Monday, April 20, 2009

3

Privacy Tools

  • Monday, April 20, 2009
  • Runtrailblog
  • Share
  • When you go online, you leave tracks all over the place. You could be hanging out with friends on IM, checking out websites, or downloading music.There are various ways that information about you or your activities can be collected without your knowledge or consent:

    • Cookies
    • HTTP
    • Browsers
    • There may already be information about you published on the web
    • Downloading freeware or shareware
    • Search engines
    • Electronic commerce
    • E-mail
    • E-mail and cryptography
    • Spam
    • Dangers of Internet Relay Chat

    Tracing on the Internet

     

    The best way to cover your tracks on the Internet is to surf on a proxy cascade, a pool of hundreds of servers. This will give you a new IP address, and the connection between your PC and the website would also be heavily encrypted. Using Firefox with an Add-on such as Torpark, or Foxy Proxy is the way to go, or you may use the anonymization service JAP/JonDo.In contrast to normal Firefox operation, Torpark starts without any installation whatsoever

     

    Tor is an abbreviation for The Onion Router.It prevents somebody watching your Internet 4-20-2009 8-28-48 AMconnection from learning what sites you visit, and it prevents the sites you visit from  learning your physical location. Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol.

     

    dl2   TOR  | JAP/JonDo

     

    Protection from  Trojan Spying

     

    To encrypt your hard disk  use TrueCrypt.It is a free open-source disk encryption softwaretruecryptda4 for Windows Vista/XP, Mac OS X, and Linux.It can also encrypt a hard disk partition or storage device, such as USB flash drive.No data stored on an encrypted volume can be read (decrypted) without using the correct password or correct encryption key. Until  decrypted, a TrueCrypt volume appears to be nothing more than a series of random numbers. The entire file system is encrypted (i.e., file names,  folder names, contents of every file, and free space).

    dl2 TrueCrypt

     

    BitLocker Drive Encryption is a full disk encryption feature included with Microsoft's Windows Vista Ultimate, Windows Vista Enterprise, Windows Server 2008 and Windows 7 Ultimate Beta operating systems designed to protect data by providing encryption for entire volumes.

     

    Protection from: Telephone TracingWin-animated-Secure

    ZfoneTM is a new secure VoIP phone software product which lets you make encrypted phone calls over the Internet. It encrypts your call so that only the other person can hea r you speak.The Zfone software detects when the call starts, and initiates a cryptographic key agreement between the two parties, and then proceeds to encrypt and decrypt the voice packets on the fly.

     

    dl2 ZfoneTM

     

    OtherTools

    CookieCooker is a tool that enables you to protect your behavior and your interests from being spied on on the internet.It also  protects your email and postal mail account against spam by using trash mail serives and marking your postal adresses. By a report function user community create a database of address sellers. CookieCooker changes the cookies set by web servers on the own home computer to falsify the user profiles collected by the web servers

    dl2 CookieCooker

     

    Steganos Locknote is  the open source software enables users to quickly and easily4-20-2009 9-03-20 PM protect confidential notes, passwords, addresses, phone numbers or other sensitive information. LockNote looks and acts like a normal text file; however, it can only be opened with a password chosen by the user. The encrypted memo can be saved to a USB stick and used while on the road or on another PC

    dl2 Steganos-LockNote | Mirror

     

     

    Exif Tag Remover allows you to easily delete the Exif tag and other metadata tags. By doing so before publishing an image you take an active step toward protecting your privacy logoon the Internet.Jpeg images often contain hidden information about the image and it's creator, so called metadata tags. These tags are written to the files by digital cameras and  photo editing software. There are many different tags, such as Exif, IPTC, XMP & Comments.

     

     

     dl2 Exif Tag Remover

     

     

     

    Analyze your internet connection with 4-20-2009 8-35-25 AM

     

    The test does the following:

    • Checks for pop-up windows
    • Shows the browser “headers” which is the hidden information your web browser sends a web site.
    • Checks to see if port 80 and 16771 are open to see if your browser shows images and if you have a firewall blocking traffic on port 16771.
    • Checks your web browser version and determines the capabilities from a database.
    • Checks for browser plug-ins that re installed.
    • Traces your IP address.
    • Determine who owns the domain associated with the IP address of your Internet connection.
    • Looks up your the servers that handle mail for the domain associated with the IP address of your Internet connection.
    • Determine who manages the IP address of your Internet connection.
    • Lists the installed fonts on your computer.

       Check  arrow  4-20-2009 8-34-09 AM

     

    Visit Online Guide to Practical Privacy Tools : http://epic.org/privacy/tools.html

    3 Responses to “Privacy Tools”

    Spyshop said...
    April 22, 2009 at 5:13 PM

    Thanks so much for that information
    since its always better to browse thru proxies
    and i have been using firefox browser so i think i will install this add on torpark


    Spark said...
    April 22, 2009 at 9:49 PM

    Welcome,Yes torpark(xB Browser) is good one.Version 2.9.1.2 include unspecified updates, enhancements & bug fixes


    Cheating Spouse said...
    January 25, 2020 at 12:38 PM

    You are proving very good and relevant information....


    Post a Comment

    Your Links

    .

    Subscribe