background preloader

Top 10 Secret Agent Security Tips and Tricks

Top 10 Secret Agent Security Tips and Tricks
When dealing with computer security, an often overlooked security risk is so-called "deleted files". When files are deleted, nothing is actually done to them aside from marking them as "free-space". The OS may get around to overwriting them sometime when it needs the space, but a deleted file could sit on a drive completely intact for weeks of usage (the bigger it is the bigger the chance it will be at least partially overwrited). Encryption applications that do not involve real-time decoding (a special driver decrypting files on-the-go vs an application decrypting and re-encrypting files), often do not have secure methods of wiping files (or the user is unaware of them), and hence the files are left in an unencrypted state on the drive when deleted. The only way to assure deleted files remain that way (or at least make their recovery very difficult and time-consuming) is to have an application overwrite the drives free-space with random 0s/1s, ideally multiple times.

http://lifehacker.com/5834964/top-10-secret-agent-security-tips-and-tricks

Related:  UndergroundSecurity - Privacy - Back Ups - Hacking - DownloadingMoney Learn and Organize

Last Man Standing — How to Beat a Lie Detector Last Man Standing are articles intended to help the average guy prepare for some of life’s oddest events. It’s just advice. It’s better than being clueless. If you’ve ever seen a cop drama, there usually comes a point when detective so-and-so says something like, “The machine isn’t reliable. Automatic Anonymous Wifi The two applications we will be using are called MadMACs and TOR. When a computer connects to a wireless network it usually obtains an IP through a DHCP server, which is basically just a method of providing dynamic IPs so that everyone does not have to sit down and figure out what IP everyone else is using and then manually set one on their own machine. When a request is made to a DHCP server two pieces of information are recorded, your MAC address and your hostname.

The Stupid Things You Do with Your Money (and How to Fix Them) Stupid Thing #6 - you buy new. Buying a new car is throwing money away. The depreciation on a new car is staggering, losing nearly 25% within 5 days. Never buy new. Buy 2 year old lease turn ins if you must drive something that looks new, or buy a good used car that has great reviews after others have already owned them a few years. Example: I just bought a Jeep Grand Cherokee used. How to Vanish with a New Identity Dark Side or not, it's always good to say, "Hey, folks. Don't forget, this is illegal. Do it at your own risk. LH is not responsible for any trouble you may cause/get yourself into!"

Make Cool Stuff: Concealing Your Secret Lair by Mindy Holahan on March 7, 2011 To the Batcave! Admit it. You’re prepared should a radioactive accident turn you into a superhero. Smuggling A skirmish with smugglers from Finland at the Russian border, 1853. A painting by Vasily Hudiakov. Smuggling is the illegal transportation of objects or people, such as out of a building, into a prison, or across an international border, in violation of applicable laws or other regulations. How to Remove Your Google Search History Before Google's New Privacy Policy Takes Effect [UPDATE 2/22/2012] It is important to note that disabling Web History in your Google account will not prevent Google from gathering and storing this information and using it for internal purposes. More information at the end of this post. On March 1st, Google will implement its new, unified privacy policy, which will affect data Google has collected on you prior to March 1st as well as data it collects on you in the future. Until now, your Google Web History (your Google searches and sites visited) was cordoned off from Google's other products.

A Clean Sweep For Your Finances Copyright © 2012 NPR. For personal, noncommercial use only. See Terms of Use. Hacking a commercial airport WLAN Posted on 30/8/06 by Felix Geisendörfer Welcome lifehacker.com & hackszine.com visitors. Read this follow up post if you care about the story of this article. Underground Underground most commonly refers to: The regions beneath the surface of the Earth Underground may also refer to: Places[edit] Arts and entertainment[edit] Film[edit]

Your Privacy Kind of Sucks, Fix it Up This Weekend Since it's hard to trust what companies that get your data will do with it, the best way to maintain your privacy online is to minimize what you give them. Create accounts with pseudonyms or variants of your name (yes, even Facebook and Google+). Supply only profile information that is absolutely necessary, and lie about critical stuff like birthdates. Take a Day Off and Put Yourself Through Financial Boot Camp Yeah, I've had mixed results with that trick too. Thankfully not all of them are like that - especially credit unions who are also card issuers: they're usually more than happy to cut you a break, even if you're a new member. Maybe a bit blunt on my part, but if you have ANY balance at 29.9% interest, they can afford to gamble on losing you, based on your desperation and/or bad credit. From my (admittedly limited) experience, if you've been with them for 11 years, and your rate is 29.9%, you either have an issue with your credit rating (have you checked that recently?), or (and given their reaction it seems more likely) they're just jerks and you shouldn't be using that card anyway.

Cracking WEP Using Backtrack: A Beginner’s Guide / Ryan Underdown This tutorial is intended for user’s with little or no experience with linux or wifi. The folks over at remote-exploit have released “Backtrack” a tool which makes it ridiculously easy to access any network secured by WEP encryption. This tutorial aims to guide you through the process of using it effectively. Required Tools Why Black Market Entrepreneurs Matter to the World Economy Soon, two-thirds of the world's workers will be part of street economies, Neuwirth says.Photo: Jessica Dimmock Not many people think of shantytowns, illegal street vendors, and unlicensed roadside hawkers as major economic players. But according to journalist Robert Neuwirth, that’s exactly what they’ve become. In his new book, Stealth of Nations: The Global Rise of the Informal Economy, Neuwirth points out that small, illegal, off-the-books businesses collectively account for trillions of dollars in commerce and employ fully half the world’s workers.

Related: