How To Use A Disposal Email Address (For Signing Up To New Services)


These days, many companies ask for your email address. Often you end up with spam in your inbox, or, worse still your email is sold to various other mailing lists. It makes sense to use a disposal email address, at least until you trust a company enough to give them your real address. I recommend […]

[Read More]

Whonix: An Operating System Where IP & DNS Leaks Are Impossible


Whonix is an operating system focused on anonymity and security. It’s based on the Tor anonymity network, Debian GNU/Linux and security by isolation. In Whonix, DNS leaks are impossible, and not even malware with root privileges can find out the user’s real IP. Whonix consists of two virtual machines on a separate, isolated virtual network. […]

[Read More]

How To Make Your Linux and VPNs Installs Easier


If you want to get started with VPNs and Linux without a lot of hassle, here are some recommendations: Get A Pre-Configured VPN Router A pre-configured VPN router can provide all your computers and mobile devices with encrypted internet connections. You won’t have to install a VPN client on each device, and all your devices […]

[Read More]