No, we don’t support (remote) port forwarding as that would allow people to hide anonymous servers behind our services.

The sending of email with smtp/esmtp has been blocked due to spammers abusing our services. You can still send email with webmail services.

A virtual private network (VPN) is a computer network secured with encryption and other security features. A VPN creates a virtual “tunnel” through which your data travels from your computer, over the Internet, to the VPN hardware at blackVPN. A benefit with using an encrypted VPN is that the “tunnel” protects your data from being “overheard” as it passes over the public Internet. Another is that, when using a VPN connection, your computer “appears” as if it was part of blackVPN’s network. In short, VPN gives extremely secure connections through the Internet which is almost impossible for someone to tap or interfere with, and it also hides your IP. If anyone ‘listens’ to the VPN communications, they will not understand it because all the data is encrypted. In addition, VPN’s monitor their traffic in very sophisticated ways that ensure packets never get altered while traveling across the public network. Encryption and data verification is CPU intensive.

PPTP is an old technology with low security that should only be used when nothing else is available or on old devices that only support PPTP. All versions of Windows, Mac OS X, Linux and most mobile systems have built in support for PPTP.

L2TP/IPSec is the choice for your mobile device. Both iOS (iPhone, iPad) and Android have native support for it aswell as Windows and Mac OS X, so you don’t have to install anything. It is also more secure and stable then PPTP.

OpenVPN is the choice for all power users of Windows, Mac OS X and Linux/BSD. If you need a fast and secure vpn, OpenVPN is the best choice and its auto reconnect also gives it unsurpassed stability.

Yes, this is one of the purposes with our services.

We mean that your real IP cannot be seen by any site or service you visit/use. Or when you download something then the only IP visible is the IP of one of our servers.

*Javascript and Flash can see the IP assigned to your Ethernet or Wifi card if they are allowed to run. This means that if you are not behind a router that assigns you RFC1918 ips your real ip can be seen.

No, we don’t log your surfing behavior and which connections you make from our servers to others. We believe in the ideal that people have the right to enjoy privacy and more anonymity as they wish.

On all of our servers we anonymize connection logs so that your real IP is never logged anywhere.

UK/US/SG Servers:

Although we do not monitor the traffic, incoming or outgoing connections of our users we may assign users to a unique IP address and log which user was assigned which IP address at a given time. If we receive a copyright violation notice from the appropriate copyright holder then we will forward the violation to the offending user and may terminate their account. We therefore ask our users not to distribute or transmit material, which violates the copyright laws in either your country or the country in which our Service is hosted.

All Servers:

We log the time of connection and disconnection to our service
Bandwidth utilization of each user

Yes and No. You can’t use it directly as the AppleTV can’t run any VPN software. There are two options for this:
1. Use a router that can act as a PPTP or OpenVPN VPN Client.
2. Setup the VPN on your computer, enable internet connection sharing and then use the computer as a router.

No, trial accounts gets abused. Instead we offer a 14 day money back guarantee, no questions asked. Just let us know within 14 days and we will issue a full refund.

The MD5 Message-Digest Algorithm is a widely used cryptographic hash function that produces a 128-bit(16-byte) hash value.

The MD5 hash (or checksum) functions as a compact digital fingerprint of a file. As with all such hashing algorithms, there is theoretically an unlimited number of files that will have any given MD5 hash. However, it is unlikely that any two non-identical files will have the same MD5 hash.

Virtually any change to a file will cause its MD5 hash to change; therefore md5sum is used to verify the integrity of files. Most commonly, md5sum is used to verify that a file has not changed as a result of file transfer, disk error or meddling.

Linux: Download both the file and the corresponding .md5 to the same directory.
Start a terminal and go to the correct directory.
Run: md5sum -c filename.md5

Mac OS X: Download both the file and the corresponding .md5 to the same directory.
Start a terminal (Applications -> utilities -> Terminal) and go to the correct directory.
Run: md5 -r filename
Run: more filename.md5
Compare the hashes and make sure that they are identical

Windows: There is no built in md5 checker in Windows. You need to download a tool for this. One out of many is http://www.winmd5.com/

FOLLOW US ON TWITTER

    SHOW US YOUR SUPPORT