Power up remote PCs by sending them network packets.
Force programs and plugins to use the TOR proxy.
Connect your network to the Internet and protect it there.
Set download or upload transfer rate priority for applications and monitor their net traffic.