Princípios básicos de privacidade

en
  • Princípios básicos de privacidade
The team at Proton VPN gives its predictions for what you can expect to see as half the world casts votes in national elections in 2024.
en
  • Princípios básicos de privacidade
A VPN keeps you private online but will slightly slow down your connection. We look at how you can improve your internet speeds when using a VPN. 
en
  • Princípios básicos de privacidade
A keylogger is either a piece of software or a hardware device that records input from your device’s keyboard.
en
  • Princípios básicos de privacidade
We discuss how to change the external and local IP addresses of your Windows device.
en
  • Princípios básicos de privacidade
A kill switch is a security feature that protects your IP address in case you unexpectedly lose your connection to a VPN server.
en
  • Princípios básicos de privacidade
Guest networks offer several security, privacy, and network management benefits. We discuss.
en
  • Princípios básicos de privacidade
In this article, we look at who can see your internet history when you use WiFi, what they can see, and why they might do this.
en
  • Princípios básicos de privacidade
Tor Browser is a powerful privacy tool that lets you browse onion sites and protect your identity. Here’s how it works.
en
  • Princípios básicos de privacidade
In this article, we look at what a MAC address is and whether it poses a risk to your privacy or security.
en
  • Princípios básicos de privacidade
Cyberattacks target weak security systems and unsuspecting victims. Learn the main cyberattack types and how to protect yourself.
en
  • Princípios básicos de privacidade
The Invisible Internet Project (I2P) is a decentralized anonymizing network built on similar principles to Tor.