to the app and user data,” while 4 high-level vulnerabilities found required the user’s device to “already be severely compromised to actually work.”

With technical recommendations from an AppSec firm as high caliber as VerSprite, these changes should help make NordVPN’s apps even more secure than before. This is incredibly welcome news, especially in the VPN industry, where security and trust are the main selling points for the vast majority of service providers.

What’s even more encouraging, is the fact that the company doesn’t intend to stop there and promises to make independent audits a regular occurrence for NordVPN, as well as their upcoming security solutions, including the NordPass password manager and the NordLocker file encryption tool.

Further reading :
NordVPN launches NordLocker, a powerful file encryption app
5G Networks: Breeding Grounds for Hackers?
For extensive 5G coverage, therefore, telecom operators will need to install nodes at a significantly higher density in a given area than previous technologies required.
This is where the source of the greatest security threat in 5G infrastructure originates from. An attacker can steal you information by setting up a fake cell tower — or stingray as it is more commonly known — near your home and learn a great deal about the device you are using including location, phone model, operating system etc. These can even be used to listen in on your phone calls.
Unfortunately, there’s little that we can do beyond the basic privacy and security enhancing measures that should become common practice in 2019. Among the immediate first lines of defense against cybersecurity threats are VPN services and anti-malware tools

Last edited by labbe5 on Today, at 16:31; edited 2 times in total
Back to top
View user's profile Send private message 

Joined: 13 Nov 2013
Posts: 2048
Location: Canada

PostPosted: Tue 15 Oct 2019, 07:26    Post subject: ProtonVPN
Subject description: step-by-step tutorial on how to use ProtonVPN on Debian


The following tutorial explains how to setup a free VPN service on Debian 10 Buster using the ProtonVPN service which even on its free version is very fast getting users excited with the free value provided.

ProtonVPN is formally a partner company of ProtonMail but functionally they are the same company providing security services. ProtonMail was developed at CERN (European Organization for Nuclear Research) by Andy Yen, Jason Stockman, and Wei Sun.

ProtonVPN owns its data centers outside the United States and the European Union jurisdictions. If some entity request ProtonVPN surveillance access to its users the request must pass a Swiss court, the user is notified and can fill an appeal to court, it is important to highlight ProtonVPN has a no log history policy.

Further reading :
Free antivirus apps requesting huge amounts of dangerous permissions they don’t need
The amount of malicious or lucrative things that can be done with user data is staggering, and often only limited by fraudsters’ or marketing companies’ creativity.
What can be said about free antivirus apps can be said of free VPNs (China is almost always behind such apps)

Last edited by labbe5 on Wed 06 Nov 2019, 14:41; edited 2 times in total
Back to top
View user's profile Send private message 

Joined: 13 Nov 2013
Posts: 2048
Location: Canada

PostPosted: Tue 15 Oct 2019, 08:30    Post subject: NordPy
Subject description: An Open-Source Linux Client for NordVPN

A python application with gui to connect automatically to the recommended NordVPN server (as of NordVPN site) of a certain type, in a certain country or to the specific chosen server (stats for each server are shown in the relative window).
All server types on NordVPN site are available to be selected in the window.
Tested against DNS leaks (NetworkManager use is discouraged (and disabled by default) as it may leak DNS)

For Debian/Ubuntu, Fedora/Red Hat users:
To install all dependencies, download config files and to add a desktop entry in the main menu just run install.sh

Further reading :
NordVPN Hack Leads To Credential-Stuffing Attacks On Users
Best VPN for torrenting according to Reddit users
Which countries are best at protecting your privacy?
How to beat Google Play’s algorithm and get 280 million installs
Use sshuttle to build a poor man’s VPN

Last edited by labbe5 on Sat 02 Nov 2019, 07:24; edited 2 times in total
Back to top
View user's profile Send private message 

Joined: 13 Nov 2013
Posts: 2048
Location: Canada

PostPosted: Wed 16 Oct 2019, 17:53    Post subject: Tutanota is blocked in Egypt
Subject description: what you can do


Tutanota users in Egypt report that they can't access Tutanota without using a VPN or the Tor browser.

Users in Egypt report that they can no longer access Tutanota due to a blocking of our service. We can't know whether this is being done by a state actor, but it's possible. Tutanota encrypts emails automatically so that no one can scan your emails. Surveillance - on which many oppressive systems rely heavily - is not possible when activists are using Tutanota.

At Tutanota, we believe security and privacy belong together. That's why we plan to publish a Tor onion service, which is already on our roadmap.

Further reading :
VPN Encryption: Most Secure VPN Encryption Explained

Last edited by labbe5 on Wed 30 Oct 2019, 06:49; edited 1 time in total
Back to top
View user's profile Send private message 

Joined: 13 Nov 2013
Posts: 2048
Location: Canada

PostPosted: Tue 22 Oct 2019, 09:15    Post subject: VPS Hosting Providers
Subject description: and Algo VPN


1. Bluehost
2. DreamHost
3. A2 Hosting
4. InMotion
5. DigitalOcean
6. Liquid Web

When looking for cheap VPS hosting providers, it’s important to consider all of your options. Only looking at prices is likely to leave you with a poor solution and a waste of money. For beginners, any of these hosts could provide a positive experience. However, for more experienced developers, there’s a lot more to consider.

Here are the web hosts we’ve discussed in this article, and some suggestions to help you make an informed decision:

Bluehost: This provider offers a solid VPS at a fair price.
DreamHost: A cheap option that comes with unlimited bandwidth, but no root access.
A2 Hosting: Hosting for those who value knowledgeable and friendly support.
InMotion: An effective choice for up-and-coming businesses and large websites.
DigitalOcean: Web hosting for developers that charges an hourly rate.
Liquid Web: A great choice with 10TB of bandwidth for every plan, and your choice of control panels.

Overall, Bluehost is a standout for anyone looking for an effective VPS host at a reasonable price. DigitalOcean is also worth a consideration for experienced web developers.

For people who want more control, using their own VPN hosted on a VPS for best performance.

Further reading :
How I made my own VPN server in 15 minutes
How to Set Up Your Own Completely Free VPN In the Cloud
Meet Algo, the VPN that works
How to Make Your Own VPN – Complete 13-Steps Tutorial
Back to top
View user's profile Send private message 

Joined: 13 Nov 2013
Posts: 2048
Location: Canada

PostPosted: Thu 31 Oct 2019, 15:21    Post subject: How VPNs Are Susceptible to Hacking  


A hacker’s best point of entry is near the outer reaches of the VPN network. VPN companies sometimes opt not to set up servers in all the countries they want to support. Instead, they’ll hire out data centers established within the target country.

This plan often doesn’t introduce any complications and the VPN service adopts the servers without any issues. However, there is the rare chance that there is a hidden oversight in the data center that the VPN company isn’t aware of. In one reported case, a server that NordVPN rented out had a forgotten-about remote connection tool installed.

This tool was insecure and hackers used it to break in.

From there, the hacker found some additional files. The Register reports that this includes an expired encryption key and a DNS certificate. The key didn’t allow the hacker to snoop on traffic, and if they did, NordVPN says they’d only see the same data an ISP would see.

It’s essential to realize that these breaches aren’t commonplace. Also, the hacker in the NordVPN case only gained access to one of the 5000+ servers. This means that the majority of the service was safe, and only a small section of users was under threat. As such, a VPN is still a useful way to protect your privacy.

However, if you’re very serious about staying anonymous, a VPN shouldn’t be your only line of defense. The attacks on VPNs have shown that they do have flaws, but that doesn’t mean that they’re entirely useless. The best way to maintain your privacy is to add another layer of privacy to what the VPN provides. That way, you’re not wholly dependent on your VPN service to protect you.

For instance, you can boot up your VPN, then use the Tor browser to browse the web. The Tor browser connects to the Tor network, which uses triple-encryption for its traffic. This encryption is applied before your computer sends it, much like a VPN.

Further reading :
How To Make Your Torrent Download Speed Faster?
The complete torrent tracker list
Best Kodi Repositories
Back to top
View user's profile Send private message 

Joined: 13 Nov 2013
Posts: 2048
Location: Canada

PostPosted: Sun 10 Nov 2019, 16:19    Post subject: SaferVPN
Subject description: How To Use SaferVPN on Linux


Why You Need to Use VPN on Your Computer and Mobile Devices

Many online booking services like Kayak are known to offer different prices for different countries. When you are booking flights or hotel online, you can use VPN to switch your IP address in order to find the best deal.

Further reading :
Like many websites, StreamLord uses advertisements, cookies, and other tracking software to monitor user activity and monetize the site. Most of these are more annoying than unsafe, but you can encounter intrusive ads or privacy-invading scripts from time to time. We visited StreamLord both with and without our ad- and tracker-blocking software enabled. The site was surprisingly safe even without the extensions turned on, though we always recommend leaving them enabled just in case.
Thunder TV IPTV – Over 1200 Channels only $15/Month
Back to top
View user's profile Send private message 
Display posts from previous:   Sort by:   
Page 18 of 18 [262 Posts]   Goto page: Previous 1, 2, 3, ..., 16, 17, 18
Post new topic   Reply to topic View previous topic :: View next topic
 Forum index » Advanced Topics » Additional Software (PETs, n' stuff) » Security/Privacy
Jump to:  

You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You can download files in this forum

Powered by phpBB © 2001, 2005 phpBB Group
[ Time: 0.0929s ][ Queries: 11 (0.0485s) ][ GZIP on ]