c6j0e3
- 67
- 18
Computer Security:
CCleaner: (http://www.piriform.com/ccleaner/download)
A quick, free, and easy to use programs that cleans up your computer. It can be set to wipe junk from the following:
Internet Explorer
Windows Explorer
System
Advanced (e.g. Prefetch Data, Wipe Free Space, etc.)
Not to mention, it has a built in registry cleaner, and a tools menu, which includes:
Uninstall (programs)
Startup (programs)
System Restore
Drive Wipe
Malewarebytes: (http://download.cnet.com/Malwarebyt...4572.html?part=dl-10804572&subj=dl&tag=button)
"Detects and remove all traces of malware including worms, trojans, rootkits, rogues, dialers, spyware and more."
Did I mention, it's free?
JPEG & PNG Stripper: (http://www.steelbytes.com/?mid=30&cmd=download&pid=15&lang=eng)
"A tool for stripping/cleaning/removing uncessary metadata (junk) from JPG/JPEG/JFIF & PNG files. The image quality IS NOT AFFECTED. Includes command line support. Free to download."
Eraser: (http://eraser.heidi.ie/download.php)
"An advanced security tool for Windows which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns.
Your first thought may be that when you 'delete' the file, the data is gone. Not quite, when you delete a file, the operating system does not really remove the file from the disk; it only removes the reference of the file from the file system table. The file remains on the disk until another file is created over it, and even after that, it might be possible to recover data by studying the magnetic fields on the disk platter surface."
Once again, available at no fee.
Internet Security:
COMODO Firewall: (http://personalfirewall.comodo.com/free-download.html)
A great firewall, with basic and advanced settings, preventing your computer from being harmed by malicious websites and/or attacks. If you don't already have a firewall, this is the way to go. They offer a free version on their site!
GnuPG (http://gpg4win.org/download.html)
"For file and email encryption. Gpg4win (GNU Privacy Guard for Windows) is Free Software and can be installed with just a few mouse clicks."
Some people think that websites are secure.. this is not the case. Your email, website posts, private messages, etc. are traceable, and furthermore, readable. Even using services like "hushmail", which is supposed to be encrypted and secure, are not. The only way to ensure maximum security with your communications, is to actually encrypt your conversations. It only takes a moment to setup. Breaking the encryption is so improbable, I will utilize the term, impossible. One tip: never save the password electronically. The longer the password, and the move movements when generating the key, the higher the entropy. Write the password down. Keep it secret and keep it safe.
VPN:
Now I am not going to cover a list of every VPN, but they are an essential tool to maintaining security. There are premium VPN services, and there are free services. Most free services have bandwidth limitations. If you fit within them, great. If not, VPNs are usually really inexpensive for the amount of anonymity they provide.
A VPN creates an encrypted tunnel between you and their server. This makes it so your Internet Service Provider (ISP) is unable to see where you are visiting, only that you are connected to the VPN's server. When choosing a VPN, go for the following traits:
1) No data logging / No IP logging
2) Non-USA Based
A great premium VPN, for just under $80/yr is:
http://mullvad.net/en/
A couple free VPNs worth mentioning are:
http://www.securitykiss.com/ (Has a limit of 300mb/day bandwidth)
http://hotspotshield.com/
TOR -The Onion Router- (https://www.torproject.org/download/download.html.en)
"Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relatio nships, and state security known as traffic analysis."
SOMETHING TO REMEMBER:
When you are utilizing internet anonymity software / hardware, whether it be TOR, a VPN, SSH, SSL, etc. keep your personal and private matters separate. For example, if you are on a VPN or TOR, DO NOT:
1) Check Social Networking Sites (Myspace, Facebook, Twitter, etc.)
2) Use your personal email to write sensitive material, even if PGP encrypted!
3) Login into any service that lists / posts your name!
I'll add some more tips, tutorials, and/or programs as needed, or requested.
CCleaner: (http://www.piriform.com/ccleaner/download)
A quick, free, and easy to use programs that cleans up your computer. It can be set to wipe junk from the following:
Internet Explorer
Windows Explorer
System
Advanced (e.g. Prefetch Data, Wipe Free Space, etc.)
Not to mention, it has a built in registry cleaner, and a tools menu, which includes:
Uninstall (programs)
Startup (programs)
System Restore
Drive Wipe
Malewarebytes: (http://download.cnet.com/Malwarebyt...4572.html?part=dl-10804572&subj=dl&tag=button)
"Detects and remove all traces of malware including worms, trojans, rootkits, rogues, dialers, spyware and more."
Did I mention, it's free?
JPEG & PNG Stripper: (http://www.steelbytes.com/?mid=30&cmd=download&pid=15&lang=eng)
"A tool for stripping/cleaning/removing uncessary metadata (junk) from JPG/JPEG/JFIF & PNG files. The image quality IS NOT AFFECTED. Includes command line support. Free to download."
Eraser: (http://eraser.heidi.ie/download.php)
"An advanced security tool for Windows which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns.
Your first thought may be that when you 'delete' the file, the data is gone. Not quite, when you delete a file, the operating system does not really remove the file from the disk; it only removes the reference of the file from the file system table. The file remains on the disk until another file is created over it, and even after that, it might be possible to recover data by studying the magnetic fields on the disk platter surface."
Once again, available at no fee.
Internet Security:
COMODO Firewall: (http://personalfirewall.comodo.com/free-download.html)
A great firewall, with basic and advanced settings, preventing your computer from being harmed by malicious websites and/or attacks. If you don't already have a firewall, this is the way to go. They offer a free version on their site!
GnuPG (http://gpg4win.org/download.html)
"For file and email encryption. Gpg4win (GNU Privacy Guard for Windows) is Free Software and can be installed with just a few mouse clicks."
Some people think that websites are secure.. this is not the case. Your email, website posts, private messages, etc. are traceable, and furthermore, readable. Even using services like "hushmail", which is supposed to be encrypted and secure, are not. The only way to ensure maximum security with your communications, is to actually encrypt your conversations. It only takes a moment to setup. Breaking the encryption is so improbable, I will utilize the term, impossible. One tip: never save the password electronically. The longer the password, and the move movements when generating the key, the higher the entropy. Write the password down. Keep it secret and keep it safe.
VPN:
Now I am not going to cover a list of every VPN, but they are an essential tool to maintaining security. There are premium VPN services, and there are free services. Most free services have bandwidth limitations. If you fit within them, great. If not, VPNs are usually really inexpensive for the amount of anonymity they provide.
A VPN creates an encrypted tunnel between you and their server. This makes it so your Internet Service Provider (ISP) is unable to see where you are visiting, only that you are connected to the VPN's server. When choosing a VPN, go for the following traits:
1) No data logging / No IP logging
2) Non-USA Based
A great premium VPN, for just under $80/yr is:
http://mullvad.net/en/
A couple free VPNs worth mentioning are:
http://www.securitykiss.com/ (Has a limit of 300mb/day bandwidth)
http://hotspotshield.com/
TOR -The Onion Router- (https://www.torproject.org/download/download.html.en)
"Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relatio nships, and state security known as traffic analysis."
SOMETHING TO REMEMBER:
When you are utilizing internet anonymity software / hardware, whether it be TOR, a VPN, SSH, SSL, etc. keep your personal and private matters separate. For example, if you are on a VPN or TOR, DO NOT:
1) Check Social Networking Sites (Myspace, Facebook, Twitter, etc.)
2) Use your personal email to write sensitive material, even if PGP encrypted!
3) Login into any service that lists / posts your name!
I'll add some more tips, tutorials, and/or programs as needed, or requested.