Friday, April 22, 2016

How to access Apple movies and iBooks in China

Less than seven months after Apple launched iBooks and iTunes Movies, the services have been shut down in China. Every now and then the Chinese government makes such decisions to block various online services. Sometimes they are quick to revoke such decisions but other times they may last for years. One thing is for sure, if visit or you live in China, then you are bound to experience some form of censorship.

A Virtual Private Network (VPN) service is by far the easiest and most effective means of bypassing China’s great firewall. A VPN will allow you to use the internet as you would like allowing you to access all the services that you would enjoy in the western world. Similarly it will allow you to access iTunes movies and iBooks circumventing the latest issue presenting itself when in China.

This is possible by creating a secure encrypted tunnel between your computer (tablet, smartphone) in mainland China and a VPN server somewhere else in the world; it is impossible for the Great firewall to determine what websites are being visited.

Liberty VPN offers a 100% money back guarantee for our service.   
For more information please visit https://www.libertyvpn.net or email us at support@libertyvpn.com

Monday, April 18, 2016

Not sure about your privacy and security online? You're not alone.

A recent survey by the Centre for International Governance Innovation (CIGI) reveals that 83 percent of people using the internet believe that there is a need for more rules about how companies and governments use personal data. Furthermore, 85 percent believe that their governments should work closely with other countries and organizations to make the Internet more secure.

Concerning online privacy, 57 percent were more worried than they were a year ago, and only a few people surveyed (38 percent) trusted that their activities online are not being monitored. Less than half (46 percent) believe that their internet activity is not being censored. Only about a third believed that their government was doing enough to keep their personal data protected from private companies.

Liberty VPN can help you ease these uncertainties regarding online privacy and security, as it will protect your personal information from anywhere you choose to access it from. You may setup a connection on your desktop, laptop, tablet and smartphone.

Liberty VPN offers a 100% money back guarantee for our service.   
For more information please visit https://www.libertyvpn.net or email us at support@libertyvpn.com

Tuesday, February 23, 2016

Do NOT use a Wi-Fi hotspot without a VPN!

There has been greater awareness in recent years of how unsafe it is to connect to public a Wi-Fi hotspot, such as those found in most airports, coffee shops and hotels. Although very convenient, in particular for travelers who do not wish to pay excessive roaming mobile data fees when away from home, unsecure Wi-Fi connections are full with perils.

The emergence of Firesheep has shaken up the Wi-Fi hotspot world, and focused the minds of security experts on the dangers of connecting to public Wi-Fi networks. This add-on for Firefox is a packet snooper that lets even people, with almost no hacking skills, intercept unencrypted cookies sent from websites such as Facebook and Twitter over public networks. This allows them to “sidejack” a user’s current session and effectively use a website as them. The hacker could then download personal details, send spam, delete the user’s accounts or change their password, or even download unsavory material using their account. 

The problem is made worse by the existence of “evil twin hotspots”. Packet sniffer and the like will only work on unsecured networks, and only when connecting to unsecured websites (non-SSL .i.e. their address starts with http:// rather than https://) and on things such as POP3 email and FTP connections (POP3 snooping is dangerous as it gives hackers access to a user’s email details when they sync with POP3 servers). Hence, it is common practice among hackers to hang out at public access hotspots, and set up fake mobile hotspots of their own, with names such as “Free Airport Public Wi-Fi”. Users, who make the mistake of connecting to one of these Wi-Fi “traps”, allow hackers to download their cache, and possibly access shared folders. The hackers may also try to fool users into paying for internet access, and therefore handing over their payment details to the hacker. 

There is however a simple solution to these problems (other than just not using public Wi-Fi), which is to use VPN. A VPN connection creates an encrypted tunnel between your device and the VPN server, no one, including both your own ISP and any public Wi-Fi hackers, can ‘see’ the data you transmit.

Liberty VPN offers a 100% money back guarantee for our service.   
For more information please visit https://www.libertyvpn.net or email us at support@libertyvpn.com

Wednesday, September 16, 2015

Windows 10 Privacy Settings


Excerpt from the Windows end user license agreement which is part of the 45 pages of the terms and conditions:

“We will access, disclose and preserve personal data, including your content (such as the content of your emails, other private communications or files in private folders), when we have a good faith belief that doing so is necessary to:
  1. comply with applicable law or respond to valid legal process, including from law enforcement or other government agencies;
  2. protect our customers, for example to prevent spam or attempts to defraud users of the services, or to help prevent the loss of life or serious injury of anyone;
  3. operate and maintain the security of our services, including to prevent or stop an attack on our computer systems or networks; or
  4. protect the rights or property of (our company) , including enforcing the terms governing the use of the services – however, if we receive information indicating that someone is using our services to traffic in stolen intellectual or physical property of (our company), we will not inspect a customer’s private content ourselves, but we may refer the matter to law enforcement.”

Windows 10 brings with it some irritating privacy invading features

To install Windows 10 you must agree to the above and if you are part of the millions of people who have already updated their system, chances are that you have not read the full agreement. 

According to the European Digital Rights Organization (EDRi): “Microsoft basically grants itself very broad rights to collect everything you do, say and write with and on your devices in order to sell more targeted advertising or to sell your data to third parties.”

Selecting the “Express install” option, while you are updating to Windows 10, will automatically selects the default settings that allow Windows to gather information about you from your files, location, browsing history, contacts and calendar etc.


These are the most important new features that you may want to switch off:

1) Your unique advertising ID - Windows will collect and use data in order to show you ads in your apps, which will be tailored specifically to your “needs”. Even classic games such as solitaire will be showing you unavoidable ads. To turn off the advertising ID go to Settings/Privacy/ General.

2) WUDO – It is short for Windows Update Delivery Optimization and it is a new way of giving users access to Windows updates. Traditionally users would download updates from the company’s servers. However, now other Windows users can download them directly from your computer in a process quite similar to torrents. Ideally you would not like other to have access to your computer and possibly your personal information and data. You may turn this off by following the steps below:
  • Launch Settings (Windows Key+I) and click on the ‘Windows Update settings’ option. 
  • Then click on ‘Advanced options’.
  • Select the ‘Choose how updates are delivered’ option.
  • Now turn the toggle to ‘Off’.

3) WI-Fi Sense -
This is a service that automatically opens up your Wi-Fi connection to all your contacts on Facebook, Outlook or Skype that are within your surrounding area. The idea behind this is that it eliminates the need to look for the Wi-Fi password every time a friend visiting. However, this raises the issue that you cannot select who is granted this convenience. You risk unintentionally letting people into your network. You may turn this off in Network settings > Manage Wi-Fi settings > Toggle to OFF.

4) Cortana - She is your new personal assistant but for her to do her job; she will need to gather information including your name, contacts, calendar events and more. You may can turn Cortana off here: Settings > Privacy > Speech, inking, & typing > Stop getting to know me.


In total there are 13 different subsections in the Privacy menu under settings offers. We recommend going through them all, to decide what and how much information you would like to share. 


Liberty VPN offers a 100% money back guarantee for our service.   
For more information please visit https://www.libertyvpn.net or email us at support@libertyvpn.com

Saturday, May 2, 2015

How can Free Wi-Fi Harm You

Nowadays anywhere you go you will cross paths with a public Wi-Fi hotspot. They are everywhere but do beware this free service could lead to trouble. We will look at the security risks of such spots and what to consider when connection to a public Wi-Fi.

Public Wi-Fi is everywhere! These are just some examples of where you will find them:

  • Coffee Shops 
  •  Airports
  • Restaurants
  • Hotels
  • Schools
  • Libraries

We invite you to ask your friends or coworkers if they are concerned about the security risks of public Wi-Fi. About two thirds will probably say that they have no concern while more than 80% will say that they do connect in spite of clear warnings of a possible risk.

Hackers take advantage of Wi-Fi hotspots using the following methods:

  • Man-in-the-middle (MITM) attacks: A hacker injects himself between two computers or modifies the communication between them.
  • Rogue Wi-Fi networks: A hacker sets up a fake network that poses as a genuine network to steal personal information from users that connect to it.
  • Packets sniffers: Hackers use certain tools to intercept any information sent through an unsecured network.

Now you might be thinking what information would anyone want to steal from me? Well any username and password would give them access to your personal data. Some examples would include login details for: 

  • Online banking
  • Social media
  • Emails
  • Online shopping

How do you protect yourself from such attacks? Consider the following tips for your own protection.


  • Avoid connecting to unsecured public networks.
  • Make sure your antivirus and firewalls are on
  • Try to use secure websites only (the URL begins with HTTPS)
  • USE a VPN connection! It is the safest way to protect yourself from any hacker!


Liberty VPN offer a 100% money back guarantee for our service.   
For more information please visit https://www.libertyvpn.net or email us at support@libertyvpn.com

Wednesday, December 10, 2014

Mac 10.10 Yosemite: Set up a VPN (virtual private network) connection


To connect to a virtual private network (VPN) you need to enter configuration settings into Network preferences. These settings include the VPN server address, account name, and any authentication settings, such as a password that you have received from your VPN provider.

Get your VPN account from Liberty VPN a Top VPN Provider

To setup a VPN connection on your Mac 10.10 Yosemite follow the steps below:
 
1.      Choose Apple menu > System Preferences, then click ‘Network’.
2.      Click ‘Add’ ‘+’ at the bottom of the network connection services list, click the ‘Interface’ pop-up menu, then choose ‘VPN’.
3.      Click the VPN Type pop-up menu, and then choose what kind of VPN connection you want to set up, depending on the network you are connecting to. Give the VPN service a name and then click ‘Create’. 

o    PPTP allows corporations to extend their own corporate network through private “tunnels” over  the public Internet 
o    L2TP is an extension of the Point-to-Point Tunneling Protocol used by Internet service providers to enable a VPN over the Internet  


4.      Enter the server address and the account name for the VPN connection (in welcome email).
5.      Click on ‘Authentication Settings’ and enter the information you received from the network administrator.
6.      Click ‘OK’, then click ‘Connect’.

Select ‘Show VPN status in menu bar’ to use the VPN status icon to connect to the network and switch between VPN services.

To remove the VPN configuration, select the VPN network connection service in the list and click ‘Remove’ ‘-’.