A proxy is a computer or module that acts as an intermediary between a web browser and the Internet. On the Internet, he ...

Have you ever typed your name on Google, only to come across details that you would have preferred to keep secret? Good ...

The cloud is a computer technology that allows access to resources and services remotely via the Internet, without ...

Your privacy on the internet is increasingly threatened. In fact, large internet companies collect ...

In this article, we will introduce you to those who are watching you on the internet and then we will tell you their objectives, ...

To unblock a blocked site, you can rely on a service providing a virtual private network (VPN) or a ...

Blackmail is a form of extortion where the victim is threatened to reveal compromising or embarrassing information to their ...

Did you know ? When you perform research on the Google search engine, it keeps a history of it in ...

You've probably seen films like James Bond where every time he arrives in a new place, ...

Truecaller is surely one of the most popular applications of the moment, but it raises the question of consent. In effect, ...

Thinking of surfing incognito with private browsing? Well think again, it is quite possible to recover ...

More and more, technology is part of our lives. The dream of houses where every object is connected ...

We hear more and more about VPNs. However, some Internet users do not know exactly what it is, nor ...

Very often, IP addresses are the heart of a lot of problems, but also of fantasies. In fact, between ...

When you need to send confidential documents to someone, steganography can be an effective technique. Hide them in a ...

The Internet being a large public place, your name necessarily appears there somewhere. This is a fact that may seem inevitable. ...

You have your personal email address, but for once you want to protect your identity and send an email from ...

You don't want your private communications read by your government, hackers, or your ISP ...

A word we hear a lot these days is homomorphic encryption. Several companies and Cloud services are changing their algorithms ...

With the confinements of spring and autumn, the French consumed more content on the Internet. During this time ...

Often when we want to stream movies or download them from direct download sites, ...

O&O ShutUp10 is a portable utility that allows you to precisely control all the information delivered by your computer under ...

Many applications use the GPS chip of your mobile to geolocate you. If you wish to preserve your anonymity ...

Do you care about your privacy? Well know that there are hacking techniques that can activate ...

Unlike VPN, a proxy server changes your IP address without resorting to traffic encryption. You don't appear ...

When registering for a site, a valid email address is often required to send a confirmation email. But ...

If you are looking to create a virtual PC quickly and easily, then there is a service called SADD that should help you. ...

Every day we give a lot of information to Google without realizing it. Who we are, what we like… Google is not ...

Every day we give a lot of information to Google without realizing it. Who we are, what we like… Google is not ...

Websites know a lot more about your online behavior than you think. Here are some little-known facts ...

Do you want to know if your Internet connection is censored? At home, at work or abroad, let's see how directly ...

Do you know cookies? A cookie is a small text file placed on your computer when you visit a site ...

On the net, many risks jeopardize your data. Retention of your digital information is not ...

You may not know it but Internet censorship is widely applied in some countries like China, ...

If you are addicted to downloading on P2P networks, but don't want to go through a ...

Did you know that Google tracks your searches to put you in boxes: man, woman, football or tennis fan, ...

No one is safe from a material accident. In this case, it is very difficult to get your hands on your ...

.If you use online storage services (Dropbox, Google Drive, Microsoft SkyDrive, or others) to store your documents ...

If you are an avid reader of our website, you certainly know more or less everything about anonymity on ...

You may not know it, but deleting a file or folder leaves traces on your hard drive and these ...

Traces, you don't only leave them in your browser but you also leave them in most software ...

Did you know that when you connect a USB stick under Windows, does it leave traces? Date and time of connection, ...

We remember very well the Anonymous hacker who was spotted by the FBI thanks to a photo. He has ...

You have probably already heard of DuckDuckGo, the search engine that wage war on tracking offers ...

Since Edward Snowden's revelations, we know that major Internet companies are being spied on by the NSA. And like many ...

Available for Chrome and soon for Firefox, Uglymail allows you to know before opening an email whether it will be used ...

There is excellent free software that allows you to browse the Internet anonymously such as AVG PrivacyFix or Epic ...

A study by security researcher Christian Haschek of 443 free proxies found that the majority of ...

If you are concerned about your privacy on the internet, and your confidentiality? Then you probably want to know ...

Tails is a Gnu/Linux distribution based on Debian, specially designed to preserve the privacy and anonymity of those who ...

How can you be sure that a third party cannot access your files sent over the Internet? By encrypting them well ...

Since Edwards Snowden's revelations about the NSA's surveillance methods, encryption solutions of all kinds ...

Would you like to view a Linkedin profile anonymously? In other words, you want to know if it is possible to be ...

Chrome is arguably one of the most popular browsers. It far exceeds Internet Explorer and Firefox. In fact, he ...

Yesterday a friend said to me: "Ahmed, I recently read your article on how to inject a backdoor with a USB key and ...

Update: Unfortunately, this app is no longer available on the Play Store. You suspect that your husband, a member ...

A few days ago Edward Snowden, the former CIA collaborator, revealed the existence of a surveillance program called ...