Hai guise,
I was on Demonoid late last night downloading Newswipe and I came across these rather interesting files. I have to say that I do not take any credit for them, but would like to share them with you or those that cannot access Demonoid as they aren't as half as L337 as me.
Anyway, here goes, slightly reformatted:
How to be anonymous online
Security rules.
- Too good to be true, then it probably is!
- Disable web browsers from using third party cookies.
- TrueCrypt: Encrypt system partitions and external hard drive partitions.
- Updates: Make sure all software has latest firmware and security updates.
- Anti-Virus / Anti-Malware: Make sure that anti-virus is installed and used (Malwarebytes, Microsoft Security Essentials).
- If you ever get Malware, make sure you are skilled in removing that Malware (check out BleepingComputer for more info)
- Anonymity 1 (tor): Use the Tor network to use the internet anonymously.
- Anonymity 2 (proxy): Use proxies to use the internet anonymously.
- Anonymity 3 (mailinator): Use mailinator to create a “throw away” email address.
- Anonymity 4 (name): Never use your real name.
- Anonymity 5 (alias): Choose a common alias or a word (NOT a unique alias). This will make search engines retrieve information that is more ambiguous.
- Anonymity 6 (email): Never use or create an email with your name in the settings, or with your name in the email address.
- Anonymity 7 (forums and chatting): Use IRC, I2P, IM with TOR, or 4chan [RemadE edit - LOLWUT?] to chat on the internet.
- P2P File Sharing 1 (encryption): Force encryption in connection settings.
- P2P File Sharing 2 (protection): Use PeerBlock to block blacklisted IP’s.
- Logs 1: Make sure any IM conversations you have are logged by you.
- Logs 2: Watch what you say on an IM convo because it can be logged somewhere else.
- Cache: Always delete your caches.
- Firewall: Make sure that a firewall is used and properly configured.
- Retiring Hard Drives: When retiring hard drives DBAN them.
- Secure Deletion: To securely delete files from a HDD use secure deletion software (Eraser, CCLeaner, THC Secure Delete Tools).
- Passwords 1: Use passwords that are at least 8 characters in length.
- Passwords 2: Use passwords that combine numbers and symbols.
- Passwords 3: Do not use a password that contains personal information.
- Passwords 4 (default passwords 1): Change all default passwords.
- Passwords 5 (default passwords 2): Keep a list of all default passwords.
- Passwords 6: Use pass-phrases instead of passwords.
- Passwords 7: Watch out for social engineering.
- Passwords 8: If you have a pass key on your smart-phone; finger print smudges can reveal your password.
- Social Network 1: Do not have your personal information linked to your profile.
- Security Questions 1: Make sure that anything you post on the internet cannot be used to answer your security questions.
- Security Questions 2: If at all possible attempt to create your own custom recovery questions.
- Plugins/Addons: Disable plugins you do not need or use (especially in web browsers).
- Services: Disable unused services in the Operating System.
- Task Scheduling: Always check task schedulers for unwarranted schedules.
- Leaks: Any information that one has should be leaked on the internet.
- SPAM: Protect yourself from the various emails, popup scams, and so forth.
- Frauds: Protect yourself from Auction Fraud: Shill Bidding (bidding on an item to drive price up), Bid Shielding (Very high bids to discourage other bidders), Bid siphoning (Luring bidders off legitimate sites to other websites because of some “benefit”).
- Court Records and Criminal Checks: Check county court for court cases on people.
- Sex Offender: Use the FBI’s sex offender registry to find sex offenders
- Authenticity: Use hashing such as MD5/SHA-1 to verify files
- Auditing: Enable security auditing within Operating Systems (Windows: Local Security Policy). Most definitely enable Account logon failures/success.
- Don’t become a victim of pharming or phishing.
Encryption: If you are using encryption (in any form: WiFi, SSL, etc.) make sure that it is actually strong and has not been cracked yet.
Source:
http://www.demonoid.me/files/details/2593417/8839061/Download this post, formatted etc so you can also share and stroke your e-penis!
Comments
CMS Status:
I've now got the Scroogle addon installed and I'm using it in place of Google all the time Good call, It's pretty cool.
Did it keep bringing up some XML shit for you as well? I can't remember what I did now, but keep trying. It will work in the end. Also, you need to make sure you've disabled noscript if that's running.
Oh, and if your Firefox isn't compatible, it also won't install Good luck!
Thanks anyways though. :cool: