background preloader

Geek to Live: Encrypt your web browsing session (with an SSH SOCKS proxy)

Geek to Live: Encrypt your web browsing session (with an SSH SOCKS proxy)

How to be anonymous online with Incognito At first glance Incognito may seem suited only for the extremely paranoid, because of the totality of tools it offers to hide your online presence. But those tools, each designed to mask a certain aspect of your online activity, have been around for quite a while. This 430MB-ish live CD has many faithful users, but I can't quote any on its usefulness since their identities couldn't be confirmed. Yes, Incognito is that good. If you're looking for the ultimate way to encrypt absolutely all your internet communications and be untraceable on the internet, you're looking for Incognito. Whether you're an anarchist, a covert operative or just someone who wants to exercise their digital rights and hide your online activity, with Incognito you can encrypt your IM conversations and emails, browse securely without the fear of cookies and the browser history revealing your secrets, and best of all, the traffic doesn't reflect in your router logs. An aside: who wants to be anonymous? Buck the trend.

Why You Should Start Using a VPN (and How to Choose the Best One for Your Needs) How to Secure and Encrypt Your Web Browsing on Public Networks (with Hamachi and Privoxy) A VPN tool like Hamachi's good for games, which usually don't support proxies, but for web browsing encryption, a SSH tunnel with AES256 encryption and public key authentication is superior, not only in terms of security, but in portability and "less bulky" software. In order to configure a VPN connection, you need Administrator privileges on Windows computers, plus you have to install software. With a SSH connection, all you need is a SOCKS server+SSH client blend (which does not require administrator privileges, though some applications need them for various reasons. Putty does not.), then point your web browsers proxy settings to localhost, and Voila! OpenSSH is the way to go for Mac/Linux users, and can be used on Windows, but it has to be through Cygwin (which I personally find extremely annoying to use/setup (cygwin)).

Low-Hassle Ways to Secure Your Computer System If time were no object, we’d all live a more secure computer life—we’d beef up our browsers, use complex passwords, and keep our data locked up with encryption Skynet couldn’t crack. But that kind of stuff requires obscure software, tricky command line work, and most of a free weekend, right? Nope. Anybody can feel more secure about their systems with the help of some free software and easy tweaks and add-ons. We’ve rounded up a good deal of these swift and simple security fixes for Windows, Mac, and Linux, so bust out the tinfoil hats and check ‘em out after the jump. Photo by ul Marga. Lock Down Firefox Firefox is pretty secure in its own right, but its vast library of add-ons include a number of tools that can make it even tighter. Take some of Adam’s advice and set Firefox to erase your private data on exit, stop keeping “address bar history,” and enable a master password if you don’t want to remember your legion of site logins. Encryption made easy Make strong but memorable passwords

The Copyright Alert System: How the New "Six Strikes" Anti-Piracy Program Works This is clearly aimed at people who don't realize downloading copyrighted material is illegal, but do those people exist? I have a hard time believing that people don't realize what they're doing. BitTorrent is pretty easy, but not THAT easy that you'd do it on accident. Or maybe it's more about pointing out that someone is watching you? Like, yes, you know you're downloading copyright material illegally, but you don't realize that someone else knows you're doing that. I don't know, I like the idea more than ridiculous lawsuits, but I'm wondering whose mind it's supposed to change. I'm worried about there not being much of a recourse for wrongful accusations. I am wondering if it is more of ISP's trying to appease the MPAA and RIAA by saying, "Look, we are doing something!" Yeah, the fact that none of the ISPs have detailed their rules is a little weird. From this point on they can say "Well.. you were sent 6 notices over this period of time" etc. :) Yeah, I think you nailed it there.

Home · trevp/axolotl Wiki Five Best File Encryption Tools File encryption is your best bet if you want to keep The Man, foreign spies, or your annoying roommates out of your files. Here’s a look at five of the most popular encryption tools Lifehacker readers use to lock down their files. Image a composite of photos by Anonymous Account and flaivoloka. GNU Privacy Guard (Windows/Mac/Linux, Free) GNU Privacy Guard (GnuPG) is an open-source implementation of the the famed Pretty Good Privacy (PGP) encryption tool—you can read the very interesting history of PGP and how GnuPG came to be here. Disk Utility (Mac, Free) Disk Utility is a diverse tool that handles almost any disk-related tasks you’d need on OS X. TrueCrypt (Windows/Mac/Linux, Free) TrueCrypt is a free, powerful and on-the-fly disk encryption tool. 7-zip (Windows, Free) AxCrypt (Windows, Free) AxCrypt is a free encryption tool for Windows. If you’ve got experience with any of these tools, let’s hear more about what makes it your tool-of-choice in the comments.

Build Your Own VPN to Pimp Out Your Gaming, Streaming, Remote Access, and Oh Yeah, Security How To Stay Secure Online In light of recent events, security has been a serious priority for all of us. Although there is no 100 per cent foolproof plan, there are ways to greatly improve your online security and plan for the worst. Here are our recommendations. The Bad News: Nobody’s Safe During the summer of my senior year in high school, I worked at a grocery store as a bag boy and saved up for a laptop. At the end of the summer I was finally able to buy one. No matter how safe you think you might be, something bad can always happen.The only way to ensure your private information always remains private and in your control is if it never leaves your own head. The internet and reality aren’t much different, in that sense. Create Strong, Resilient Passwords There are several ways to keep remarkably strong passwords, but every strategy has a point of weakness and a level of inconvenience that you’re going to have to accept. Create Strong, Secure Passwords that Even You Don’t Know Protecting Your Credit Cards

A tutorial on how to get into an admin account on ANY computer.

Related: