Blog Category


IP ban is a block set up by a server to reject the request made from a particular IP or range of IP addresses. The IP ban may have been implemented automatically due to an abuse pattern detected by the server or placed manually by an administrator. IP ban is implemented to protect the server from abuse such as brute force attacks, block emails from known spammers, and limit usage by users.

Internet censorship puts restrictions on what information can be publicized or viewed on the Internet. Governments and other organizations commonly use internet censorship to block access to copyrighted information as well as to harmful or sensitive content. However, internet censorship can also be used as a propaganda method to promote specific religions and political agendas.

Domain Name Service (DNS) is a mapping of a domain name to an IP address, so that humans can remember computer address by a domain name instead of IP address. A DNS service is requested automatically when someone enters an web address on the web browser, so that the server knows how to find a website. When a user connects to the internet via a home router, the router gets an IP address and DNS server IP addresses via the DHCP it's Internet Service Provider (ISP). You may choose to use public DNS servers instead of the ones provided by your ISP by configuring your Internet connection manually.

A VPN, or Virtual Private Network, is used to securely connect to another network via a public or a private network. A VPN creates a private network within a broader network, thus providing added-security using encryption and network tunneling mechanisms. A VPN is like a bridge that connects two islands (here, LANs) to establish an private, secure and more reliable connection between the two islands (here, local networks). This helps ease security and privacy issues; since the data transmitted over a VPN is encrypted and unreadable to general Internet community. There are two types of VPNs, namely remote-access VPN and site-to-site VPN.

The main purpose of using both proxies and VPN services is to hide the IP Address of the users or to prevent tracking bodies and individuals from identifying their location. For example, this may even be used to access certain sites that are not otherwise accessible in the user's country. A lot of VPN providers also provide proxy services apart from providing VPN services. You can also use many public proxy servers at little to no charge.

What is Tor?

Tor is a free software program that allows users to communicate anonymously. The name, Tor is an acronym that has been derived from the original name of the software project, which was The Onion Router. This software directs all Internet traffic and usage through a free volunteer network that exists worldwide, and has over six thousand relays to hide ip and location of the user; and hide Internet usage from individuals and authorities that are in charge of carrying out traffic analysis or network surveillance.

What is a VPN?

A Virtual Private Network (VPN) is a network technology which extends private network (such as LAN) over a public network such as the Internet. A VPN allows a computer (or a network) to be connected securely as if they are physically wired together. Corporations use VPN to allow remote workers to connect securely to their private network. A VPN is also used to interconnect remote offices with a head office as if they are physically connected.