Guide to Computer Security (Archive): Difference between revisions
New page: '''Guide to Computer Security''' was produced by tpka Colonel Abrams after a consultation with the Newgon.com forum community. It explai... |
mNo edit summary |
||
Line 1: | Line 1: | ||
[[Media:Guide_to_Computer_Security.pdf|'''Guide to Computer Security''']] was produced by tpka [[Colonel Abrams]] after a consultation with the [[Newgon.com]] forum community. It explains how you can protect data stored on your hard drive and keep anonymous on the internet. The guide is a must-read for any law-abiding [[childlover]] or youth who is concerned with avoiding the scrutiny of [[ | [[Media:Guide_to_Computer_Security.pdf|'''Guide to Computer Security''']] was produced by tpka [[Colonel Abrams]] after a consultation with the [[Newgon.com]] forum community. It explains how you can protect data stored on your hard drive and keep anonymous on the internet. The guide is a must-read for any law-abiding [[childlover]] or youth who is concerned with avoiding the scrutiny of [[Vigilantism|cyber-vigilantes]] and corrupt law enforcement officers. | ||
The guide is divided into the following sections: | The guide is divided into the following sections: |
Revision as of 00:51, 14 October 2008
Guide to Computer Security was produced by tpka Colonel Abrams after a consultation with the Newgon.com forum community. It explains how you can protect data stored on your hard drive and keep anonymous on the internet. The guide is a must-read for any law-abiding childlover or youth who is concerned with avoiding the scrutiny of cyber-vigilantes and corrupt law enforcement officers.
The guide is divided into the following sections:
Section 1: Protecting data stored on your hard drive
1.1. Locking down Windows
1.2. Avoiding Malware
1.3. Cleaning / Erasing
1.4. Encryption
1.5. Security Note on USB Drives and Wear-Leveling
1.6. Other Methods
- 1.6.1. Live CDs
- 1.6.2. Portable Applications
- 1.6.3. System Drive Emulation software
- 1.6.4. Virtual Machines
Section 2: Protecting data while in transit over networks (Internet, Email, etc).
2.1. Email
- 2.1.1. PGP
2.2. Web-Surfing
- 2.2.1. Free proxies
- 2.2.2. Commercial software
- 2.2.3. Tor
2.3. Other Network Usage (Chat, Anonymous Remailers, File-Sharing)
Section 3: Useful Links