Guide to Computer Security (Archive): Difference between revisions

From NewgonWiki
Jump to navigation Jump to search
Rez (talk | contribs)
mNo edit summary
Rez (talk | contribs)
mNo edit summary
Line 1: Line 1:
[[Media:Guide_to_Computer_Security.pdf‎|'''Guide to Computer Security''']] was produced by tpka [[Colonel Abrams]] after a consultation with the [[Newgon.com]] forum community. It explains how you can protect data stored on your hard drive and keep anonymous on the internet. The guide is a must-read for any law-abiding [[childlover]] or youth who is concerned with avoiding the scrutiny of [[Vigilantism|cyber-vigilantes]] and corrupt law enforcement officers.
[[Media:Guide_to_Computer_Security.pdf‎|'''Guide to Computer Security''']] was produced by tpka [[Colonel Abrams]] after a consultation with the [[Newgon.com]] forum community. It explains how you can protect data stored on your hard drive and stay anonymous on the internet. The guide is a must-read for any law-abiding [[childlover]] or youth who is concerned with avoiding the scrutiny of [[Vigilantism|cyber-vigilantes]] and corrupt law enforcement officers.


The guide is divided into the following sections:
The guide is divided into the following sections:

Revision as of 00:52, 14 October 2008

Guide to Computer Security was produced by tpka Colonel Abrams after a consultation with the Newgon.com forum community. It explains how you can protect data stored on your hard drive and stay anonymous on the internet. The guide is a must-read for any law-abiding childlover or youth who is concerned with avoiding the scrutiny of cyber-vigilantes and corrupt law enforcement officers.

The guide is divided into the following sections:

Section 1: Protecting data stored on your hard drive

1.1. Locking down Windows

1.2. Avoiding Malware

1.3. Cleaning / Erasing

1.4. Encryption

1.5. Security Note on USB Drives and Wear-Leveling

1.6. Other Methods

1.6.1. Live CDs
1.6.2. Portable Applications
1.6.3. System Drive Emulation software
1.6.4. Virtual Machines

Section 2: Protecting data while in transit over networks (Internet, Email, etc).

2.1. Email

2.1.1. PGP

2.2. Web-Surfing

2.2.1. Free proxies
2.2.2. Commercial software
2.2.3. Tor

2.3. Other Network Usage (Chat, Anonymous Remailers, File-Sharing)

Section 3: Useful Links

Full guide PDF

Guide to Computer Security