CometVPN Blog

VPN Guides & Tutorials

4 min read

How to Go Incognito on Any Browser (Step-by-Step)

Key takeaways:

  • Incognito mode helps hide activity from your browser, but not from your ISP.
  • You can easily open an Incognito window in any browser using the menu or a keyboard shortcut.
  • Use a VPN with private browsing to keep your activity truly private.
  • Everyone has tried to secretly shop for a birthday gift online or look up some weird thing that shouldn’t remain on anyone’s browsing history. To do that without leaving a trail, you probably decided to go Incognito. If not, we’ll explain to you why you should.

    Here you will learn how to open a new Incognito window on all major browsers. We’ll show you the exact steps to take, explain that Incognito mode really does, and give you some tips for better privacy.

    Guoda Šulcaitė

    Tech Tips & Troubleshooting

    4 min read

    pDoS Attacks: What They Are and How to Prevent Them

    Denial of Service (DoS) attacks disrupt access to networks or services. But a more harmful variant is pDoS, or Permanent Denial of Service. Unlike other DDoS attacks that flood the target with huge amounts of internet traffic, a pDoS attack can permanently damage hardware.

    Understanding Permanent Denial of Service is crucial since these types of attacks target the hardware layer, not just software. In this blog post, you will learn how a pDoS attack works and how to prevent long-term damage and costly recovery.

    Adomas Šulcas

    VPN Guides & Tutorials
    Networking & Internet Basics

    7 min read

    Private DNS: The Complete Guide to Secure Browsing

    Computers talk with each other in numbers and humans in words. That's a simplification, of course, but it gives us a good idea of what DNS servers do — translate words of domain names (cometvpn.com) into numbers of IP addresses (172.67.201.66).

    A DNS server can be a privacy hazard as it has to be informed about every website you visit. A private DNS solves this problem by allowing you to use a DNS provider of your choice, possibly with encryption. We explain what private DNS is and how to set it up below.

    Rasa Sosnovskytė

    Cybersecurity & Privacy

    7 min read

    IP Fragmentation Attack: Understanding the Threat and How to Prevent It

    We’re all familiar with the pain of sudden internet connection problems, instability, and the constant website crashes. And while this could just be an innocent connection loss, it could also be a sign of an IP fragmentation attack.

    Although a lesser-known threat, it’s a type of cyber attack that exploits the way internet protocols handle data transmission to evade firewalls, disrupt services, and infiltrate networks undetected.

    If successful, a slowed internet would be the least of your worries – there would also be a risk of major application crashes, and worst still, malicious and unauthorized data breaches. That’s why it’s important to be informed and know how to protect your device properly.

    Rasa Sosnovskytė

    Cybersecurity & Privacy

    4 min read

    5 Tips to Prevent Screen Hacking

    Screen hacking is a new type of attack that injects fake touchpoints on a touchscreen by using electromagnetic interference EMI. A hacked screen can be used to perform any action on the device, including opening browsers, sending messages, or installing software.

    Hackers use dedicated devices to send signals to your touchscreen that mimic the same signal sent when the screen is being touched. Luckily, it’s currently impossible to do that from a long distance, so the person has to be within a few meters of you, making it easier to understand what’s going on.

    Rasa Sosnovskytė