Free VPNs Tunnel Bear is Canadian Company providing you a free VPN Service.
It can be used with a PC, MAC, iOS or Android. me more

Shellfire is based in Germany and there for under strict consumer protected and jurisdiction.
They also provide you with a free unlimited VPN Server from the US.
..let me see

Soon will launch an own VPN service for you.
So you can relaxe and surfe the web anonymous and freely with the quality you are use to get from

be aware

Phishing usually begins with a SPAM e-mail. Friendly, the receiver is asked, for example to visit a Bank’s website in order to verify its data. The link to the website includes of course the Bank`s name. Sometimes you can identify a fraudly website by bad spelling and grammar on the websit itself. But there are also deceptively replica websites that are barely distinguishable from the respective real websites, even on a closer inspection.
It`s very suspicious when you not even a customer of that mentioned company. No serious acting company would ever ask its customers by e-mail to disclose user passwords or any other sensitive information for verification. Such a request should make you suspicious. You should not call this offspring, but ask your Account Manager if this request is a real demand from your Bank/Company?!

Test yourself if you are able to identify fraudently websites:

click here


At the moment there is a FBI scam blocking your PC once you infected your computer. This scam varies from country to country. If your computer been infacted you will receive a page blocking your PC and showing the following message:



System Failure Federal Bureau of Investigation All Activities of this computer has been recorded. All your files are encrypted. Don’t try to unlock your computer! Your PC is blocked due to at least one of the reasons specified below. Copyright and Related Rights law (Video, Music, Software) and illegally using and distributing copyrighted content, thus infringing Article I, Section B, Clause 8, also known as the Copyright of the Criminal Code of the United States of America. Article 202 of the criminal provides for deprivation of liberty for two or twelve yours. Illegal access has been initiated from your PC without your knowledge or consent, your PC may be infected by malware, thus you are violating the law On Neglectful Use of personal Computer. Article 210 of the Criminal Code provides for a fine of up to $100,000 and/or a deprivation of liberty for four to nine years. Pursuant to the amendment to the Criminal of United States of America of May 28,2011, this law infringement (if it is not repeated – first time) may be considered as conditional in case you pay the fine to the state. Fines may only be paid within 24 hours after the infringement. As soon as 24 hours elapse, the possibility to pay the fine expires, and a criminal case is initiated against you automatically within the next 24 hours! To unlock the computer, you must pay the fine through REloadit Pack of $300. To unlock your computer locked by the United States Cyber Security REloadit Pack fine Virus and to avoid other legal consequences, you are obligated to pay a release fee of $300. Payable through REloadit Pack via Walmart Card or Kmart Card etc. After successful payment, your computer will automatically unlock.

Act quickly and unlock yourself here or here

Everyone knows those SPAM e-mails. They offer services / products that no one needs and mostly automatically recognized by many email programs and stored in separate folders for suspicious e-mail SPAM.
Todays SPAM arent much of a danger anymore, however you should not click on the “unsubscribe click here” link. Clicking this function indicates the spammer, here is a real person and a valid e-mail address. Which could lead to even more spam and likely increases rather than decrease the spam flood.
You should not click the spam email links or ever open any attachments. The activation of links or attachments could possibly result in malicious software being installed


A proxy server is a computer that allows clients to make indirect network connections to other networks or web servers. A client connects to the proxy server, then requests a connection, file, or other resource available on a different server. The proxy provides the resource either by connecting to the specified server or by serving it from a cache. In some cases, the proxy may alter the client’s request or the server’s response for various purposes. And the source can not identify the real questionaire.