Computing
Internet
Data transmission
Internet privacy
Internet security
Computer network security
Tunneling protocols
Network architecture
Virtual private network
DNS hijacking
IPv6
BGP hijacking