backup and delete all your Twitter DMs [app]
Want to erase all your Twitter DMs in one go? This app lets you do that, or even easily choose what DMs you want deleted, it’s easy to navigate, wipe your Direct Message inbox and Sent Messages in one swoop, deletes from other persons account too (Only Twitter database keeps a copy) It’s always good to keep control of your DM’s as most 3rd party apps are able to read your...
Guide to law enforcement encounters
Noted: This information is not a substitute for legal advice. You should contact an attorney if you have been visited by the FBI or other law enforcement officials. You should also alert your relatives, friends, co-workers and others so that they will be prepared if they are contacted as well.[[MORE]] You Have the Right to Remain Silent: A Know Your Rights Guide for Law Enforcement Encounters. ...
Firefox Addons For Password Management
There are many tools that can assist you in managing our passwords and the most convenient ones are embedded right where you need them: in your browser.[[MORE]] Enhance The Default Password Manager with Saved Password Editor. Firefox has an internal password manager, which is a good alternative if you want to stay on the lean side with addons. You can enable it under > Firefox > Options...
Using Keepass to Secure Your Online Accounts
It’s a great password manager. Have all your passwords in one place. And they are encrypted. I would recommend it for anyone who is required to remember more than a handful of passwords.[[MORE]] Download KeyPass here Open Source – Allows the ability to analyze the encryption methods Clients available for Windows, Ubuntu, Linux, MacOS X, Palm OS, Blackberry, Android etc KeePass database...
How to bypass software trial period
I have included a software that let’s you run and use any trial version of a software without buying that software and entering any license key or getting serials. Also showing you how to bypass manually trial period in Windows.[[MORE]] To Manually Bypass in Windows Follow the below steps: First you have to uninstall that application whose trial period is over and you wanna use it again. ...
VPN vs. SSH Tunnel: Which Is More Secure?
VPNs and SSH tunnels can both securely “tunnel” network traffic over an encrypted connection. They’re similar in some ways, but different in others – if you’re trying to decide which to use, it helps to understand how each works.[[MORE]] An SSH tunnel is often referred to as a “poor man’s VPN” because it can provide some of the same features as a VPN without the more complicated server setup...
Privnote (self destructing notes)
Send encrypted notes that will self-destruct after being read. Privnote is a free web based service that allows users to create encrypted notes that they can share over the internet as unique one-time-use HTTPS URLs that expire after its first access via any web browser.[[MORE]] Start by writing your message here from https://privnote.com/ How can I send my note? Is there a way to send the link...
(OpenPuff) Steganography tool
A steganography software tool allows a user to embed hidden data inside a carrier file, such as an image or video, and later extract that data. The advantage of steganography, over cryptography alone, is that messages do not attract attention to themselves. Plainly visible encrypted messages—no matter how unbreakable—will arouse suspicion. Therefore, whereas cryptography protects the contents of a...
Police Recording Apps
Although this has nothing directly to do with Internet security, i find that it’s related and also important. These apps lets users discreetly record audio and video of police and provides helpful legal information about their rights when interacting with police.[[MORE]] The American Civil Liberties Union of New Jersey has released an Android app designed to be used by people who want to...
EXIF data how to check and strip
You can find a lot of information from an image posted, you took with your smartphone, or camera then posted. Since the Exif tag contains information about the photo, it can pose a privacy issue. For example, a photo taken with a GPS-enabled camera/phone can reveal the exact location and time it was taken, and the unique ID number of the device[[MORE]] This is all done by default. Let’s go...
Doxing and your information
There are many reasons you would want to do this and it is quite simple, how can you be anonymous in any way if you can easily be traced to your private and or personal information? [[MORE]]To fully secure your anonymity, go to these sites listed here, enter your information, and check to make sure you have close to nothing out there (of course nothing being better, but sometimes can be hard to...
File encryption for the Cloud
Cloudfogger encrypts all your files easily, quick and secure using AES. Cloudfogger uses transparent encryption, which makes daily use quick and simple: After you activate encryption for a folder on your system via Explorer context menu (e.g. your Dropbox), all files are written to your hard drive securely encrypted - and are also securely uploaded to the cloud.[[MORE]] For Dropbox, SkyDrive,...
Rootkit Hunters/Scanners is a tool that scans your system for backdoors, rootkits, and local exploits by running tests like:[[MORE]] MD5 hash compare Look for default files used by rootkits Wrong file permissions for binaries Look for suspected strings in LKM and KLD modules Look for hidden files Optional scan within plaintext and binary files What is a Rootkit? Let me explain. A Rootkit...
Jabber Encrypted IM
Jabber a instant message protocol is based on XMPP, an open standard for instant messaging, and used by many popular applications. By setting it up my way you get a Encrypted and Off-The-Record IM service.[[MORE]] 1) Download and install a client Pidgin Here is a list of all dedicated clients (i use Pidgin, you may use what you prefer) 2) Register your Jabber account Just put in desired...
How to check and fix a DNS leak
I already touched base on this under post “How to make VPNs more secure”, here is a even more detailed and separate explanation. When using an anonymity or privacy service, it is extremely important that all traffic originating from your computer is routed through the anonymity network. If any traffic leaks via the underlying connection, any entity monitoring your traffic will be able...
Liberty Reserve (Safe Money Transfer)
Liberty Reserve is an account-based payment system where you can store value in U.S. Dollars, Euro or Gold Grams and transfer payments to others and receive payments from others. It is safe, reliable and confidential.[[MORE]] Payments are irrevocable (meaning they cannot be reversed). Liberty Reserve is instant, real-time currency for international commerce. In just minutes, you can send and...
GNUnet is a framework for secure peer-to-peer networking that does not use any centralized or otherwise trusted services. A first service implemented on top of the networking layer allows anonymous censorship-resistant file-sharing. Anonymity is provided by making messages originating from a peer indistinguishable from messages that the peer is routing. [[MORE]] All peers act as routers and use...
GNU Privacy Guard (Encryption)
GnuPG is a hybrid encryption software program in that it uses a combination of conventional symmetric-key cryptography for speed, and public-key cryptography for ease of secure key exchange, typically by using the recipient’s public key to encrypt a session key which is only used once.[[MORE]] This mode of operation is part of the OpenPGP standard and has been part of PGP from its first...
How to make VPNs more secure
There are occasions where there may be a hiccup or where an extra level of security is needed. Depending what level of security you want for yourself. Here are some extra steps to take to make sure you are safe. [[MORE]] Securing your privacy when your VPN fails. Ok, so you’ve purchased your VPN subscription, enabled the service, and you’re enjoying your new found levels of privacy. Then your...
VPN Providers and Anonymity
If a VPN provider carries logs of their users’ activities the chances of them being able to live up to their claim of offering an anonymous service begins to decrease rapidly. There are dozens of VPN providers, many of which carry marketing on their web pages which suggests that the anonymity of their subscribers is a top priority. But is it really? Let’s find out. [[MORE]]Do their privacy...
How to use BitCoin (Tutorial)
Bitcoin is a digital currency that enables instant payments to anyone, anywhere in the world. Bitcoin uses peer-to-peer technology to operate with no central authority: managing transactions and issuing money are carried out collectively by the network. Bitcoin is also the name of the open source software which enables the use of this currency. [[MORE]] What is Bitcoin [video] introduction What...
Anonymize BitTorrent traffic with BTguard
If you’re using BitTorrent without taking special measures to hide your activity, it’s just a matter of time before your ISP throttles your connection. Here’s how to set up a simple proxy to keep your torrenting safe and anonymous. [[MORE]] Because copyright holders are getting more vigilant at tracking down people who share their content. You don’t even need to be doing...
Monitoring your bandwidth
Bandwidth caps. I’m talking about the notorious ceilings on how much broadband data you can use before your ISP starts charging you extra, or slowing down your connection, or shaping your traffic use (eg, blocking your access to certain applications).[[MORE]] Install a Bandwidth Monitor On Your Computer If your computer is the only one in your house, or your bandwidth use is the only use...
At times, you will like to send an email that in no way can be traced back to you. There are a variety of sites that can provide this service for you. Most provide you with an email that can be used once, or can last from anywhere between 10 minutes to days. [[MORE]] Remember a big part of security and being Anonymous is not being able to be traced by any means necessary. Obviously not...
Encrypted Notes is a very simple to use application providing state of the art industrial-strength encryption to users who want nothing more than to store sensitive information in text documents.[[MORE]] Users can be completely at ease in the security provided by Encrypted Notes because it follows best practices in dealing with encryption algorithms and does not try to do anything that is not...
EncryptOnClick (File Encryption)
EncryptOnClick is a very simple to use program that lets you securely encrypt and decrypt files.To ensure the files you want to keep safe and out of view from others stay that way.[[MORE]] The program is very simple to use and features military grade 256-bit AES encryption that is fully compatible with WinZip 9. Not only are your files encrypted, but they are also compressed. This reduces the...
KeyScrambler secures your keystroke data through the crucial path. How does it work? and what is Keylogging?[[MORE]] First off what is a Keylogger A keylogger is a software program “designed to work on the target computer’s operating system.” While there are commercial keyloggers sold on the Internet for purposes of surveillance, most keyloggers and keylogging malware are...
TrueCrypt (Encryption) (Tutorial)
TrueCrypt is a software system for establishing and maintaining an on-the-fly-encrypted volume (data storage device). On-the-fly encryption means that data is automatically encrypted right before it is saved and decrypted right after it is loaded, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password/keyfile(s) or correct...
Sites/Blogs with daily fresh proxies AnonProxies FreshLiveProxies Socks5Proxies MegaSocks
MAC (Media Access Control) Spoof/Change
Most people among us change their IP address and think they are anonymous on the internet, but one thing they forgot is that they can be tracked down with MAC address which is still there, not spoofed. So what to do?[[MORE]] First off what is MAC When you think about networking, IP addresses are probably the first things that come to mind. But there’s another type of network address called a MAC...
Internet Browsers and Extensions
Heavy web users need an internet browser that is both fast and secure, and though all browsers enable internet access, not all are created equal. Different browsers can render webpages differently, and there can be a large disparity in performance between the top competitors. The three main things to consider when choosing an internet browser are simplicity, speed and security.[[MORE]] Key points...
Anti Virus/Anti Spyware Software
Install a good antivirus software (particularly if you use P2P). Antivirus software is designed to deal with modern malware including viruses, trojans, keyloggers, rootkits, and worms. [[MORE]] Find out if your antivirus offers real-time scanning, on-access or on-demand. Also find out if it is heuristic. I recommend Avast as a free exceptional edition. Download and install it and scan regularly....
How to secure your wireless home network
Securing a wireless network is very important because if you don’t, your neighbors can not only borrow your Internet connection, but also access your files and check up on what you’re doing. [[MORE]] 1) Connect to your router via your browser, by inputting something called a Gateway IP Address. Click Start > Run > type ‘cmd’ > Click ‘Enter’ Once the Command Prompt window opens, type...
So you want to secure your computer and ensure your privacy. I will be covering everything, step by step, with tutorials, tips, links, and much more, that i find related, or interesting. To ensure your anonymity, security and safety on the internet. I will add personal favorite options of mine and leave out other, these are just personal suggestions/guidelines, and you may want to do your own...