VPN – How to avoid getting scammed (hint: don’t trust Facebook for your VPN)

Recently, it became public knowledge that the Protect VPN app for iPhone is sending more than a significant amount of data back to Facebook. This seems particularly disheartening to VPN users who sought and chose this VPN service to enhance their personal security and to limit the amount of data that they share over the internet. So what now? Whats the point of a VPN then?

Read more

What is VPN? Why use it? How do I get it?

The internet is still a pretty unsafe place. Hackers and other criminals are stealing information all the time, governments and big telecom companies are trying to pry into our browsing habits to control and capture what information we access. There are a whole host of unsavory things out there and a VPN is an effective tool to help protect you from it all.

Read more

How to Install Lets Encrypt

If you haven’t considered adding SSL encryption to your webpage yet, you should. SSL encryption has a lot of benefits to consider and really no reasons not to. If making sure your visitors feel safe seems important to you, or if SEO results matter much to your site, then you probably should follow along with this very simple tutorial. This article is really meant to walk you through how easy it is for anyone to set up.

Read more

A Simple Explanation Of Lets Encrypt SSL Certificates

Lets Encrypt is a Certificate Authority (otherwise known as a CA) that provides FREE SSL certificates. The intention of giving away these free certificates is to promote a more secure internet and although they are free certificates, they are by no means less safe. Today we are going to talk about the benefits of this type of SSL and when it’s most appropriate to use it.

Read more

How does an SSL Certificate work?

Before we start, what is SSL?

SSL stands for “Secure Socket Layer”. This is a standard technology used to create an encrypted channel between a server and a browser. This is meant to allow sensitive information to pass securely between a user and a server without being at risk of data theft or “man in the middle” attacks.

Read more