background preloader


Facebook Twitter

Dave Johnson

Congress sold you out, what now?  Simple guide to online data privacy   – Blog. An inglorious attempt to block online privacy regulations to go into effect was made last week by the US Senate and this week’s House decision.

Congress sold you out, what now?  Simple guide to online data privacy   – Blog

Rules proposed by the Federal Communications Commission or FCC to ask for permission before selling your browsing data, even though passed in October of last year, under the Obama administration, had not yet gone into effect. Data collection and data selling is nothing new under the sun for your ISP, so continuing business as usual, selling your data to the highest bidder without bothering to ask you first, is a real privilege. One very particular privilege that sounds more like stepping on one of our most fundamental rights: the right to privacy. If you’re anything like me, the whole ordeal sounds a bit exhausting and futile since you don’t have “state secrets to hide”. But having nothing to hide doesn’t make a good case for allowing the abuse here, does it? But how was this even possible and who’s benefitting off of it, you wonder?

1. 10 things to look for when buying a VPN – Blog. A well grounded economic notion warning about the unforeseen consequential effects of abundance describes excess as threatening to social welfare.

10 things to look for when buying a VPN – Blog

Unlike other economic theories talking about scarcity, this time, excess is the enemy in gradually rendering human labor as redundant when compared with machine automation. Now, let’s take the theory of abundance and apply it to a more trivial concern than that of pondering upon the fate of economics. Let’s think about internet and internet browsing for a bit and how the paradox of abundance can take new meaning here. A simple google search will often return dozens of results to the point that you might find yourself faced with redundant choices, every once too often. No. 1: PRICE When it comes to free versus paid, there is no debate really. When the product is free, you are the product– A VPN service implies having servers in various countries. In other words, by searching a bargain you can be faced with two main issues: Freedom is #inevitable – Blog. My and team up for automation As part of a continuous and strategic process, My, the VPN platform of choice for professionals, and Elastic Firewall, the next generation firewall management tool team up for automation.

Freedom is #inevitable – Blog

Heading towards a holistic security approach of Unified threat management (UTM) or unified security management (USM), My welcomes Elastic Firewall as a network security solution. The perks of automation The ability to perform tasks at superhuman levels are typically between “three and ten times the cost.” to quote the “classics” at McKinsey on the fundamentals of workplace automation( you can read here the whole white paper) A ROBUST VPN SERVICE,THE ONLY ROAD TO ZION – Blog. Photo Credit: Being a privacy minded individual is the first thing you should consider in the ever growing digital age.


The convergence of Telecom and IT has opened the door for significant B2B activity in the ICT industry and left a lot of room for data security to be improved along the way. According to Wikipedia, in the field of telecommunications, data retention or data preservation, generally refers to the storage of call detail records (CDRs) of telephony and internet traffic and transaction data (IPDRs) by governments and commercial organizations. VPNs rise to the mainstream: Read or miss out – Blog.

A few years ago, adopting a VPN was not the simplest of tasks for IT managers for a number of reasons which included: deployment, compatibility or interoperability issues and the expense of these systems.

VPNs rise to the mainstream: Read or miss out – Blog

Things have changed. VPNs are now entering the mainstream, and many companies view them as a telecommunications necessity from both security and cost perspectives. Originally designed to reduce the costs of connecting branch offices to the main office of a business, VPNs addressed the concern of high costs of leased lines and dedicated connections.

Using a VPN when in China: The Samurai Way – Blog. Photo Credit: Behind the Great Firewall The Chinese internet goes by very strict policy imposed by a variety of laws and administrative regulations, controlled by an authoritarian government that tries to neutralize critical online opinion.

Using a VPN when in China: The Samurai Way – Blog

Dedicated VPN – Dedicated IP Address. Everything you wanted to know about VPN encryption but were too overwhelmed by the techie jargon to ask – Blog. They say that a VPN is only as good as its encryption capabilities, but encryption in itself is not the simplest of topics.

Everything you wanted to know about VPN encryption but were too overwhelmed by the techie jargon to ask – Blog

The terminology used to determine how secure a VPN connection is, can get very confusing, very quickly. Slapdash to the point of being misleading, many VPN providers describe the encryption they use in a telegraphic manner or worst, they don’t describe it at all. Eavesdroppers are kept away, when using a VPN app. that encrypts your data and cloaks your IP address and it’s important to know how secure your VPN really is by simply becoming acquainted with jargon.

Before getting familiar with security standards and encryption protocols, let’s just focus on this pretty impressive feature for a VPN to have, the Open VPN Cipher: AES (Advanced Encryption Standard) with 256-bit keys — also known as the AES-256. Right below we have AES- 128, the Open VPN Cipher used by My, which remains secure as far as the AES in general is regarded. Pretty impressive, huh?