Personal VPN to Bypass Internet Censorship, VPN Blocking and Bandwidth Throttling

Khalid Security Leave a Comment

Having a VPN, Virtual Private Network, is essential nowadays for many reasons, such as accessing restricted content by your ISP or government, bypassing geographically restricted content, protecting your privacy, and so on. In an earlier post, I have reviewed the top three VPN providers. If you are looking for a secure and affordable VPN provider, Private Internet Access is an ...

How to create multiple accounts on a website using one email

Khalid Security Leave a Comment

Whenever I want to create a new product, such as a website, bot, mobile app, I immediately create its social accounts (Facebook, Instagram, Twitter, … etc) right after deciding what the name of the product is going to be. However, creating a new email for every product is annoying. Filling out forms, confirming your identity, recalling/storing multiple credentials, checking the …

3 Top VPN providers and which VPN to use

Khalid Security Leave a Comment

There are enormous reasons why you should use a VPN, including, but not limited to, protecting your privacy by hiding your browsing history from your ISP or local network, permitting access to some geo-blocked content (e.g. playing Pokémon Go before its officially released in your country), bypassing your ISP’s internet censorship, and many more. However, there is a tremendous number of VPN providers available …

Access your Raspberry Pi Globally Using Tor

Khalid Raspberry Pi, Security Leave a Comment

Few days back, I needed to access my raspberry pi remotely from anywhere. I have achieved this by using a hidden SSH Tor service. Tor Project, The Onion Router, is a free software that provides anonymous communications over the internet. This method is not limited to raspberry pi, and it can be applied on any computer you can install Tor on. Kindly note, this …

How to send encrypted emails using Enigmail

Khalid Security Leave a Comment

Have you ever wanted to send sensitive information by email securely? Regularly, emails are sent in plain-text, which allows hackers and anyone with an unauthorized access to your email to read your emails easily. Hence, encrypting your sensitive emails adds an additional secure layer to prevent such intrusions. So, how to encrypt your emails? There are multiple ways to achieve that but I will be explaining the …

How to chat securely over the internet

Khalid Security Leave a Comment

We all want to be secure and protect our private information from unauthorized people (not only hackers). But if you are not concerned about your privacy and security like I do, I suggest you watch Glenn Greenwald’s talk on Why privacy matters to realize the importance of protecting your privacy even if you have nothing to hide. In this post, I will explain how …