You can legally download and distribute movies, music and other files via many peer-to-peer file-sharing services (P2P). This is made possible by a variety of networks, protocols and client programs. Among the best known are μTorrent (also uTorrent), BitTorrent Mainline, qBittorrent, Transmission and Vuze/Azureus for the BitTorrent protocol, eMule for the eDonkey2000 and Kad network, BearShare for gnutella or multi-protocol […]

[read]
 

A virtual private network (VPN) like Perfect Privacy is used to encrypt all Internet traffic and protect the privacy of the user. But be careful: If the VPN connection has a leak, your privacy is in danger. But how can you detect and prevent VPN leaks? What is a VPN leak? When using a VPN you appear on the Internet […]

[read]
 

Soon it will be Christmas! This year there will be great prices again: One Vilfo VPN router, two Linksys WRT3200ACM AC3200 DD-WRT router and two eBlocker Pro with a one-year license. All prices also include a one Perfect Privacy account valid for one year. The devices are kindly provided by our partners Vilfo *, FlashRouters * and eBlocker. But that’s […]

[read]
 

Cyber-stalking is a threat just like stalking in real life. Stalking is a method of harassing, threatening or even blackmailing people. This type is a typical cyber crime and therefore it is often difficult to defend against. Once a perpetrator has access to his victim’s user accounts – such as email, messenger, or social media accounts – he has an […]

[read]