How big is the risk? Time and time again you’ve been told that public WiFi hotspots or compromised routers will get your credit card numbers and banking info stolen. However, such risks have been overly hyped. We agree that public, open WiFi networks totally cannot be trusted. And that compromised routers can be used to […]Continue Reading... 1 Comment.
The pcWRT router provides two ways to monitor your network activities. You can view every site visited (or blocked) by each device (or user) by clicking the “View Logs” link on the Access Control page. And you can view the bandwidth consumption of each device on the Bandwidth Monitor page. Access Logs Click the View […]Continue Reading... No Comments.
You’ve probably heard of Pi-hole, an open source software package that runs on a Raspberry Pi and blocks ads on any device connected to your network. It’s efficient and cost effective, but requires you to have some technology know-how. This is a detailed write-up if you are interested in setting up Pi-hole by yourself: Install […]Continue Reading... 4 Comments.
What is the advertising ID? The advertising ID is an identifier on your mobile device that is created to identify you for advertising purposes. It is present on both Android and iOS devices. Apps on your mobile devices can send your behavior along with the advertising ID to one or more advertising networks. By linking […]Continue Reading... No Comments.
Setting up a VPN connection on the router is not an easy task. First of all, not many routers support VPN. If your existing router does not support VPN out of the box, you might need to flash it with open source firmware so that you can install VPN software on it. Then you need […]Continue Reading... No Comments.
By default, Android displays notification content on the lock screen. While it may seem like a convenient feature at first, it’s probably a bad idea. This is what my lock screen looked like after I requested a password reset on Facebook: Looks scary? Here’s how to turn it off: Open the Settings app Tap on […]Continue Reading... No Comments.
The above picture is often used to illustrate how VPNs can protect your privacy. Because the VPN creates an encrypted tunnel between you and the Internet, your privacy is protected. However, the picture is missing a very important piece: the VPN service provider. As you can see, the encrypted tunnel ends at the VPN service […]Continue Reading... No Comments.
Recently, two unsecured databases were discovered on the Internet. Exactis, a Florida marketing data aggregator, exposed 340 Million Consumer Records to the world. Another company, Telemedicine, exposed detailed health care information on more than 2.3 million patients in Mexico, by making a MongoDB database accessible to anyone without a password. In both cases, the researchers […]Continue Reading... No Comments.
You’ve had the experience. You looked at something on a shopping site, then that thing follows you all around the Internet. It feels creepy. Trust me, those companies take privacy very seriously – their privacy. You see, you looked at the pair of shoes you later bought. The shopping site knew that you looked at […]Continue Reading... 2 Comments.
People don’t like to be tracked around everywhere they go on the web. So all major browsers give you the option to “block third party cookies”. And there’s a DNT header that your browser sends on your behalf to nicely tell the tracking parties that you don’t want to be tracked. However, the big question […]Continue Reading... 1 Comment.