Neueste Artikel
- Grundlagen der Privatsphäre
A keylogger is either a piece of software or a hardware device that records
input from your device’s keyboard.
- Privatsphäre im Detail
Google’s new feature for its Chrome browser claims to help mask your identity,
but the company’s business model is incompatible with privacy.
- Grundlagen der Privatsphäre
We discuss how to change the external and local IP addresses of your Windows
device.
- Für Unternehmen
Content filtering is used by businesses and other organizations to block
employees or customers from access to certain online content.
- Privatsphäre im Detail
WPA3 is the latest security standard for keeping your WiFi connections secure,
and a great improvement over its aging predecessor (WPA2).
- Proton VPN – Neuigkeiten
The new Proton VPN Linux app is rebuilt from the ground up to be efficient,
elegant, and modular in design.
- Privatsphäre im Detail
Perfect forward secrecy ensures that even if an internet session is compromised,
past and future sessions remain secure.
- Privatsphäre im Detail
A zero-day is a previously unknown software vulnerability. A zero-day exploit is
a cyberattack that takes advantage of a zero-day.
- Für Unternehmen
.A static IP address is a fixed internet protocol address that’s guaranteed not
to change for as long as you lease it.
- Privatsphäre im Detail
IKEv2 is a VPN protocol used to secure a VPN connection. Part of the IPsec
protocol suite, it is sometimes referred to as IKEv2/IPsec.
- Privatsphäre im Detail
Amazon Alexa devices undoubtedly bring unparalleled convenience to our lives.
But this convenience comes at the price of privacy.