\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\
******************************************************************
Anonymity and Security
******************************************************************
\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\
Note: I DID NOT MAKE THIS. This tutorial is very analytic to be more understandable to some usersContents:Check your Privacy
Privacy Basics
Proxies
Vpn
Firefox and Chrome add-ons
Anonymous Email
Disk Wipe
Firewall
Tor Project
Online proxy sites
Safe online payment
SSH
Encrypt your data
Online Virus Check
1.Check your PrivacyTwo sites to check your anonymity.
http://www.stayinvisible.com/http://www.whattheinternetknowsaboutyou.com/ 2.Privacy basicsDo not disclose any private information, unless absolutely required. In some cases when it is required such as your last name, only fill in partial information such as your last initial.
Don't fall into e-mail and web phishing traps. Become familiar with the signs of phishing and don't disclose private information in e-mail.
If you're using Microsoft Windows, familiarize yourself with Spyware and have at least one program installed to protect the computer.
3.ProxiesProxy is a server that sits between a client application, such as a Web browser, and a real server. It intercepts all requests to the real server to see if it can fulfill the requests itself. If not, it forwards the request to the real server.
Download elite proxy switcher from this link
http://www.eliteproxyswitcher.com/EPS_setup.exeAfter download and install, copy a list of proxies from these links.
http://proxy-ip-list.com/http://www.tubeincreaser.com/proxylist.txthttp://hidemyass.com/proxy-list/and save them ass a txt file. Load the txt from elite proxy switcher and check the proxies to see if they are alive. Double click to the alive proxies to set them on.
Note:Every proxy you are using it makes your internet more slow.
4.VpnIs a Virtual Private Network (VPN) that change your ip address and encrypt your traffic.
1- Free VPN: It is not recommended, cause many features are capped, and in addition, many free VPN providers will hand user data upon warrant issue. Also, many free VPNs work with ad companies.
2- Commercial pptp: It's been said, as telecomix pointed out, that some operating systems(Windows 7, Vista) might be vulnerable to an attack consisting in requesting p2p conns, wichcould lead the malicious attacker to get the user real ip. See
https://www.ipredator.se/?lang=en For more information on this matter. Seems flaw has to do with ipv6 conns, so just ensure you use ipv4.
3- Recommended VPN's. All that use the OpenVPN service. And that include specific policieson user data storage and policies regarding that data. (Best option, no data loggin + no user billing loggin, + safe payment methods ie: Ukash and similar services).
Free VPN direct downloads -- Not recommended.
If they aren't selling you a service. They are selling you.
Vpn Clients DownloadsMac
• Ultra VPN:
https://ssl0.ovh.net/fr/Linux
• UltraVPN:
https://ssl0.ovh.net/fr/Windows
• HotspotShield:
http://hotspotshield.com• UltraVPN:
https://ssl0.ovh.net/fr/Top 10 vpn clients here:
http://techpp.com/2009/07/09/top-5-free-vpn-clients/5. Firefox and Chrome add-ons1-HTTPS Everywhere is a Firefox and Chrome extension that encrypts your communications with many major websites, making your browsing more secure.
Encrypt the web by adding the HTTPS at the beginning of the url.
e.g
https://www.evilzone.com/ Download https everywhere from the link below
https://www.eff.org/files/https-everywhere-latest.xpi 2-No script disable sites scripts making things very difficult for sites that use scripts to grab ip address.
Download NoScript from the link below
https://addons.mozilla.org/en-US/firefox/downloads/latest/722/addon-722-latest.xpi?src=noscript.ownsite6. Anonymous EmailTo protect against email virus or spam messages or a trojan horse e.t.k that want to steal your private information you can see your emails with no fear with HideMyAss Anonymous email.
Create an account at:
http://hidemyass.com/anonymous-email/7. Disk WipeDisk Wipe is free utility for Windows operating system. It helps users secure permanent removal of data from their hard drives or other memory storage devices like USB memory sticks, SD memory cards or any other device who's memory can serve as a storage (some mp3 players, many cameras etc.) As long as the memory device is accessible and formatted with either NTFS, Fat, or Fat32 Disk Wipe can clean all the information's from it without possible data retrieval.
Download Disk Wipe
http://www.diskwipe.org/download/DiskWipe.exe8. FirewallFirewalls have helped protect computers in large companies for years. Now, they're a critical component of home networks, as well. It is the best network filter and also controls all your system actions by it self and sometimes warn you. It also works as an anti-virus against malware and other types.
Comodo Firewall for Windows
http://download.comodo.com/cis/download/installs/1000/standalone/cfw_installer.exegufw Firewall for Ubuntu
http://gufw.tuxfamily.org/9. Tor projectOn internet every machine will have an ip address. It works as a primary identifier online. It’s very important to hide/fake it to remain anonymous. Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis. Individuals, journalists, whistle blowers from all over the world use Tor. You should use it too.Tor prevents anyone from knowing your location or browsing. Tor can be used with browsers, instant messaging clients, remote logins, and more. Tor is free and open source for Windows, Mac, Linux/Unix, and Android phones. You should use it.Tor Browser Bundle lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained. Very useful when you are traveling and want to remain anonymous.Tor makes your traffic channelized anonymously but it doesn’t promise data security between you and the end server. You must always use HTTPS, encrypt your mails. Active content, such as Java, Javascript, Adobe Flash, Adobe Shockwave, QuickTime, RealAudio, ActiveX controls, and VBScript, are binary applications. These binary applications run as your user account with your permissions in your operating system. They might bypass Tor. I would avoid using them when I want to remain anonymous.
Download Tor
https://www.torproject.org/download/download-easy.html.en11. Online Proxy SitesOnline proxy site is a site that provides you a proxy server just by entering an url on it in order to surf anonymously.
Here is some online proxy site:
http://www.anon.me/http://hidemyass.com/proxy/https://aniscartujo.com/webproxy/http://www.free-web-proxy.de/http://bind2.com/10. Safe Online payment (BitCoin)Bitcoin is an experimental new digital currency that enables instant payments to anyone, anywhere in the world. Bitcoin uses peer-to-peer technology to operate with no central authority: managing transactions and issuing money are carried out collectively by the network. Bitcoin is also the name of the open source software which enables the use of this currency.
Downloads
• Windows (zip) ~12MB
http://sourceforge.net/projects/bitcoin/files/Bitcoin/bitcoin-0.6.2/bitcoin-0.6.2-win32.zip/download• Windows (exe) ~9MB
http://sourceforge.net/projects/bitcoin/files/Bitcoin/bitcoin-0.6.2/bitcoin-0.6.2-win32-setup.exe/download• Ubuntu PPA
https://launchpad.net/~bitcoin/+archive/bitcoin• Linux (tgz, 32/64-bit) ~11MB
http://sourceforge.net/projects/bitcoin/files/Bitcoin/bitcoin-0.6.2/bitcoin-0.6.2-linux.tar.gz/download• Mac OS X ~12MB
http://sourceforge.net/projects/bitcoin/files/Bitcoin/bitcoin-0.6.2/bitcoin-0.6.2.2-macosx.dmg/downloadSSHSecure Shell is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another. It provides strong authentication and secure communications over insecure channels. It is a replacement for rlogin, rsh, rcp, and rdist.
SSH protects a network from attacks such as IP spoofing, IP source routing, and DNS spoofing. An attacker who has managed to take over a network can only force ssh to disconnect. He or she cannot play back the traffic or hijack the connection when encryption is enabled.
When using ssh's slogin (instead of rlogin) the entire login session, including transmission of password, is encrypted; therefore it is almost impossible for an outsider to collect passwords.
SSH is available for Windows, Unix, Macintosh, and OS/2, and it also works with RSA authentication.
PuTTY is a free implementation of Telnet and SSH for Windows and Unix platforms, along with an xterm terminal emulator. It is written and maintained primarily by Simon Tatham.
Download PuTTY
http://the.earth.li/~sgtatham/putty/latest/x86/putty-0.62-installer.exeTo configure a PuTTY tunnel go to
http://www.devdaily.com/unix/edu/putty-ssh-tunnel-firefox-socks-proxy/2-configure-putty-ssh-tunnel-ssh-server.shtmlEncrypt your dataEveryone has some private data that they don’t want other to see. It may be a document consisting of all your login passwords, your bank account information that you want to keep out of your family or some stalker’s sight. In case you are wondering how to encrypt the files/folders/entire hard drive and keep it safe from prying eyes, here is an easy method.
TrueCrypt is a free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux. It creates a virtual encrypted disk within a file and mounts it as a real disk. You can use it to:
•Create a virtual disk within a file and mount it as an actual drive letter.
•Encrypt an entire hard disk partition or a storage device such as USB flash drive.
•Provide encryption that is real time and transparent.
The procedure will be the same for Linux and Mac OSX.
There are two main ways to create an encrypted disk.
You can encrypt an entire disk, or you can create a virtual disk within a file.
The first method has its risks, since converting a drive will erase everything that is on it. The second method is great for experimenting – you simply create a file somewhere on your hard drive and map it.
Download the latest version from here:
http://www.truecrypt.org/downloads.phpOnline Virus CheckCheck your files for viruses online in VirusTotal. VirusTotal is a free service that analyzes suspicious files and URLs and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware.
Check your files here
https://www.virustotal.com/