More stories

  • in

    T-Mobile beats Q4 expectations, ends 2020 with 102 million customers

    T-Mobile delivered better-than-expected fourth quarter financial results on Thursday, with the wireless carrier touting record postpaid phone net customer additions and progress in post-merger synergies with Sprint.

    T-Mobile said Q4 earnings were $750 million, or 60 cents per share, on revenue of $20.3 billion. Wall Street was looking for fourth-quarter earnings of 51 cents a share on revenue of $19.9 billion.
    The carrier added 1.7 million net additions in the fourth quarter, along with 1.6 million postpaid. T-Mobile’s postpaid churn came in at 1.03%, a slight increase for the company.
    For the year, T-Mobile said non-GAAP earnings came to $2.65 per share on revenue of $68.4 billion. Analysts were expecting the company to report fiscal 2020 revenue of $67.7 billion on earnings of $2.70 per share.
    By the numbers:
    The company ended the quarter and fiscal year with 102.1 million customers.
    For full-year 2020, total net customer additions were 5.6 million, with 5.5 million postpaid.
    T-Mobile added 824,000 branded postpaid phone net additions in Q4, and 2.2 million for the full year.
    Branded prepaid additions were 84,000 in Q4.
    Service revenue in the fourth quarter was $14.2 billion and $50.4 billion in full-year 2020, driven by the Sprint merger.
    T-Mobile said it covers 280 million people with Extended Range 5G.
    For 2021, T-Mobile said it plans to add 4 million to 4.7 million branded postpaid net customers. Adjusted EBITDA will be between $26.5 billion and $27 billion.
    On its Sprint synergies, the company said it delivered $1.3 billion of synergies in full-year 2020, exceeding its guidance from last quarter. Meanwhile, customer network migrations began in the fourth quarter and more than 4 million have been completed, the carrier said. Once the migrations are complete, T-Mobile will fully decommission and shut down the Sprint network.
    “These results show that we’re pulling way ahead of the pack on what matters – overall 5G network performance – and executing to stay ahead,” said Mike Sievert, CEO of T-Mobile. “2020 was quite simply our best year yet, with our highest ever total postpaid net additions of 5.5 million. Our team delivered – leading the industry on customer growth, while being the only major player to grow profitability as well, with our synergy-backed business model.”

    Shares of T-Mobile were down just over 1% after hours.

    Tech Earnings More

  • in

    The best cheap web hosting in 2021

    Can you really buy a month’s worth of quality web hosting for less than the price of a Starbucks Grande cappuccino? Indeed you can, as we discovered when researching the web hosting services in this buyer’s guide. The average advertised monthly price for the 10 hosting providers we looked at is a low, low $3.19 — just add content.

    We also discovered, when we looked a little closer at the details of those cheap web hosting plans, that three of the immutable laws of bargains still apply here. If a deal sounds too good to be true, it probably is. Always check the fine print. And, most important of all: You get what you pay for.
    You’re an ideal candidate for the services we review here if you already have experience with web hosting and don’t need much hand-holding. If you lack those technical skills, consider hiring a designer/consultant who has the requisite background, and let them help with the comparison.
    The listings that follow offer a starting point for your research and do not represent hands-on reviews or formal recommendations. All information was accurate as of February 2021, but details can change on a moment’s notice. Because the details of promotional prices and hosting plans vary so greatly, we haven’t included prices in the capsule listings that follow and instead recommend that you compare prices and plans carefully based on your long-term needs. Our goal is to provide the information you need to build a shortlist and then evaluate and compare alternatives, ideally using the trial period each provider offers.

    Makes it easy to get started

    Customer Support: Phone, chat, ticket available 24/7/365
    Backup: Complimentary backups are provided for accounts up to 50GB “on a best effort basis.” Each weekday backup is kept for seven days, each Sunday backup is retained for a month. Options for manual backups include full server, home directory, MySQL databases, and email forwarders/filters.
    Security: SSL support is free, via Let’s Encrypt, and two-factor authentication is standard. Out-of-date version detection is included, with WordPress, Joomla, and Drupal installations patched automatically.
    A2 (the name is a shout-out to the company’s home in Ann Arbor, Michigan) makes it easy to get started, with free migration, one-click Softaculous installers for a wide range of software packages, and “optimized” WordPress installations. Website building software is included with all shared plans. Non-promo pricing of the high-performance Turbo Boost and Turbo Max tiers ranges from $21 to $26 a month, compared to $11 for the Startup tier.
    View Now at A2 Hosting

    Platform runs two million website

    Customer Support: Available via call and chat, 24/7.
    Backup: Automated backups are not free; instead, you can pay $2.99 per month for Codeguard, a site backup tool that does unlimited daily backups of your websites.
    Security: Two-factor authentication is standard, and free SSL certificates are offered via Let’s Encrypt.
    In business since 2005, Bluehost claims that its platform runs two million websites. Shared hosting plans above the basic level include one Microsoft Office 365 Email Essentials license, which is free for the first month. The company offers three tiers of managed WordPress hosting, with hundreds of free WordPress themes and a high-end option geared to online shopping. For $150, you can transfer up to five sites and up to 20 email accounts from another provider. The Weebly website builder is standard for all customers.
    View Now at Bluehost

    Full range of higher-end plans available too

    Customer Support: Support is available 24/7, but live chat is limited to 5:30am to 9:30pm (Pacific Time) and phone support is via callback.
    Backup: Automated daily backups are retained for two weeks.
    Security: Two-factor authentication is standard. Let’s Encrypt SSL certificates are free on shared plans; Comodo certificates start at $15 a year. The DreamShield malware scanner costs $3 per month per domain, and you’ll pay $199 for assistance in cleaning up a hacked website.
    You won’t find any introductory pricing here. Instead, the low prices come with three-year commitments. Shared plans come in only two options: Starter (one website, email is an extra charge) and Unlimited (as many websites and email accounts as you wish). For those shared plans, there’s a 97-day money-back guarantee. The company also has a full range of higher-end plans, including managed WordPress, VPS, and dedicated server offerings. Site transfer is included with managed WordPress plans and costs $99 with shared hosting plans.
    View Now at DreamHost

    Generic hosting provider

    Customer Support: Phone and live chat options are available 24/7/365 via phone and LiveChat.
    Backup: Daily CodeGuard backups and weekly offsite backups are included.
    Security: Two-factor authentication is not available. Server monitoring is standard.
    If we were looking for a generic hosting provider, we found it here. The prices are competitive, and you get free site transfers and a decent website builder package with every plan. The “QuickInstall” feature allows one-click access to tons of apps. We like the no-contract policy and the 45-day money-back guarantee.
    View Now at HostGator

    Absolute lowest introductory prices

    Customer Support: We were slightly put off by the lack of live chat for new customer inquiries, and a customer service rep confirmed that phone service is not available; instead, customers get live chat and email support options.
    Backup: Daily backups are standard.
    Security: Two-factor authentication is not available. Most of the security features they highlight are intended to protect against DDoS attacks.
    Hostinger has some of the absolute lowest introductory prices we’ve seen, with limited-time offers starting at 99 cents per month. Their website builder is limited, but the templates we saw looked well designed. They also boast of cutting-edge “Next Generation Tech,” such as “customizable server-level caching solutions that can serve up to 3x more requests per second” and data centers in seven global locations. That’s an odd mix, but we suspect it will be appealing to tech-driven bargain hunters.
    View Now at Hostinger

    Entry-level tiers include strict limitations

    Customer Support: The support center offers an almost overwhelming number of options, but traditional chat, phone, and ticket options are available for customers.
    Backup: Automated backups are an option, “available at checkout.”
    Security: Two-factor authentication is standard.
    InMotion Hosting’s landing page features a list of reasonable price tags on a wide range of plans (“no hidden – anything”), with commitments to open source and investments in technology like PCI compliance, as well as the promise of a U.S.-based customer service team. Entry-level tiers include strict limitations on the number of websites and allowed storage. Management tools include a CPanel option that’s different from most. Free “no downtime” transfers are available. The BoldGrid website builder package is free with all plans, or you can pay $99 for a custom-built QuickStarter website with a promised 2-day turnaround.
    View Now at InMotion Hosting

    One-size-fits-all options perfect for SMBs

    Customer Support: 24/7 phone and chat support is standard.
    Backup: Backup plans are an extra-cost option, with Basic and Pro tiers ranging from $1.27 to $2.99 per month based on contract length.
    Security: Two-factor authentication is not available.
    iPage has been around for more than two decades and offers one-size-fits-all options that are perfect for any small business that has a hard time making decisions. The $1.99 per month starting rate resets to a not-too-painful $7.99 tariff when the introductory period ends. The free web-builder software offers hundreds of themes but supports a maximum of six pages. The VDeck control panel might confuse anyone expecting the generic CPanel option (see this review for a detailed comparison).
    View Now at iPage

    Reliable provider of low-cost domain name registration

    Customer Support: Support is quick via a chat and ticket system. We couldn’t find a phone number for support calls.
    Backup: This is the most thorough backup regimen we’ve seen, with a rotating schedule that retains the most recent six daily backups, three weekly backups, and 11 monthly backups. Email accounts are backed up, too.
    Security: Two-factor authentication (with TOTP support) is standard. SSL certificates are free for the first year.
    Wait, Namecheap does web hosting? As longtime customers, we had the same reaction, given the company’s long reputation as a reliable provider of low-cost domain name registration services (thus the name). But you will indeed find a full range of services here. The lowest tier is extremely basic, with no backups and metered bandwidth. But other offerings, especially the EasyWP managed WordPress plans, deliver a competitive mix of features and prices. Namecheap is famous for its Black Friday specials; if you’re attracted to their offerings, we suggest marking your calendar and checking for deals in late November.
    View Now at Namecheap

    Normal prices after the first year can cause sticker shock

    Customer Support: SiteGround offers 24/7 chat, phone options, and a ticket system. In our experience, the chat system offers extremely quick response times.
    Backup: Free daily backups are retained for 30 days; on-demand backups (up to five at a time) are available on the mid-high tiers.
    Security: Two-factor authentication is standard. Let’s Encrypt SSL support is free and standard. The company has a long history of attention to security and it shows in its approach to updates.
    Full disclosure: We’re longtime SiteGround customers, so our descriptions here are based on firsthand experience and not feature tables. The company’s introductory prices are attractive, but the normal prices after the first year can cause sticker shock for some. Higher tiers offer some impressive performance tweaking tools. One-click WordPress transfers are free; professional transfers (managed by an actual person) are also free above the basic tiers. A new client area offers “friendly site tools” with an easier interface for databases, email account creation, and other normally intimidating tasks. This interface can replace the traditional CPanel.
    View Now at SiteGround
    Is the price right?
    All the above web hosting providers are well-established companies, and at a glance, they all promise pretty much the same entry-level offerings. The cheapest plans offer shared hosting for an introductory price of a few dollars a month. So, what’s the catch?
    For starters, these plans offer storage space and bandwidth on servers that are shared with other customers. The more sites that share a single server, the more likely your visitors are to encounter slow performance; shared servers also offer a greater risk of security breaches.
    Some of the low, low prices you see on the landing page for these web hosting services are introductory offers. When the promotional period ends, the regular prices can be significantly higher. 

    Likewise, the low advertised price might require a lengthy commitment. At HostGator, for example, the advertised starting prices range from $2.75 to $5.95 a month, but when you click the Buy button, you’ll see that those rates are for a three-year contract. If you’d rather go for a month-to-month deal, the price ranges go up dramatically, to $10.95 to $16.95, which is also the price you agree to pay when the promo period ends.
    Another common gimmick is the “limited time” offer: Buy now before the price goes up! Some of the hosting providers we checked out included a countdown clock on the home page. When we went back a few days later for a second fact-checking pass, the countdown clock had been magically reset.
    Those prices might still be a good value, but you’ll have to dig a bit to make accurate long-term comparisons.
    Upsells and options
    Those dirt-cheap teaser rates are designed to lure you in, and some web hosting providers are not shy about making up the difference by charging extra for features like backup and site migration; here, too, you’ll have to factor those costs in before you can make an informed choice.
    A low-cost shared hosting plan is probably good enough for a personal website. It’s also adequate for a basic business site whose main purpose is to serve as an online calling card and a landing page for visitors who want to know more about your organization. It’s not a good choice for a site that occasionally needs to handle large spikes in traffic or e-commerce.
    If you choose a cheap plan, expect regular upsell offers for more full-featured (and significantly more expensive) plans. Those upsells come in a wide range of plans. Some of the most popular include these:
    Website builder tools Typically, you don’t get much hand-holding with these services, as you might with turnkey solutions like Wix, Squarespace, or Wordpress.com. Some hosting providers do offer wizard-driven tools that allow less technical sophisticated customers to build a site by pointing and clicking. DreamHost, for example, offers its theme-based Remixer tool as part of a shared hosting plan.
    Managed WordPress hosting Most of the companies listed here have a managed WordPress offering that insulates customers from the chore of managing the underlying web server or installing and maintaining their own WordPress instance. Most such offerings include a selection of ready-made themes; others include WordPress-oriented website builders.
    Virtual private servers (VPS) In the bare-bones shared hosting environments, multiple tenants share the hardware and software resources of a single server. In a VPS, multiple tenants share the physical server hardware, but each server instance is isolated from the others using virtualization software, with resources (memory and storage, for example) assigned directly to the VPS. This configuration ensures that performance remains consistent, regardless of what’s happening with other sites that share the physical server hardware. It also dramatically reduces the likelihood of security issues that can affect accounts in a shared hosting environment. This type of solution can be managed or unmanaged, and costs significantly more than a shared hosting plan. 
    Dedicated servers This is the most expensive option of all, with physical hardware dedicated to a specific customer and not shared with other accounts. This option is most appropriate for high-traffic websites that can’t afford any downtime, but the price is far from cheap. At A2 Hosting, for example, the non-promotional price for a managed dedicated server starts at $200 a month, compared to $70 for a managed VPS, and $11 for a basic shared hosting plan.
    Other evaluation criteria
    When choosing a hosting package, there’s more to consider than just a low price and a feature table packed with checkmarks. We considered a wide range of extra factors that can be crucial when it comes time to separate contenders on your shortlist of hosting providers.
    Let’s start with the most important factor of all: A money-back guarantee. Every provider we surveyed offers at least 30 days during which you can try the service risk-free. DreamHost has a 97-day “zero risk” guarantee for its shared hosting plans, and A2 Hosting offers a full refund for the first 30 days and a pro-rated refund for unused service after 30 days. We strongly recommend taking advantage of that trial period to test the following factors:
    Customer support How many contact options does the provider offer for the plan you’ve chosen? If phone support isn’t available and email and ticket-based systems are the primary mechanism for problem resolution, how quickly does the support team respond?
    Bandwidth and storage For shared hosting plans, most providers offer “unlimited” data transfers and storage, but there’s invariably a page full of fine print that requires you to abide by “reasonable” restrictions and acceptable-use policies. More expensive plans typically include hard limits on storage and monthly data transfer.
    Backup Every provider offers the ability to create manual backups and download them to local storage, but automated online backups are the most reliable way to recover from a disaster such as a sitewide compromise. Most hosting providers offer automatic backups, but some charge extra. Bluehost, for example, offers the Codeguard site-backup tool for an extra $2.99 per month. Be sure to check the retention policy to see how long backups are preserved.
    Performance As a rule, the less you pay for a shared hosting plan, the more likely you are to encounter slow page loads, because those low-cost plans typically cluster more shared accounts on the server. The simplest way to boost speed is to choose a higher-priced storage plan, especially one like A2 Hosting’s Turbo plan, which includes support for caching and HTTP/2. Also, look for content delivery network options such as Cloudflare.
    Security Every provider brags about its secure infrastructure, and as a solitary customer, it’s impossible to put those claims to the test. You can, however, look for basic security best practices. Does the provider offer multi-factor authentication? Are crucial software packages updated automatically, or are you required to stay on top of updates yourself? How easy is it to add SSL support, and how much does it cost to renew a certificate? Ask the support department whether they will assist if your website is hacked, and if so, how much the repair will cost.
    Email and domain options Several providers offer free domain registration as part of a hosting package, but of course, the cost of that registration is built into the bill for the plan itself. And don’t expect to find any loopholes: Every provider that we checked with will assess a fee to recover that registration cost if you cancel your plan and try to transfer the domain. In addition, you can expect basic web-based email options from every provider, with some offering more advanced features. If email is important, make sure to test those offerings during the free trial period.
    More resources:
    Susan Preston of Clearly Presentable, a New Mexico-based website and presentation design firm, provided research assistance for these listings.  

    ZDNet Recommends More

  • in

    Superfast broadband could add a surprising amount to the value of your home

    A government scheme that aimed to roll out faster broadband to ‘commercially unviable’ parts of the UK lead to a surge in home values of up to £3,500, according to a review published by the UK’s Department for Digital, Culture, Media & Sport.  
    The review found the superfast broadband program “led to an increase in house prices (of between £1,700 and £3,500) suggesting that buyers valued the technology.” The price rise was observed between 2012 and 2019. 
    “This estimate represents how much house buyers valued access to a superfast broadband connection, accounting for many of the programme’s indirect effects such as enabling greater remote working and reducing commuting times,” the government said.
    Superfast broadband is defined as a minimum of 30 megabits per second. But while those speeds are available to 96% of homes in the UK, only 60% of premises have taken up this level service, UK communications authority Ofcom reported in December. 
    Digital Secretary Oliver Dowden said in a statement today that this meant 11 million homes in the UK haven’t upgraded to superfast broadband, despite it being available. 
    “96% of us can now access superfast broadband, but 11 million homes are still missing out on faster speeds available in their area,” said Dowden. 
    “I encourage anyone fed up with slow loading times or shaky video calls to check with their provider or an online switching service and see if they can join the superfast lane.”

    Given the pandemic and the uptick in remote work and remote schooling, households should be looking at superfast broadband even without the increase in to a house’s value. 
    But if only 60% of households have taken up superfast broadband, what does this mean for the new £5 billion “Gigabit Britain” program that would enable 1,000 Mbps? As Ofcom recently noted, 20% or 4.7 million UK households struggled to pay for telecoms bills.  
    Initially, the plan was to bring gigabit speeds to the whole country by 2025, but the goal was recently revised to target 85% coverage by 2025. 
    The £5 billion was the government’s contribution to bringing Gigabit broadband to the 20% of the hardest to reach regions. The private sector would fund 80% of Gigabit coverage, while the the government would subsidise the remaining 20%.   
    According to Ofcom, Gigabit broadband is currently available to 7.9 million homes in the UK, amounting to about 27% coverage. 
    But the pandemic and new applications could mean Gigabit broadband would be in higher demand by the time it is rolled out more widely. Ofcom found that average monthly data used increased by 80% in two years to 429 GB per connection in 2020, up from 241 GB in 2018.   More

  • in

    NBN reconnects Mallacoota following Black Summer fire damage

    13 months after the residents of the East Gippsland town of Mallacoota were evacuated by the Royal Australian Navy to flee devastating bushfires, the town is able to use the NBN again.
    The company responsible for the National Broadband Network has spent the past twelve months restoring a 60 kilometre transit link to get the town back on the NBN.
    “Following the massive rebuild, approximately 1,000 premises in Mallacoota are now ready to connect to the National Broadband Network” Communications Minister Paul Fletcher said on Thursday.
    “The bushfires last year melted the backhaul cable which completely cut off connectivity to the community.
    “Following the fires, new fibre optic cable has been constructed underground, providing greater resilience than deploying via aerial cable.”
    The black summer bushfires of 2019-2020 impacted 1% of all NBN services, the company said in June last year.
    “12% (or 6,367 services) of all services impacted were directly impacted by fire over the duration of the bushfires,” the company said at the time.

    “The remaining services were impacted by power outages as a result of the bushfires.”
    In December, NBN unveiled its first disaster satellite service at Namadgi in the Australian Capital Territory.
    The broadband wholesaler said it wanted to have 95 sites operating by the end of 2020, including 18 across Victoria, but residents of New South Wales and the Northern Territory would need to wait until this year for the facilities.
    In May, Australia’s telco and network builders were pencilled in for AU$37 million that would be spent by the government to improve network resiliency against natural disasters.
    Related Coverage More

  • in

    Why an all-Australian public search engine is a ridiculous idea

    Image: eddygaleotti / Getty Images
    On Wednesday, someone over at the Greens Idea-Thinking Collective had a rush of blood to the head. Their solution to this whole tech company versus media company drama? A publicly owned and independent search engine.
    A statement from Greens spokesperson for media and communications Senator Sarah Hanson-Young called on the Morrison Government to investigate the establishment of a publicly-owned search engine.
    Let’s save everyone a great deal of bother. Here’s what building a non-profit Australian search engine would entail.
    At its core, a search engine is just a key-value database lookup. The key is your set of search terms. The values it returns are the URLs of web pages that contain those search terms.
    The sort order of those results is … well … OK, it’s a very complicated ranking function. It takes into account some secret-sauce perceived relevance and quality ratings, and returns a different sort order for different search terms.
    With sophisticated search engines, it even takes into account your location, knowledge of your interests, what other people have been searching for, and much more.
    You have to account for synonyms, where someone searching for “truck” probably also wants the results with “lorry”.

    You also have to account for context. Is a search for “cardinal” about the bird, or a sports team, or the senior clergy of the Catholic Church, or a compass direction, or a mathematical concept, or the 1963 film directed by Otto Preminger, or the 2017-2020 TV series, or the watch retailer in Stanmore, Sydney?
    Or the American indie pop duo founded by musicians Richard Davies and Eric Matthews in 1992?
    So it’s “just” a database lookup, but a really, really complicated one.
    Putting aside that complexity, and the fact that Google has a 22-year head start on understanding it, let’s look at the engineering.
    ‘First, download the internet …’
    Gathering all the data for your database is straightforward enough: Use web crawlers to download the entire internet. Or at least the bits of it that are visible on the World Wide Web. Then index it.
    Then re-do this for each website when it changes, which in the case of news websites is quite frequently.
    How much storage is this going to need? A lot. And we can even estimate that.
    It turns out that there’s a bit of set theory which tells us that the storage requirements for a key-value mapping are equivalent to the storage requirements for a value-key mapping for the same data set. (There will not be a question on this in the final exam.)
    We already have a reverse search engine that’s equivalent to this value-key mapping, one that starts with URLs and returns the things that we might search for on web pages — which is all the things on the web pages. It’s called the World Wide Web.
    So not only do you need to download the entire web for reference, you need the same amount of storage for the index.
    Yes, your storage needs for your search engine index are roughly 1.0 World Wide Webs, to a first approximation.
    That’s quite a bit of storage.
    Now do a Google search for “cardinal”. “About 271,000,000 results (0.83 seconds),” it said for me just now. That’s fast. In fact, it’s so fast there could not have been any disk access involved.
    Yes, you need to keep your 1.0 World Wide Webs of index data in RAM.
    Actually, you need to keep several replicas in RAM to cope with failures.
    That’s quite a bit of RAM.
    You could cut that down by only indexing part of the web, sure, but who would make the editorial decisions? And who would use it anyway?
    Those replicas of the index need to be geographically dispersed for redundancy, which means you need a WAN fast enough to sling around copies of the entire World Wide Web to replicate them.
    That’s quite a bit of network.
    Adding it all up, that’s quite expensive.
    Obviously, there will be ways to optimise this, but there will also need to be enough infrastructure to cope with the number of users. At least this gives us a rough idea of the scale of the infrastructure that’d be needed.
    Which brings us back to Senator Hanson-Young’s modest proposal.
    Who’s paying for this?
    “We need an independent search engine that is run in the public interest, not for the profit of a corporate giant,” she wrote.
    “It would mean Australians can search the internet with the peace of mind that their data is not being sold off to advertisers and corporations.”
    In other words, Hanson-Young is proposing that we build all this with government money, and therefore government project management.
    Even if it were outsourced to a private-sector vendor, it’d still be the government providing, you know, the governance.
    How well do we think the Australian government would handle that, given their past performance? Remember the NBN?
    One final point, relevant to the Greens’ worldview: How much energy do you think all this would burn?
    Maybe the current Australian government could end up building a coal-fired search engine.
    For mine, the most depressing aspect of all this is that such an outlandish idea made it all the way to a press release seemingly without being run by anyone with a clue.
    Here is a political party’s official spokesperson for media and communications publicly calling for an inquiry into an idea which could have been shot down during a quick coffee meeting with almost anyone who knows how search engines actually work. Disappointing.
    Anyway, senator, we’ve saved the government having to run an expensive inquiry process. Where should I send my invoice?
    Stilgherrian would like to thank the participants in the discussions that informed this article, who must remain anonymous.
    Related Coverage More

  • in

    Netgear Q4 rides Wi-Fi router, mesh networking upgrade cycle

    Netgear saw a 45% sales surge in the fourth quarter amid strong demand for new Wi-Fi 6 routers and mesh networking gear.
    The company reported fourth quarter earnings of 99 cents a share on revenue of $367.1 million, up 45% from a year ago. For 2020, Netgear reported earnings of $1.90 a share on revenue of $1.26 billion, up 25.7% from a year ago.
    Wall Street was looking for fourth quarter non-GAAP earnings of 84 cents a share on revenue of $346.3 million.
    Mesh networking vs. traditional Wi-Fi routers: What is best for your home office? | Remote work: 10 ways to upgrade your working from home setup
    Netgear CEO Patrick Lo said demand for its premium networking products is strong amid remote work and school arrangements during the COVID-19 pandemic. Lo said there is “rapid growth of a new premium segment that is defined by a Wi-Fi 6 mesh system with tri-band architecture.” Netgear, which is layering services on top of its hardware, also added 68,000 paid subscribers in the fourth quarter to end with 437,000.
    Recent products include:
    Netgear saw connected home sales surge 60% in the fourth quarter and SMBs were going for the company’s ProAV and work-from-home gear.

    As for the outlook, Netgear said first quarter revenue will be between $300 million and $315 million with non-GAAP operating margins between 8% and 9%. Netgear said there remains a lot of uncertainty in the market as well as transportation delays at its Southern California main distribution center.
    For the first quarter, Wall Street analysts were modeling revenue of $313.3 million.

    ZDNet Home Office Tours More

  • in

    The open-source Magma project will become 5G's Linux

    5G is one part hardware, one part standards — oh so many 5G standards, and one part software. Indeed, it wasn’t for 5G’s open-source technologies, 5G wouldn’t have gotten off the ground. Now, the software and hardware sides of 5G are getting closer together than ever with the cellular core, network software open-source stack Magma.

    Magma was developed by Facebook to help telecom operators deploy mobile networks quickly and easily. The project, which Facebook open-sourced in 2019, does this by providing a software-centric distributed mobile packet core and tools for automating network management. This containerized network function integrates with the existing back end of a mobile network and makes it easy to launch new services at the network edge.
    Magma operators can build and augment modern and efficient mobile networks at scale. It integrates with existing LTE and newly minted 5G networks. Several Magma community members are also collaborating in the Telecom Infra Project (TIP)’s Open Core Network project group. The plan is to define, build, test, and deploy core network products that integrate Magma with TIP Open Core disaggregated hardware and software solutions.
    The Linux Foundation will help oversee this new stage in Magma’s organizational future. Magma will be managed under a neutral governance framework at the Linux Foundation. Arm, Deutsche Telekom, Facebook, FreedomFi, Qualcomm, the Institute of Wireless Internet of Things at Northeastern University, the OpenAirInterface(OAI)  Software Alliance, and the Open Infrastructure Foundation (OIF). 
    You may ask, since Magma is already working with OIF, which is something of a Linux Foundation rival, why Magma will be working with both? Arpit Joshipura, the Linux Foundation’s general manager of Networking, Edge, and IoT, explained, “Magma has gotten great community support from several ecosystem players and foundations including OIF, OAI etc. What we are announcing today is the next evolution of the project where the actual hosting of the project is being set up under the Linux Foundation with neutral governance that has been accepted by the community for a long time. OIF, OAI, and LF will work with their communities of Software Developers to contribute to Magma’s core project.”
    Even if you’re already involved in 5G development and deployment you may not know much about Magma. You will. Joshipura said, “Magama provides application functions like Mobile Core that are complementary to existing telecom and edge open-source software like Open Network Automation Platform (ONAP) or Akraino.” 
    Magma will provide these features : 

    Allow operators to expand capacity and reach by using LTE, 5G, Wi-Fi, and Citizens Broadband Radio Service (CBRS).

    Allowing operators to offer cellular service without vendor lock-in with a modern, open-source core network.

    Enabling operators to manage their networks more efficiently with more automation, less downtime, better predictability, and more agility to add new services and applications.

    Enabling federation between existing mobile network operators (MNO)s and new infrastructure providers to augment mobile network infrastructure more efficiently.

    Supporting open source 5G technology and incubating future wireless network use cases like Private 5G,  Integrated Access Backhaul (IAB), Augmented Networks, and Non-Terrestrial Networks (NTN).

    Boris Renski, co-founder and CEO of FreedomFi, which uses Magma to enable anyone to build low cost, private, long-range, reliable, and secure 4G LTE and 5G networks, loves this plan. “We’ve been contributing to Magma upstream and doing customer deployments for over a year now and have built 20+ Private LTE networks using Magma.”
    Renski sees “Magma turning into what we believe is quickly becoming the Linux of the telecom network cores.” Further, “With industry giants like Arm and Qualcomm joining the effort and helping ensure compatibility of Magma with their platforms, we expect that other radio access network (RAN) and OSS vendors will rally around the effort to help further accelerate adoption.”
    Qualcomm believes this is happening too. Douglas Knisely, Qualcomm engineer, principal said, “Qualcomm strongly supports the evolution of the Magma core network efforts into a broader coalition among the key founding and contributing projects. This effort builds on the collaboration activities and code contributions from OAI into the Magma project and promotes the harmonization of a common 5G Core Network reference architecture, internal structure, APIs, and interfaces for all of the emerging 5G open source projects in the industry.”
    It’s not just vendors that see Magma’s potential. “Magma is one of the most exciting projects I’ve seen in years. In our world, connectivity is directly linked to progress, and Magma’s mission to improve network access for the under-connected is inspiring and meaningful,” said Jonathan Bryce, the OIF’s Executive Director.
    Want to get involved? You can join Magma at its Github. 5G’s future is waiting for you.
    Related Stories: More

  • in

    What is a VPN and how does it work? Your guide to internet privacy and security

    Whether you’re in corporate office or home office, on the road or in your home, a VPN is one of the best ways to protect yourself on the internet. How effective are VPNs? What’s the best one for you? What are the downsides? Our executive guide will answer all your VPN-related questions — including a few you probably haven’t thought to ask.
    Also: Best VPN services for 2021: Safe and fast don’t come for free
    What is a VPN?
    VPN is an acronym for Virtual Private Network. The purpose of a VPN is to provide you with security and privacy as you communicate over the internet.
    Here’s the problem with the internet: It’s inherently insecure. When the internet was first designed, the priority was to be able to send packets (chunks of data) as reliably as possible. Networking across the country and the world was relatively new, and nodes often went down. Most of the internet’s core protocols (methods of communicating) were designed to route around failure, rather than secure data.
    The applications you’re accustomed to using, whether email, web, messaging, Facebook, etc., are all built on top of that Internet Protocol (IP) core. While some standards have developed, not all internet apps are secure. Many still send their information without any security or privacy protection whatsoever.
    This leaves any internet user vulnerable to criminals who might steal your banking or credit card information, governments who might want to eavesdrop on their citizens, and other internet users who might want to spy on you for a whole range of nefarious reasons.
    A VPN creates a private tunnel over the open internet. The idea is that everything you send is encapsulated in this private communications channel and encrypted so — even if your packets are intercepted — they can’t be deciphered. VPNs are very powerful and important tools to protect yourself and your data, but they do have limitations.
    How does a VPN work?

    Let’s start with the basic idea of internet communication. Suppose you’re at your desk and you want to access a website like ZDNet. To do this, your computer initiates a request by sending some packets. If you’re in an office, those packets often travel through switches and routers on your LAN before they are transferred to the public internet through a router.
    Once on the public internet, those packets travel through a bunch of computers. A separate request is made to a series of name servers to translate the DNS name ZDNet.com to an IP address. That information is sent back to your browser, which then sends the request, again, through a bunch of computers on the public internet. Eventually, it reaches the ZDNet infrastructure, which also routes those packets, grabs a web page (which is a bunch of separate elements), and sends all that back to you.
    Each internet request usually results in a whole series of communication events between multiple points. The way a VPN works is by encrypting those packets at the originating point, often hiding not only the data but also the information about your originating IP address. The VPN software on your end then sends those packets to the VPN server at some destination point, decrypting that information.
    One of the most important issues in understanding the limits of VPNs is understanding where the endpoint of the VPN server resides. We’ll talk about that next.
    What are the two main types of VPNs?
    Most of us are familiar with the concept of a LAN, a local area network. That’s the private network inside of one physical location — be it a home, a corporate building, or a campus. But many businesses don’t run out of one location. They have branch offices, departments, and divisions that are geographically dispersed.
    In many cases, each of these offices also has LANs. But how do the LANs connect? For some very specialized solutions, companies lease private lines to connect the offices. That can be very expensive. Instead, most companies opt to geographically connect separated private LANs over the public internet. To protect their data, they set up VPNs between offices, encrypting the data as it traverses the public internet.
    This is corporate or enterprise VPN, and it’s characterized by the same organization controlling both endpoints of the VPN. If your company controls the originating point (say a sales office) and the endpoint (like a VPN server at your corporate HQ), you can be quite well assured (unless there’s a bug) that your data is securely transmitted.
    The second type of VPN is a consumer VPN. This is for those of you who compute in hotels or at coffee shops and connect to web applications like social networks, email, banks, or shopping sites. Consumer VPN services help ensure that those communications are protected.
    What does a consumer VPN service do?
    A consumer VPN service is, fundamentally, a software-as-a-service (SaaS) offering. The VPN service provides a secure tunnel between your computing device (whether laptop, phone, or tablet) and the provider’s data center.
    This is important to understand. Consumer VPN services protect your transmission from your location to their location, not from your location to the destination application you’re using. If you think about it, this makes sense: A consumer VPN service is operated by a completely different company than, for example, Facebook or your bank.
    The VPN service gives you an app that you run on your local device, which encrypts your data, and it travels in its encrypted form through a tunnel to the VPN service provider’s infrastructure. At that point, the data is decrypted and sent on its way.
    Two things happen here: First, if you’re using an https connection, your data is encrypted by your browser and then by your VPN app. At the VPN data center, your data is decrypted only once, leaving the original encryption provided by the browser intact. That encrypted data then goes on to the destination application, like your bank.
    The second thing that happens is that the web application you’re talking to does not get to see your IP address. Instead, it sees an IP address owned by the VPN service. This allows you some level of anonymous networking. This IP spoofing is also used to trick applications into thinking you’re located in a different region or even a different country than you are located in. There are reasons (both illegal and legal) to do this. We’ll discuss that in a bit.
    When should I use a VPN?

    We’ve already discussed the use of a VPN when connecting offices. Any time you have two LANs that need to link over the public internet, you should consider using VPN technology or an equivalent method of enterprise protection. In this case, the VPN software will probably run in a router, a server, or a dedicated VPN server hardware appliance.
    We talked about two use cases above for consumer VPN services: Protecting your data and spoofing your location. We’ll talk more about location spoofing later, so let’s just focus on data protection for now.
    When you’re away from home or the office and you connect to the internet, you’ll most often be doing so via Wi-Fi provided by your hotel or the restaurant, library, or coffee shop you’re working out of at that moment. Sometimes, Wi-Fi has a password. Other times, it will be completely open. In either case, you have no idea who else is accessing that network, and therefore, you have no idea who might be snooping on your traffic.
    I recommend always using a VPN when using someone else’s Wi-Fi network. Here’s a good rule of thumb: If you’re away from the office or home, and you’re using someone else’s Wi-Fi (even that of a family member or a friend, because you never know if they’ve been compromised), use a VPN. It’s particularly important if you’re accessing a service that has personally-identifying information. Remember, a lot goes on behind the scenes, and you never really know if one or more of your apps are authenticating in the background and putting your information at risk.
    Another reason you might choose to use a VPN is if you have something to hide. This isn’t just about folks doing things they shouldn’t do. Sometimes people really need to hide information. Take, for example, the person who is worried he or she might be discriminated against by an employer because of their sexual orientation or medical condition. Another example is a person who needs to go online but is concerned about revealing location information to a person in their life who might be a threat.
    And then, of course, there are those people in restrictive countries who need to hide their activity merely to gain access to the internet without potentially grave penalties.
    Are the free VPN services any good?
    There are some good free VPN services, but I avoid all free VPNs.
    Why? It costs quite a lot to provide the infrastructure to operate a VPN service, from the network pipes to the servers. That infrastructure has to be paid for somehow. If it’s not paid for by user fees, it’s likely to be paid for by advertising, data gathering, or some nastier reason.
    Here’s another reason not to use a free service, and this one is a lot scarier: Malware providers and criminal organizations have set up free VPN services that not only don’t protect you but actively harvest personal information and either use it or sell it to the highest bidder. Instead of being protected, you’re being plundered.
    What’s the best way to choose a VPN service?
    To be fair, not all pay VPN services are legitimate, either. It’s important to be careful about which you choose. I’ve put together an always up-to-date directory of quality VPN providers. Some are better than others (and that’s reflected in their ratings). But all are legitimate companies that provide quality service.
    Beyond my directory, it’s always good practice to Google a company or product name and read the user reviews. If you see a huge number of old complaints or new complaints suddenly start showing up, it might be that there’s been a change of management or policies. When I’m looking for a service, I always base my decision partially on professional reviews and partially based on the tone of user reviews.
    Finally, be sure to choose a service with the capabilities that meet your needs. You may need one or more features only provided by certain services. So, think through your needs as you make a decision.
    Can a VPN guarantee my privacy?
    Oh, heck no. A VPN can help make sure you’re not snooped on when connecting between your computer and a website. But the website itself is quite capable of some serious privacy violations. For example, a VPN can’t protect you against a website setting a tracking cookie that will tell other websites about you. A VPN can’t protect you against a website recording information about products you’re interested in. A VPN can’t protect you against a website that sells your email address to list brokers. Yada, yada, yada.
    A VPN does help protect you in the situations we’ve discussed in previous sections. But don’t expect a VPN to be a magical privacy shield that will keep everything you do private and confidential. There are many, many ways your privacy can be compromised, and a VPN will be of only partial help.
    Also: A VPN will not save you from government surveillance
    Will VPN software slow down my computer?
    That would be a definite maybe. Here’s the thing: Back in the day, the process of encrypting and decrypting packets would take a toll on CPU performance. Most current CPUs are now fast enough that most crypto algorithms can run without much of an impact on processor performance.
    However, network performance is another thing entirely. First, keep in mind that if you’re using a VPN, you’re probably using it at a public location. That public Wi-Fi service is likely to range in performance somewhere between “meh” and unusable. So, just the fact that you’re remotely working on a mediocre network will reduce performance. But then, if you connect to a VPN in a different country, the connection between countries is also likely to degrade network performance. Server locations matter.
    My rule of thumb is to use a domestic VPN and connect to servers as close to my location as possible. That said, I have had good nights and bad nights getting online. In my recent trip, I found most hotels’ networks to become unusable after about 9pm. My theory is that many of the guests were watching Netflix at that time, completely clogging the hotels’ pipes.
    Also: How to use a VPN to protect your internet privacy
    Do VPN service providers limit usage and how?
    Some do. Some don’t. Look at that directory I mentioned earlier because that’s one of the factors where a service might lose some points.
    Some VPN services will limit the total amount of data you can send and receive, either in one connection session or over a month. Other VPN services will limit the speed of the data, effectively sharing less of their pipe with you than might be optimal. That could slow your browsing experience to a crawl or completely prevent you from watching streaming video.
    Usually, it’s the free services that throttle your usage in these ways. Some paid services will offer a trial, where you can transmit up to a certain data cap before being asked to sign up as a paying customer. That’s actually pretty cool because it gives you a chance to try out the performance of their service before paying, but it also gives the vendor a chance to make the money necessary to operate the service.
    Many VPN services claim that if you pay their fee, they’ll provide you unlimited data transmission and won’t throttle your speeds. Generally, this is true, but I’ll give you my standard “unlimited bandwidth” warning: It’s been my experience that when a vendor says something is “unlimited,” it’s almost always limited. Somewhere, there will be a note in the fine print or terms of service that allows the vendor to limit you in some way. It pays to read those agreements.
    Also: Why free VPNs are not a risk worth taking

    How private are VPNs? Do they log everything I do?
    In my VPN directory, I tracked two types of logging. The first is whether they log traffic, DNS requests, and IP addresses. This is pretty nasty stuff. If a VPN service logs this, they would have the information you might choose to hide, like sites you visit, locations where you are, and possibly even information you might be sending.
    Although the use of these services will still protect you from Wi-Fi spies in your hotel or restaurant, I can’t recommend signing up for any service that does DNS, traffic, or IP logging. There are better, more private options.
    The second type of logging is more benign. VPN services that log bandwidth usage and connection timestamp data usually do so either to tune their own systems or manage any abuse of their services.
    I have less of a concern with services that just monitor bandwidth usage, as long as they don’t store any specifics. That said, we gave top marks to those services that don’t do any logging. When I choose a VPN service, those are the services I pick for my use.
    What do net neutrality changes mean for my VPN usage?
    Net neutrality has been severely under fire in the US. The Federal Communications Commission (FCC) has eliminated many of the consumer protections against internet service providers (ISPs) harvesting traffic data and selling that data to advertisers, or worse. 
    This could be bad. I’m not terribly concerned if Comcast discovers my secret passion for muscle cars and I get more ads for car customizing kits. It might be annoying, but I’m not doing anything I want to hide. Where the problem could occur is if ISPs start inserting their own ads in place of ads by, say, ZDNet. That could cut off the revenue that keeps websites alive, and that could have very serious repercussions.
    As for personal use and whether you should use a VPN at home because of net neutrality, I don’t think we’re there… yet. Certainly, if you’re working on confidential information and connecting to work, you should use a VPN. But we haven’t yet seen any evidence of ISPs being so intrusive that always-on VPNs are required at home.
    Stay tuned to this guide, because if that changes, we’ll let you know.
    Is it legal to use a VPN?
    That depends. VPN use is legal in most countries, but, according to VPN provider CyberGhost, VPN use is illegal in the United Arab Emirates, Turkey, China, Iran, North Korea, Saudi Arabia, and Russia. Vladimir Putin has recently banned VPN use in Russia. Also, be aware that the so-called proxy server alternative to VPNs is also illegal in many countries, which consider any form of IP spoofing to be illegal, not just those services labeled as VPN.
    Restrictions vary, as do penalties. China allows certain approved VPNs. In the UAE, if you use a VPN, you could go to jail or be fined a minimum of more than the equivalent of $100,000.
    Definitely research this before you visit a country. Many travelers mistakenly believe that just because they’re not citizens, and all they’re doing is linking back to a corporate system, they should be able to have unrestricted use of VPN software. This is a mistake.
    The bottom line: Check the laws of the country you’re in before connecting. It’s also a good idea to check with your VPN provider, both for insight as to whether it knows if there are issues and whether it’ll support connectivity from the country you’re visiting.
    Do I need to use a VPN if my hotel has a wired internet connection?
    Yes. It is almost totally unlikely that each room is on a dedicated subnet, so that means packets are traveling across a network shared by other guests. In addition, you never know whether someone in the front office has set up a packet sniffer for the express purpose of mining guest information.
    So, yes, use a VPN, even if there’s a hard-wired connection to the wall.
    Will a VPN service help me connect securely to my office network?
    If you’re trying to connect to your on-premises corporate network, you’ll most likely be assigned a VPN application by your IT department. This will allow you to establish a point-to-point connection between your local device and a server owned and operated by your company.
    But, if your company is cloud-based, and you’re connecting to SaaS applications like Salesforce or Google, you should probably use a VPN service, since you’re not actually connecting to your company but instead to a public cloud application.
    If your IT department does not specifically identify a VPN service you should use for accessing their public cloud applications, definitely look at our VPN directory and choose one of the higher-rated service providers.
    Can I get away with a VPN app, or do I need to bring my own router/bridge/dongle?
    Let’s talk about what happens when you use a VPN app on your computer or mobile device. Any VPN app will require an existing network connection to be able to connect to the VPN service provider. This means that even if you set your VPN app to automatically launch when your device boots, there will be a period when your computer is connected to the internet directly, not through your VPN.
    Some background services can send information across that initial, unsecured connection before the VPN loads. To be fair, the risk is relatively minor for most usage profiles. If you’re establishing a connection automatically to your corporate server, you will want to check with your IT team about how they want you to set things up.
    If you are interested in an added level of protection, there are intriguing gadgets called Tiny Hardware Firewalls. These devices range from about $30 to $70 and connect via a network port or a USB slot to your laptop. They make the initial network connection, and so your computer’s communication is always blocked before it calls out to the internet.
    Should I use a VPN on my phone or tablet?
    Both Android and iOS come with basic VPN capabilities to allow you to securely connect to your corporate networks. Your IT organization will generally advise you when you should use this feature, but as we’ve discussed, when away from your home or office, and especially if you’re using an open, public Wi-Fi connection, you should.
    If you’re connecting to web applications like email or Facebook, you should consider using a VPN service — particularly if you’re connecting via an open Wi-Fi network. Most good VPN services offer both iOS and Android clients.
    Do I need a VPN if I’m connecting my phone via LTE?
    That depends. Once again, your corporate IT department will let you know their policy for connection directly to their corporate network. Usually, you’ll use the VPN client built into your device’s operating system for that.
    But here’s the thing: It’s up to how much you trust your carrier, where you’re located in the world, and how secure you want to be. In the US, the carriers (net neutrality notwithstanding) can generally be relied upon to provide a secure connection from your phone to their network.
    That said, it is possible to compromise wireless phone service with a man-in-the-middle attack. This situation occurs when a malevolent actor places a device designed to confuse your phone and cause your phone to connect to what it thinks is the phone network, but, in fact, it’s a device designed for spying.
    Outside the US, it depends on what country you’re in. If you are really concerned about security, simply avoid bringing any devices into a foreign nation that you intend to use after your trip. Those devices can be compromised in the country or during customs inspections.
    Likewise, if you’re connecting via a nation’s local carrier, that carrier may be intercepting your traffic, particularly if you’re a non-native of that nation. In that situation, if you must connect back to applications and services at home, using a VPN is quite literally the least you can do. Also, keep in mind that if you use your phone’s hotspot to connect your computer to the internet, you’ll want to use a VPN on your computer as well.
    Finally, it’s worth reminding you, as we covered earlier in this guide, that some countries consider VPN use illegal. If you’re planning on traveling, be sure to research local laws exhaustively.
    What happens if a VPN connection fails while I’m on a remote connection?
    A lot depends on what VPN you’re using, how it’s set up, and where you’re connecting. That said, let’s look at the most likely scenario.
    Recall that when you’re online and connected to an internet application through a VPN, a few things are happening: Your data from your computer to the VPN service is encrypted by the VPN. Your data from the VPN service to the internet application may or may not be encrypted via https, but it’s not encrypted by the VPN service. And your IP address is spoofed. The online application sees the IP address of the VPN service, not of your laptop.
    When a VPN connection drops, you might just lose your connection. But because the internet is very good at routing around failures, what is more likely to happen is your computer will reconnect to the internet application, simply bypassing the VPN service. That means that — on failure — your local IP address may “leak out” and be logged by the internet application, and your data may be open to local Wi-Fi hackers at your hotel or wherever you’re doing your computing.
    There is a reasonably robust solution to that problem, and that’s next.
    What does a VPN kill switch do?
    Put simply, a VPN kill switch kills your internet connection if it detects that your VPN’s connection has failed. There are generally two types of VPN kill switches.
    The first runs in the VPN client app on your computer, so if the VPN connection fails while the VPN client app is running, that VPN client app can turn off the computer or mobile device’s internet connection. However, if your VPN connection has failed because the VPN client app itself crashed, then the kill switch may not work, and your IP and data may leak onto the internet.
    The second type of VPN kill switch is at the operating system level. These are usually driver-level systems that run whether or not the VPN application is running. As such, they provide a bit more protection for your surfing activities.
    Given that so many VPN products we reviewed in our directory support a kill switch, we recommend choosing a client with a kill switch feature. There may be a slight annoyance if you lose your connection, but that’s more than made up for in the added security.
    What do all those protocol names mean and which one should I choose?
    If you’ve been shopping for a VPN service, you’ve undoubtedly come across a bunch of names like SSL, OpenVPN, SSTP, L2TP/IPSec, PPP, PPTP, IKEv2/IPSec, SOCKS5, and more. These are all communication protocols. They are, essentially, the name of the method by which your communication is encrypted and packaged for tunneling to the VPN provider.
    There is a lot of debate among security purists about which protocol is better. Some of the protocols (like PPP and its tunneling variant, PPTP) are old and have been compromised. Others, like SSTP, are proprietary to one company or another.
    My recommendation — and the protocol I most often choose to use — is OpenVPN. OpenVPN is a non-proprietary, open-source implementation of a VPN communication layer protocol. It’s well-understood, well-regarded, generally quite secure, and robust. Also, it has the benefit of being able to communicate over port 443, which is the standard port for https communication, which means almost all firewalls will allow OpenVPN traffic — and most won’t even be able to detect that a VPN is being used.
    Yes, there are certainly other protocol choices, even some that might be more appropriate than OpenVPN in certain situations. But if that’s the case, either you’ve already made that decision, or your IT organization has specified a specific protocol you should use. As a default, however, if you’re not sure what to look for, look for OpenVPN.
    What does it mean when a VPN service talks about simultaneous connections?
    The term “simultaneous connections” generally refers to the number of devices that can be connected to the VPN service and talk to the internet at once. For example, when I was driving across the country and working in my hotel room at night, I often had both my MacBook Pro and iPad connected to the internet.
    I used the MacBook Pro for writing, keeping the iPad open to do searches and find supporting information. Both of these were connected to the internet at one time. This was possible because the VPN service I was using allowed up to three connections open at once.
    This is also a good way to provide support for more than one family member on a single subscription. Generally, there’s no good reason for a VPN provider to allow less than two or three connections. If your provider only allows one, find another vendor. We gave extra points in our VPN directory to those vendors who allowed three or more connections.
    When should I choose either dynamic or static IP?
    Every device connected to the public internet is assigned an IP address. It’s like a phone number for each device. To be able to connect to the internet, each device needs such an address.
    The term “dynamic IP address” means that when a device connects to the internet, it’s given an IP address taken from a pool of available addresses. While it’s possible to get the same IP address on multiple connections, generally each time you connect, you’ll get a different address.
    If you want to hide your address from the web applications you’re connecting to, you’ll want a VPN service that provides dynamic IP addresses. In our directory, we list the number of IP addresses each service offers. By using a service with more available IP addresses, the chances of you getting a repeated IP are quite small.
    There are some minor disadvantages to using a dynamic IP. If someone who previously had the IP address you’ve been assigned did something nefarious on a service you use, the IP address might be banned. Usually, VPN providers are very careful about checking their IP addresses against blacklists, so the chances of this being a problem for you are slim.
    By contrast, a static IP address is an address that’s assigned to you and only you. Most often, this is needed if you’re running a server. Usually, static IP addresses are used in corporate situations and are generally not practical for general remote access, like from a hotel or coffee shop.
    Unless you have a specific application that you know needs a static IP, you’ll want to be assigned a new dynamic IP address for each VPN session you initiate.

    What does it mean when a VPN service talks about server switching?
    As we mentioned in the previous section, when you connect into a VPN service, you’re usually assigned a dynamic IP address from a pool of addresses. But where are those addresses located? They’re attached to servers located, usually, throughout the world.
    Most VPN services allow you to connect to server locations in many different countries. In our VPN directory, we list both the number of servers the service maintains, as well as the number of countries. By default, you’ll usually be assigned a server located in your home country, but if you want to obfuscate your location, you may want to connect to a server location in a different country.
    Server switching is a feature — offered by most VPN service providers — that allows you to change what region or country you’re going to connect to. Most providers allow you to switch as often as you’d like (although you usually have to disconnect, then change your configuration, and reconnect). This may be useful if you’re trying to hide your location, or if you’re running into some communications glitches on the server you’re currently using.
    Can I use a VPN to spoof my location or country of origin?
    Because the VPN server you’re connected to presents its IP address to whatever web application you’re using, by choosing a server located in a different country, you can represent your connection as if you’re in a different country. This may be illegal in certain regions, so use caution when doing this. 
    In my testing, some VPN providers were able to successfully hide their originating country or the fact that they were VPNs, but others were not. You’ll probably want to do some testing. Of the services where I did in-depth testing, NordVPN and Hotspot Shield were able to successfully hide their VPN origins, while StrongVPN and CyberGhost were not.
    Can I use a VPN to watch a blacked-out program or video?
    Sometimes it is possible to watch a blacked-out sporting event or other show, although we certainly can’t advise you to do so. Spoofing your location to bypass broadcast restrictions may get you in hot water.
    Also, do be aware that some broadcasters have developed increasingly sophisticated methods to determine whether the IP address you represent is the IP address where you’re located. The VPN may be able to protect your original IP address from being seen, but there are characteristics of proxy communications (like a slightly longer time to transfer packets) that can be used to identify users who are trying to bypass watching restrictions.
    Also: Why a proxy server can’t protect you like a VPN can
    Is it true that a VPN is completely unhackable?
    No. No. Did I mention… no. Nothing is unhackable. As evidence…
    In January 2018, Cisco Systems (a very highly respected maker of internet communications hardware) revealed that a critical bug was found in its ASA (Adaptive Security Appliance) software that could allow hackers to remotely execute code.
    This is a bug in enterprise-level VPN systems used by corporations, so it’s very serious, indeed. Fortunately, responsible IT administrators can patch their systems to fix the bug. However, it goes to show how no system can be truly deemed absolutely secure.
    Another example was a bug in Hotspot Shield, a popular VPN service. This bug allowed a hacker to expose private information, including originating IP. Hotspot Shield issued an update, which gives us an excuse to remind you that you should always install updates, especially on your VPN client software.
    Who are the key players?
    We’ve done in-depth reviews of the following VPN services. If you’re considering a VPN, you might want to read these articles first:
    While there are a tremendous number of VPN vendors out there, we think the following are some of the best:
    For a more detailed review of each, visit our VPN directory.

    You can follow my day-to-day project updates on social media. Be sure to follow me on Twitter at @DavidGewirtz, on Facebook at Facebook.com/DavidGewirtz, on Instagram at Instagram.com/DavidGewirtz, and on YouTube at YouTube.com/DavidGewirtzTV. More