Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Wondering about this ... Anyone have any thoughts to validate ?


  • Please log in to reply
3 replies to this topic

#1 jziggyp

jziggyp

  • Members
  • 74 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Local time:11:15 AM

Posted 04 January 2014 - 06:20 PM

 

Graphic_Inline.jpg

Governments have transformed the internet into a surveillance platform, but they are not omnipotent. They’re limited by material resources as much as the rest of us. We might not all be able to prevent the NSA and GCHQ from spying on us, but we can at least create more obstacles and make surveilling us more expensive. The more infrastructure you run, the safer the communication will be. Download installation software for these programs. You can read detailed installation and setup instructions here.

THIS GUIDE IS A VERY BRIEF INTRODUCTION TO ONLINE SECURITY IN THE HOPES THAT YOU’LL INVESTIGATE FURTHER. DON’T TRUST YOUR LIFE TO IT.

1. TOR BROWSER BUNDLE

Includes all you’ll need to access the Tor Network.

Makes it more difficult to trace Internet activity: Web browsing, online posts, instant messages and other communication forms. Cannot prevent monitoring of traffic entering/exiting the network. While Tor protects against traffic analysis, it cannot prevent traffic confirmation (also called end-to-end correlation).

2. BLEACH BIT

Many features to help you easily clean your computer, free-up space and maintain privacy.

3. TAILS

A live operating system. Start on almost any computer from DVD/USB stick. Preserves your privacy and anonymity.

Comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite and more.

4. TRUECRYPT

Create virtual hard drives which encrypt any files you save onto them. Many types of encryption.

5. PIDGIN

Chat software that allows use of existing instant messaging accounts. Supports Facebook, Google Chat, AIM, MSN + more.

6. OFF THE RECORD

A simple plugin for Pidgin. It encrypts all conversations held using the software.

7. THUNDERBIRD

Free email software. Add your existing mail account to it.

8. ENIGMAIL

A security extension to Thunderbird. Write/receive emails signed and/or encrypted with the OpenPGP standard.

9. GNUPG

 



BC AdBot (Login to Remove)

 


#2 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,912 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:11:15 AM

Posted 04 January 2014 - 09:39 PM

Never heard of that site. Those are just a collection of programs the site recommends to deal with
Online Surveillance.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#3 jziggyp

jziggyp
  • Topic Starter

  • Members
  • 74 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Local time:11:15 AM

Posted 04 January 2014 - 10:23 PM

I found it on a post on facebook ..    https://www.facebook.com/Anonymous0perations ....    I was wondering if some of the links will actually do the things claimed and make browsing more secure or would they open up to possible problems ... I keep reading .. TOR is bad !   I just want to be as stealth as possible on the web, So I am sort of on a mission for more info to do such .



#4 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,912 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:11:15 AM

Posted 05 January 2014 - 08:33 AM

Answers to common security questions - Best Practices
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users