Homepage di Proton VPN
ProtonVPN

Le basi della privacy

en
  • Le basi della privacy
A VPN keeps you private online but will slightly slow down your connection. We look at how you can improve your internet speeds when using a VPN. 
en
  • Le basi della privacy
A keylogger is either a piece of software or a hardware device that records input from your device’s keyboard.
en
  • Le basi della privacy
We discuss how to change the external and local IP addresses of your Windows device.
en
  • Le basi della privacy
A kill switch is a security feature that protects your IP address in case you unexpectedly lose your connection to a VPN server.
en
  • Le basi della privacy
A guest network lets you offer safe WiFi access for friends, office staff, customers, and iOT devices without compromising your own WiFi security.
  • Le basi della privacy
In questo articolo esamineremo chi può vedere la tua cronologia Internet quando utilizzi il WiFi, cosa può vedere e perché potrebbe farlo.
en
  • Le basi della privacy
Tor Browser is a powerful privacy tool that lets you browse onion sites and protect your identity. Here’s how it works.
en
  • Le basi della privacy
In this article, we look at what a MAC address is and whether it poses a risk to your privacy or security.
en
  • Le basi della privacy
Cyberattacks target weak security systems and unsuspecting victims. Learn the main cyberattack types and how to protect yourself.
en
  • Le basi della privacy
The Invisible Internet Project (I2P) is a decentralized anonymizing network built on similar principles to Tor.
en
  • Le basi della privacy
We look at what cookies are and how they are used. Third-party cookies, in particular, can pose a threat to your online privacy.