Cybersecurity Statistics and Facts for 2017-2018

From malware to DDoS attacks, cybersecurity threats are growing in many different areas. Here’s the latest breakdown on cybersecurity facts from 2017-2018.

Using public wifi safely.

How to stay safe and private when using public wifi

Learn about using public wifi safely, including what the dangers are and tactics you can use to keep yourself and your information safe and secure.

The Tor project.

Everything you wanted to know about Tor but were afraid to ask

I answer all the questions you might have about the Tor network, including whether it’s legal, who uses it, and how to get started yourself.

Proxy servers.

What proxy servers are and how they differ from VPNs

Find out exactly what proxy servers are, how they help you unblock restricted sites, and their advantages and disadvantgaes versus VPNs.

DNS spoofing: what it is, why it is used, and how to avoid it

DNS spoofing is also known as: DNS tampering, DNS cache poisoning, DNS hijacking, DNS redirection. We’ll explain how the domain name system works, what DNS spoofing is, how DNS spoofing is used, and how to avoid it.

Cloudflare pic

How to set up Cloudflare DNS on Windows, Mac, Android, iOS, and Linux

I’ll show you how to use Cloudflare DNS on any device to improve your privacy by preventing your ISP from snooping on web page requests. We also examine the pros and cons of using Cloudflare DNS versus other public DNS providers.


How cookies track you around the web and how to stop them

Some cookies are harmless, but others remain active even on websites that they didn’t originate from, gathering information about your behavior and what you click on. These are called third-party persistent cookies or, more colloquially, tracking cookies.

stop isps tracking your child

How to stop ISPs, advertisers, and hackers gathering information about your child

If your child spends any time online, chances are ISPs, advertisers, and hackers are able to collect information about them. Find out the steps you can take to stop ISPs tracking your child.

Secure your computer.

8 easy steps to secure your computer

Whether you use your computer primarily for work tasks or personal use or both, it’s prudent to keep its contents secure. Find out about 8 simple steps you can take to secure your computer.


How I stay anonymous online

I explain all the precautions I take in order to stay anonymous online, complete with links, instructions, and helpful tips.