Privacy basics


 

What is a keylogger?

November 24th, 2023 in Privacy basics

A contraction of “keystroke logger”, a keylogger is either a piece of software or a hardware device that records input from your device’s keyboard. Although…

How to change your IP address on Windows

November 16th, 2023 in Privacy basics

This artcile was updated and refreshed November 2023. We discuss how to change the IP address of your Windows 10 or Windows 11 device. This…

What is a VPN kill switch and when should you use one?

September 15th, 2023 in Privacy basics

A kill switch is a security feature that protects your privacy. It ensures that you don’t connect to the internet thinking you’re protected by a…

Guest networks – What they are, why you need one, and how to set them up

September 12th, 2023 in Privacy basics

A guest network is a separate WiFi network within your home or office network designed specifically for your guests or customers to use.  Although run…

Can someone see my internet history if we use the same WiFi?

September 1st, 2023 in Privacy basics

Before WiFi, you had to connect your internet-capable device to a router via an Ethernet cable. The router then connected to a modem, which connected…

What is Tor Browser?

August 18th, 2023 in Privacy basics

Tor Browser is a privacy-focused browser that lets you navigate the internet without anyone monitoring your activity or identifying you. It relies on the Tor…

What is a MAC address, and what can it reveal about you?

August 17th, 2023 in Privacy basics

Every device that connects to a network does so through a network interface controller (NIC). Devices that can connect to multiple networks will have a…

8 common types of cyberattacks and how to prevent them

July 28th, 2023 in Privacy basics

Hackers are always looking for ways to break through the security systems that defend your devices and data from criminals. From web browsers to operating…

What is I2P and how does it work?

June 30th, 2023 in Privacy basics

The Invisible Internet Project (I2P) is an open-source, decentralized anonymizing network built on similar principles to Tor. Unlike Tor, which was primarily designed to allow…

Secure
your internet

Get Proton VPN
Get Proton VPN