February 22, 2018

Proxy VS VPN: What Is The Difference?

PROXY VS VPN VPN (Virtual Private Network) and proxy servers have increased in popularity over the years as digital tools to help you get around Internet restrictions, firewalls, and any kind of service/country that is imposing heavy censorship in regards to using the Internet. Most of us know that when we surf the […]
March 5, 2013

BolehVPN answers Privacy Questions

A lot of people have been asking us our response to these questions so I thought I’ll set them out here. 1. Do you keep ANY logs which would allow you or a 3rd party to match an IP-address and a time stamp to a user of your service? If so, exactly what […]
January 18, 2013

BolehVPN now accepts BitCoin (Trial Run)

Many of you asked us on whether we accepted BitCoins. One of the main problems with BitCoins was that in Malaysia, exchanging BitCoins into Malaysian Ringgit was a very troublesome process and involves massive transactional fees which did not make it viable. We think we finally found an acceptable solution to this and […]
November 12, 2012

Acceptance of Prepaid Visa Gift Cards (that restrict country use)

For our customers wishing to use prepaid visa gift cards that restrict country use as an anonymous method of payment, we now have a reliable way to accept this with minimal hassle. As you may have realized, certain gift cards (especially those from the US), have recently restricted payments to payment processors outside […]
April 20, 2012

Ultrasurf Unsafe?

Recently there have been some allegations against Ultrasurf saying that the popular anonymizer might not be as safe as it claims. Jacob Appelbaum, developer at Tor, posted an in-depth review of the security issues he found with the service which allowed him to track down individual users. Basically, Appelbaum reverse engineered the network […]
April 4, 2012

Most Wi-Fi Security Can Be Broken (Including WPA2)

Many people know that WEP security on Wi-Fi is easily broken, but very few know that WPA and even WPA2 secured networks are also at risk. With the release of a publically available open source tool called Reaver, now almost anyone can crack most WPA and WPA2 networks. In short, a huge percentage […]
March 12, 2012

Using VPNs For Protection From Deep Packet Inspection

  With the rise and fall of the SOPA and PIPA bills (not to mention ACTA), Deep Packet Inspection has come into wider circles of conversation, but it is still something often forgotten about when discussing data security. Since it can be used to protect users from privacy and slow connections, many people […]
February 25, 2012

Top 3 Ways to Protect Your Online Privacy

1. Use A Good Browser Do not use an out of date version of Internet Explorer. Although Microsoft has updated their browser pretty well recently, it just happens to be the most popular browser: the more people use a particular browser, the more hackers and jerks who will try to make victims of […]