Proton

Průvodce ochranou soukromí

What is DKIM?
en
  • Průvodce ochranou soukromí
Learn how DKIM is used to authenticate emails and why you need it to help prevent your domain from being spoofed.
en
  • Průvodce ochranou soukromí
We explain how private email can help protect you against hackers, government spies, and Big Tech’s invasion of your privacy.
en
  • Průvodce ochranou soukromí
A password manager is a computer program (app) that generates secure passwords and remembers them for you
how to check email attachment is safe
en
  • Průvodce ochranou soukromí
Email attachments may contain malware that can infect your device. Here’s how to check if an attachment is safe to open.
en
  • Průvodce ochranou soukromí
Cloud storage is a popular alternative to hard drives and USBs — but what is cloud storage and how does it work? Here’s what you need to know.
en
  • Průvodce ochranou soukromí
Phishing scams can put you at risk of identity theft, credit card fraud, or other cybercrime. Learn how to spot and prevent phishing.
how to stop email trackers
en
  • Průvodce ochranou soukromí
Protect your inbox from email trackers. Learn how they work and learn easy ways to block them with Proton Mail’s tracking protection.
en
  • Průvodce ochranou soukromí
In this article, we examine the LastPass data breach and consider the lessons that can be drawn from it.
what are email headers
en
  • Průvodce ochranou soukromí
Learn what email headers are, what they contain, and how to read them to keep your inbox secure and spam-free.
how to encrypt files
en
  • Průvodce ochranou soukromí
If you have sensitive files or just want to keep your data private, here’s how to encrypt files on Windows, Mac, Android, and iOS.
what is two factor authentication (2fa)
en
  • Průvodce ochranou soukromí
Learn what 2FA is, how it works, and why you should use it wherever you can to protect your privacy and security online.