background preloader

Three steps to properly protect your personal data

Three steps to properly protect your personal data
With groups like Anonymous actively looking to embarrass your company, laptops thefts occurring every second, and the recent poor US District Court ruling on fifth amendment password protection rights, it is time you actually encrypt your data properly. Your Windows login password is not encrypting your computer (surprise!). Full-disk encryption (used by very few people) is a good step, but by itself it still will not completely protect your data from prying eyes, overzealous governments, or your own mistake of leaving your company's crown jewels at the local coffee shop. More in the Investigator's Toolkit: Instead—as with many successful security designs—you can set up a layered approach to protecting your data with encryption. It's fairly easy, quick, and free. To create a more complete protection scheme, I am going to walk you through three steps to build this layered security approach: Step one: Install full-disk encryption Now follow the instructions and create a strong password.

http://www.csoonline.com/article/699180

Related:  Online Privacy ToolsWeb privacy

Le véritable firewall Open Office C'est Tenshy, fidèle lecteur de korben.info qui m'a envoyé cette news plutôt insolite : Le véritable firewall Openoffice !!! C'est le blogueur Pollux, qui a eu l'idée de spécifier dans une feuille calc (Open Office) les numéros des ports à filtrer, puis récupère les valeurs pour les filtrer grâce au module kernel nfqueue. La difficulté ici, c'est surtout de pouvoir lancer les commandes nfqueue en root, sans que Open Office ne soit lui-même lancé en root. Internet security: 10 ways to keep your personal data safe from online snoopers When Tim Berners-Lee was designing the technology that has transformed our world, he looked for a noun that would describe what he had in mind. The one he eventually settled on was "web", which is how the world wide web got its name. To its inventor, the noun must have seemed perfectly apposite: it described the intricate, organic linking of sites and pages that he had in mind.

Google tracks you. We don't. An illustrated guide. DuckDuckGo does not collect or share personal information. That is our privacy policy in a nutshell. The rest of this page tries to explain why you should care. Last updated on 04/11/12. Removed ", which gets sent to my personal email." in last paragraph as our feedback is now handled by multiple team members via desk.com. Top five privacy tips to protect your online data Top Five Privacy Tips to Protect Your Online Data Are parasitic aliens lurking on the Internet, seeking to steal your privacy and replace you with an emotionless, online clone? Well, I sure hope not, but the reality of electronic privacy falls closer to Jack Finney’s vision of imposter “pod people” than most people realize. Simply replace parasitic aliens with unscrupulous online trackers and pod people with stolen identities. Using the five privacy tips to protect your online datat below, however, you can significantly decrease the likelihood of falling victim to those who seek to use your personal data to exploit you. Tip 1.

Find Your Own Private Internet With Freenet PC World – by Alex Wawro Anonymous peer-to-peer communication on the Internet isn’t just a handy tool for privacy enthusiasts; it’s critical for preserving free speech in the digital world. Anonymous file-sharing services like BitTorrent are legion, but their utility is limited—you can share only files—and their reputations are unfairly tarnished by people who use them to share media illegally. If you’re looking for a highly anonymous peer-to-peer network with websites, forums, and more, look no farther than the Free Network, one of the best-kept secrets in anonymous communication.

'Uncrackable' codes set for step up 4 September 2013Last updated at 13:09 ET By Melissa Hogenboom Science reporter, BBC News Quantum cryptography is a way to share secret digital keys A system that allows electronic messages to be sent with complete secrecy could be on the verge of expanding beyond niche applications. A team of British scientists has discovered a way to build communications networks with quantum cryptography at a larger scale than ever before. Quantum cryptography has the potential to transform the way sensitive data is protected. Still trust DuckDuckGo? In my recent blog post PRISM - Where do we go from here? I made the point that using services such as DuckDuckGo on the presumption that they are safe, is a dangerous thing to do and explained why. I have also been explaining to people on Twitter that using DuckDuckGo on the assumption that their searches will be private was a misunderstanding of who DuckDuckGo are and what they do and pointed them to the previously mentioned blog post. I even had a short conversation with DuckDuckGo's CEO via Direct Message (DM) on Twitter explaining my reasons and suggesting he move operations to Europe in order to escape the US Surveillance machine - at which point I would be happy to support them: "You guys should consider moving all your business to the EU and setting up new exclusively EU corp (no ties to US), then I can support you." Upon further investigation over the following days, I discovered that DuckDuckGo were not complying with their own Privacy Policy which states:

Secure Digital Secure Digital (SD) is a nonvolatile memory card used extensively in portable devices, such as mobile phones, digital cameras, GPS navigation devices, handheld consoles, and tablet computers. The Secure Digital standard was introduced in August 1999 as an evolutionary improvement over MultiMediaCards (MMC). The Secure Digital standard is maintained by the SD Association (SDA). How to Avoid Identity Theft Identity Theft is one of the worst things that can happen to your personal finances. When someone assumes your identity they can ruin your credit score and destroy your financial reputation for years. Identity theft is a growing crime, but there are some important measures you can take to avoid having your identity stolen. How to Avoid Identity Theft Online

Privacy tools You are being watched. It has become a fact that private and state sponsored organizations are spying on us. privacytools.io is here to give you the knowledge and tools to defend yourself against global mass surveillance. Over the last 16 months, as I've debated this issue around the world, every single time somebody has said to me, "I don't really worry about invasions of privacy because I don't have anything to hide." I always say the same thing to them. I get out a pen, I write down my email address. I say, "Here's my email address.

John the Ripper password cracker John the Ripper is free and Open Source software, distributed primarily in source code form. If you would rather use a commercial product tailored for your specific operating system, please consider John the Ripper Pro, which is distributed primarily in the form of "native" packages for the target operating systems and in general is meant to be easier to install and use while delivering optimal performance. This version integrates lots of contributed patches adding GPU support (OpenCL and CUDA), support for a hundred of additional hash and cipher types (including popular ones such as NTLM, raw MD5, etc., and even things such as encrypted OpenSSH private keys, ZIP and RAR archives, PDF files, etc.), as well as some optimizations and features. Unfortunately, its overall quality is lower than the official version's.

'Without an accout there is hardly a chance that someone will inform you about something important for community... you will be the last to know ;)' - I know the feeling :D you're right and I agree, but it's kinda scary that we are being constantly scrutinised. And the idea of 'proper' behaviour among users can be easily questioned, for it seems that a wise and safe user is a non-user. by karinsayshello Apr 19

But it is hard to live without social media now - just because other people have it! There are groups (of fellow students for example) that shares usefull information. Without an accout there is hardly a chance that someone will inform you about something important for community... you will be the last to know ;) by dagensmedia Apr 19

Hmmm... considering that it is better to not have social media account at all. Take Facebook for an example: you don't need to have photos, or posts or likes... the fact that you have friends list and you are talking with them on a chat is enough, because they follow your messages. Which can be good at one point, because if someone is planing on creating a bomb special services will know about that. But on the other (more normal) hand... by dagensmedia Apr 19

But what does it mean 'to use it wisely'? Each piece of information can be used against you in the future, like the trip-advisor map, because you might have visited the wrong place at the wrong time. I'm not referring to the users who over-share their personal life data, I'm referring to users like you and me. My point is.... you never know :D by karinsayshello Apr 19

I think that everything is for people ;) The trouble is to use social media visely. by dagensmedia Apr 19

All these articles are motivating me to change my social-media habits and I don't know whether it is good or bad because I've started to create some conspiracy theories :P by karinsayshello Apr 19

Related: