Lexie

Lexie

Lexie is the blog's resident tech expert and gets excited about empowerment through technology, space travel, and pancakes with blueberries.

  • How to set up a personal VPN server on any device

    How to set up a personal VPN server on any device

    A virtual private network (VPN) helps you encrypt your online activity, hiding it from third parties, including internet service providers (ISPs). It can also replace your IP address with a different ...

    Lexie 17.11.2024 15 mins
  • What is Incognito mode, and is it safe?

    What is Incognito mode, and is it safe?

    You’re probably already familiar with the concept: You can open a new private, or ”Incognito,” window in your browser to search for things online that you don’t want your browser history to re...

    Lexie 08.04.2024 16 mins
  • Dark Web Links: The best .onion and Tor sites in 2025

    Dark Web Links: The best .onion and Tor sites in 2025

    The deep web is the part of the internet that’s not indexed by search engines, such as your emails, social media feed, and cloud storage. It basically includes anything that has a virtual padlock or...

    Lexie 04.02.2024 29 mins
  • How to use technology in the classroom: benefits and impact

    How to use technology in the classroom: benefits and impact

    Technology in education systems comes with a couple of significant obstacles, but as with previous technologies, also presents some opportunities that we would be unwise to turn down. For the most par...

    Lexie 04.04.2023 9 mins
  • What is a man-in-the-middle (MITM) attack?

    What is a man-in-the-middle (MITM) attack?

    A man-in-the-middle attack (also described as monster-in-the-middle, or MITM) describes a very specific attack in which the attacker sits between the two victims (in this case, you and the server). Bo...

    Lexie 08.03.2023 11 mins
  • How to Boost Online Banking Security

    How to Boost Online Banking Security

    It should require no explanation why our online banking details are essential. We keep our money there, and if our accounts become unavailable for a short time or we lose access to them, it would be h...

    Lexie 17.01.2023 29 mins
  • Protect your financial privacy with Bitcoin: A comprehensive guide

    Protect your financial privacy with Bitcoin: A comprehensive guide

    Curious about Bitcoin and how it works? This comprehensive manual will explain how you can use Bitcoin to protect your financial privacy. After you've read this manual, be sure to check out the step-...

    Lexie 21.01.2022 21 mins
  • How to delete your hard drive browsing history

    How to delete your hard drive browsing history

    A common way to enhance your internet privacy is to delete your web browser’s history (see our guide for Chrome). Doing so helps safeguard your personal and financial data. But if you want to go one...

    Lexie 21.01.2022 5 mins
  • The jargon-busting internet security technical glossary

    The jargon-busting internet security technical glossary

    Spim? Spam? Spit? Stop feeling overwhelmed by internet security jargon. Use this handy glossary to figure out what's what! Jump to... A B C D E F G H I J K L M N O P R S T U V W X Z A Access con...

    Lexie 21.01.2022 66 mins
  • Ultimate guide to mobile security for iPhone and Android devices

    Ultimate guide to mobile security for iPhone and Android devices

    While most of us know to be vigilant when it comes to the security of our desktops and laptops—installing antivirus programs and regularly scheduling system scans—our mobile phones often aren’t ...

    Lexie 29.12.2021 26 mins
Get Started