The pcWRT router is a standalone router, i.e., not cloud based. As such, it works without dependency on our infrastructure. And it doesn't send your network activities back to our servers.

While it does offer convenience features like managing over the cloud or sending notifications when new upgrades become available, those are not requirements for its core functionality.

Rest assured that we are not snooping on you in any way, and that your router will continue to function even when our serers are down.


The pcWRT router offers a lot of controls. In fact, so many that it might overwhelm the first time user. But a basic, simple configuration can provide effective protection, and you can progress to more complex rules as you gain more experience.

Do you want to …

  • Block sneaky ads that follow you around the web?
  • Keep your child safe on the Internet?
  • Block YouTube videos that are not child-safe on children's devices?
  • Block video & games sites when your child is supposed to do homework?
  • Restrict the domains your IoT devices can connect to?
  • Pause the Internet for all or some devices?
  • Stop vulnerable devices from infecting other valuable devices on your network?
  • Schedule to turn off WiFi when you are not using it?

We've got you covered.


What are the devices connected to your network doing? Is your child wandering off to "dangerous zones"? Is your new shiny IoT device hijacked by a hacker?

With the pcWRT router, you can see how many connections were initiated by what device within a time range. And to what domains and ports these connections were made. And, if you are so inclined, take a peek at the first 15 bytes sent out over a connection.

You can also see the bandwidth consumption for each device, which helps you determine if your child is actually doing homework as they claimed to be, or if your IoT devices or smart phone apps are actively sending data when they are not supposed to be.

From The Blog

August 19, 2018

Does a VPN Really Protect My Privacy?

The above picture is often used to illustrate how VPNs can protect your privacy. Because the VPN creates an encrypted tunnel between you and the […]

Continue Reading...