Privacy basics
![](https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1714480816/wp-vpn/does-a-vpn-slow-down-your-internet-blog/does-a-vpn-slow-down-your-internet-blog.png?_i=AA)
- Privacy basics
Virtual private networks (VPNs) are popular because they keep what you do on the
internet private, help defeat censorship, and allow you to watch your favorite
streaming content securely.
Under most circumstances, a VPN will slightly slow down your
![](https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1714480899/wp-vpn/what-is-a-keylogger-blog/what-is-a-keylogger-blog.png?_i=AA)
- Privacy basics
A contraction of “keystroke logger”, a keylogger is either a piece of software
or a hardware device that records input from your device’s keyboard. Although
not strictly part of the definition, keylogger software can also often record
video and/or au
![](https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1714482531/wp-vpn/how-to-change-ip-on-windows/how-to-change-ip-on-windows.png?_i=AA)
- Privacy basics
This artcile was updated and refreshed November 2023.
We discuss how to change the IP address of your Windows 10 or Windows 11 device.
This doesn’t change your IP address on the internet, although we’ll look at that
as well.
* Changing your IP ad
![](https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1714481091/wp-vpn/vpn-kill-switch-blog/vpn-kill-switch-blog.png?_i=AA)
- Privacy basics
A kill switch is a security feature that protects your privacy. It ensures that
you don’t connect to the internet thinking you’re protected by a VPN when you
aren’t.
When you use a virtual private network (VPN), your device connects to VPN server
r
![](https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1714481098/wp-vpn/guest-network-blog/guest-network-blog.png?_i=AA)
A guest network is a separate WiFi network within your home or office network
designed specifically for your guests or customers to use.
Although run from the same router (which may also be your modem), a guest
network operates as an entirely separ
![](https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1714481142/wp-vpn/can-someone-see-my-internet-history-if-we-use-the-same-wifi-cover/can-someone-see-my-internet-history-if-we-use-the-same-wifi-cover.png?_i=AA)
Before WiFi, you had to connect your internet-capable device to a router via an
Ethernet cable. The router then connected to a modem, which connected your
device to the internet. Routers and modems are so often housed in the same
device, that the ter
![](https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1714481177/wp-vpn/what-is-tor-browser/what-is-tor-browser.png?_i=AA)
- Privacy basics
Tor Browser is a privacy-focused browser that lets you navigate the internet
without anyone monitoring your activity or identifying you. It relies on the Tor
anonymity network to route your internet traffic through multiple random servers
before conn
![](https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1714481184/wp-vpn/mac-address/mac-address.png?_i=AA)
- Privacy basics
Every device that connects to a network does so through a network interface
controller (NIC). Devices that can connect to multiple networks will have a
separate NIC for each connection they support. For example, a laptop that
supports WiFi, Ethernet
![](https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1714481300/wp-vpn/cyberattacks-blog2x/cyberattacks-blog2x.png?_i=AA)
- Privacy basics
Hackers are always looking for ways to break through the security systems that
defend your devices and data from criminals. From web browsers to operating
systems to chat apps, any piece of software is a potential target. It’s a
constant game of cat
![](https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1714481308/wp-vpn/i2p/i2p.png?_i=AA)
- Privacy basics
The Invisible Internet Project (I2P) is an open-source, decentralized
anonymizing network built on similar principles to Tor. Unlike Tor, which was
primarily designed to allow anonymous browsing of the regular internet (but can
also be used as a dark
![](https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1714481405/wp-vpn/what-are-cookies-and-how-are-they-used-blog/what-are-cookies-and-how-are-they-used-blog.png?_i=AA)
- Privacy basics
Internet cookies, often called website cookies, computer cookies, or just
cookies, are small text files that websites store on your computer or device
when you visit them. These files contain data that websites use to remember and
track information a