CometVPN Blog

Cybersecurity & Privacy

5 min read

How to Delete Google Assistant History

Virtual voice assistants such as Google Assistant have become an inseparable part of our home environments. Sometimes it’s way easier to control your IoT cloud or get the info you need without rising from your sofa.

However, as with most digital commodities, voice assistants carry their own privacy risks. The practice of frequently deleting your history can reduce those risks and improve your privacy score. Below we’ll give you a complete guide on how to delete Google Assistant history without much fuss.

Adomas Šulcas

Networking & Internet Basics

8 min read

How to Find a Device Name by MAC Address: Tools and Tips

You don't need to be a systems administrator to look after your home network. Many issues can be resolved by understanding a couple of concepts and using the right tools. Media Access Control address, or simply MAC address, is one of the most important.

Each device has its own MAC address, a 12-digit hexadecimal number assigned as a unique identifier. Finding the device's MAC address is useful for various cybersecurity and troubleshooting purposes.

You can identify the device - its maker and sometimes model, without having the device on hand or knowing its IP address. It's also useful for discovering unknown or unauthorized devices on your network. Whatever your reason, we'll help you find device name by MAC address in your network.

Adomas Šulcas

VPN Guides & Tutorials

8 min read

How to Use a VPN: Secure Your Internet Connection Anywhere

Your activity is far from private when you’re online. Multiple parties such as your internet service provider, cybercriminals or even government agents can track your online presence for various reasons (e.g. marketing, bandwidth throttling, spying, etc).

Using a VPN is one of the simplest and most reliable ways to protect yourself from prying eyes. Let’s see how to use it — it is very straightforward.

Cybersecurity & Privacy

7 min read

Network Security Key: What is It, How to Find It, and Why It’s Important

A network security key, in simple terms, is your Wi-Fi password. You can either create your own or go with the predefined string of numbers and symbols that reside on the back of your router.

These network security keys are essential in protecting your network, as they prevent unauthorized access to your internet.

In this article, you will understand what network security keys are, what types exist, how to find these network keys on different devices, how to troubleshoot common network security issues, and best practices for keeping your security key safe.

Tech Tips & Troubleshooting

4 min read

How to Change Google Password: A Step-by-Step Guide

Over 80% of data breaches are caused by weak passwords. This makes it one of the most popular gateways for hackers to reach your personal data. Therefore, it’s essential to change it regularly to protect your personal information and secure your accounts.

In this article, you will find a step-by-step guide to change your Google Account password. It’s easy and simple both on desktop and mobile.

Guoda Šulcaitė

6 min read

12 Best Cybersecurity Podcasts to Follow in 2025

No device or network can fully protect itself - all cybersecurity originates from the person administering it. There's no more time-efficient and entertaining way to achieve knowledge of cybersecurity threats than with podcasts.

You can hear entertaining stories from experts about cybercrime and digital protection strategies. Their work often resembles that of detectives more than it might seem. Ethical dilemmas, privacy concerns, and cybercrime mysteries - our list of top cybersecurity podcasts has it all.

Guoda Šulcaitė