One of our staff members is contributing considerably to a News Archiving service at Mu. Any well educated (Masters, PhD or above) users who wish to make comments on news sites, please contact Jim Burton directly rather than using this list, and we can work on maximising view count.
Guide to Computer Security (Archive): Difference between revisions
mNo edit summary |
mNo edit summary |
||
| Line 1: | Line 1: | ||
[[Media:Guide_to_Computer_Security.pdf|'''Guide to Computer Security''']] was produced by tpka [[Colonel Abrams]] after a consultation with the [[Newgon.com]] forum community. It explains how you can protect data stored on your hard drive and | [[Media:Guide_to_Computer_Security.pdf|'''Guide to Computer Security''']] was produced by tpka [[Colonel Abrams]] after a consultation with the [[Newgon.com]] forum community. It explains how you can protect data stored on your hard drive and stay anonymous on the internet. The guide is a must-read for any law-abiding [[childlover]] or youth who is concerned with avoiding the scrutiny of [[Vigilantism|cyber-vigilantes]] and corrupt law enforcement officers. | ||
The guide is divided into the following sections: | The guide is divided into the following sections: | ||
Revision as of 00:52, 14 October 2008
Guide to Computer Security was produced by tpka Colonel Abrams after a consultation with the Newgon.com forum community. It explains how you can protect data stored on your hard drive and stay anonymous on the internet. The guide is a must-read for any law-abiding childlover or youth who is concerned with avoiding the scrutiny of cyber-vigilantes and corrupt law enforcement officers.
The guide is divided into the following sections:
Section 1: Protecting data stored on your hard drive
1.1. Locking down Windows
1.2. Avoiding Malware
1.3. Cleaning / Erasing
1.4. Encryption
1.5. Security Note on USB Drives and Wear-Leveling
1.6. Other Methods
- 1.6.1. Live CDs
- 1.6.2. Portable Applications
- 1.6.3. System Drive Emulation software
- 1.6.4. Virtual Machines
Section 2: Protecting data while in transit over networks (Internet, Email, etc).
2.1. Email
- 2.1.1. PGP
2.2. Web-Surfing
- 2.2.1. Free proxies
- 2.2.2. Commercial software
- 2.2.3. Tor
2.3. Other Network Usage (Chat, Anonymous Remailers, File-Sharing)
Section 3: Useful Links