Surf Internet Safely

Wednesday, 17th June 2026

Ticket Quantity
Free + £0.00 fees

Here is what professionals from use to surf internet safely.

1. Virtual Machines

Your internet connections are not the only way into your systems. Files of all types, ranging from PDF to JPEG, .DOC's, .JS, .JAR and many more, are capable of leading to executable code that can violate your network, damage your system, and put your identity and location at risk. A virtual machine is exactly what it sounds like, a virtual computer. In fact, it is an operating system that runs on a remote server that can support applications and other functions normally performed on a physical computer's operating system. Users can connect from their devices, switch to the virtual machine, and then use it to open suspicious files. This can be especially useful for people who fear geolocation by censors or hostile governments who may be using planted files. The downside is that there is still a risk that your connections will be discovered because the Virtual Machine offers not much more in the way of security.

2. Virtual Machine, The Next Level

For those who really want to use the idea of virtual machines to their full potential, it is possible to boot a live operating system from a USB stick or other memory device and run it locally. The benefits are clear, instead of connecting remotely to a virtual machine, where the connection itself is at risk, it runs the virtual machine without an internet connection. Of course, if you use it to connect to the Internet, the risks begin to emerge. The virtual machine will help ensure anonymity and may include data encryption, but the connections will still be traceable by those with hostile intentions. If the connection is intercepted it could be traced back to the source regardless of their knowledge of your identity.
3. Managing Your Plug-ins

Browser management is an important part of maintaining Internet security and protecting your location information. This includes managing your plug-ins, as they are weak points in many security systems that can filter data, even while other measures are in place. To be clear, a plug-in is any piece of software, owned by a third party or other, that can be installed and run within another operating environment. Simple examples of plug-ins are third-party functionality added to an e-commerce website, such as a payment solution or social networking icons. Hostile plug-ins include software that is intended to identify your information and/or track your browsing habits. To maintain the highest level of anonymity we recommend avoiding plug-ins in general; the downside, of course, is that many of today's websites cannot function without them. The best approach is to set up your system so that it has to ask permission to run a plug-in, so be sure to isolate them so that they run in "sandbox" mode for added security.

4. Blocking JavaScript

JavaScript is a powerful programming language, but it has many vulnerabilities. The first is linked to its very nature, the ability to send detailed information about you and your device to any server in the world. It collects information such as your screen size, computing power, enabled plug-ins and other bits of data that can be used to identify your fingerprint and track your activities over the Internet. However, the real problem with JavaScript is that almost all websites on the Internet rely on it for core functionality, so disabling it is not really a viable option, as it will give you so much security that you won't even be able to use the web. The best method is to use software that allows you to make a list of which domains are allowed to run JavaScript on your devices, but even this does nothing to secure a connection
private to the web.

5. VPN, Virtual Private Network

A VPN or virtual private network is by far the best method of hiding your location, protecting your data, and ensuring that Internet connections are secure. This technology is the culmination of private sector and government research currently in use. It encrypts your data in an unreadable file, encapsulates your data in a secure package with a brand new anonymous IP address, includes authentication markers for the endpoint so that only the data can be read, routes your connection through secure remote servers, masks your IP address and does it all from inside your own files creating a shield that is hard to see, hard to break and almost impossible to trace. When all other attempts to prevent data loss or geographic location are imperfect security measures at best, VPN is the technology that fills the gap.

More information about this event

Event terms and privacy policy


Starts: Wednesday, June 17th 2026

Add to calendar: GoogleAppleOutlookOther

Timezone: US/Eastern
Bookings close: June 16th 2026


This is an online event. Details for joining will be available in your booking confirmation email.  

Contact details

This event is organized by I am MA.

Contact the event organizer
Lost or not received your tickets?

Event booking system powered by

© 2020 LIVE IT Group Ltd, Registered in England, number 08432364 at 3 Enterprise Centre, TN11 8BG
LIVE IT is a technology partner providing ticket fulfilment services and is not an agent for this event or affiliated with its organizers in any way.