CometVPN Blog

VPN Guides & Tutorials
Networking & Internet Basics

7 min read

Private DNS: The Complete Guide to Secure Browsing

Computers talk with each other in numbers and humans in words. That's a simplification, of course, but it gives us a good idea of what DNS servers do — translate words of domain names (cometvpn.com) into numbers of IP addresses (172.67.201.66).

A DNS server can be a privacy hazard as it has to be informed about every website you visit. A private DNS solves this problem by allowing you to use a DNS provider of your choice, possibly with encryption. We explain what private DNS is and how to set it up below.

Rasa Sosnovskytė

Cybersecurity & Privacy

7 min read

IP Fragmentation Attack: Understanding the Threat and How to Prevent It

We’re all familiar with the pain of sudden internet connection problems, instability, and the constant website crashes. And while this could just be an innocent connection loss, it could also be a sign of an IP fragmentation attack.

Although a lesser-known threat, it’s a type of cyber attack that exploits the way internet protocols handle data transmission to evade firewalls, disrupt services, and infiltrate networks undetected.

If successful, a slowed internet would be the least of your worries – there would also be a risk of major application crashes, and worst still, malicious and unauthorized data breaches. That’s why it’s important to be informed and know how to protect your device properly.

Rasa Sosnovskytė

Cybersecurity & Privacy

4 min read

5 Tips to Prevent Screen Hacking

Screen hacking is a new type of attack that injects fake touchpoints on a touchscreen by using electromagnetic interference EMI. A hacked screen can be used to perform any action on the device, including opening browsers, sending messages, or installing software.

Hackers use dedicated devices to send signals to your touchscreen that mimic the same signal sent when the screen is being touched. Luckily, it’s currently impossible to do that from a long distance, so the person has to be within a few meters of you, making it easier to understand what’s going on.

Rasa Sosnovskytė

Cybersecurity & Privacy

6 min read

Password Entropy: Definition and How to Calculate It

Password entropy is a key concept for creating a strong password. Expressed in bits of entropy, it gives us an objective measurement of how difficult it is to crack, guess, or brute-force attack passwords.

We all know that strong passwords must be complex and include lots of special characters, numbers, lowercase, and uppercase letters. Understanding what password entropy is and how to calculate it helps create strong passwords you can remember but criminals struggle to crack.

Guoda Šulcaitė

4 min read

How to Use VPN for TikTok: A Step-by-Step Guide

TikTok has been targeted by various countries and governments due to suspicions of data harvesting and user tracking. In some countries, the app is completely banned while others have placed restrictions for government workers.

If you live in one of the countries where TikTok has been restricted, there’s an easy way to avoid these bans – using a VPN. With a VPN, you can connect to a country where the TikTok app is completely free to use and you’ll be able to do so yourself.

Rasa Sosnovskytė