Guide to Anonymity, Security and Anti-Forensics
So, you want to be secure and anonymous online, prevent threats and leave no traces? well, this is a comprehensive guide to anonymity and security on your computer and when surfing the internet. Alongside with the other tutorials, this one is effective, and I will try to keep it understandable. Please continue reading and I hope you might find this useful.
Online Anonymity
Hiding online identity and anonymity is essential; because it prevents you from getting traced or tracked down.
Proxies
Proxies are used mainly for security purposes and IP Address, it may be also used to speed up the loading of resources by caching, bypass parental controls and open blocked sites.
Proxy address switcher:
http://www.eliteproxyswitcher.com
Free working proxy server list (Updated realtime):
http://hidemyass.com/proxy-list/
http://www.proxy4free.com/list/webproxy1.html
http://www.proxynova.com/proxy-server-list/
Web Proxies
Web Proxies are services that provides proxy access using a website, the function is, when you request a webpage, the server will contact the website indirectly and will server the resource to your web browser.
Free Web Proxies:
http://zfreez.com/
http://vtunnel.com/
http://zendproxy.com/
http://4freeproxy.com/
http://boomproxy.com/
http://www.webproxy.ca/
http://webproxy.stealthy.co/
http://kproxy.com/
http://anonymouse.org/
VPNs
VPNs are similar to proxies, it hides your IP address but the advantage is, it encrypts your traffic so that it would not be intercepted by data sniffing tools, it is useful for public wifi hotspots and for home/office use.
Free VPNs:
VPN Book- http://www.vpnbook.com/ (My Favorite)
Spotflux - http://spotflux.com/
HotSpotShield - http://hotspotshield.com/
Paid VPNs:
ExpressVPN - http://expressvpn.com/
HotSpotShield Elite - http://hsselite.com/
User-Agent Switcher
Spoofs and mimics a user-agent to hide the browsers' identification.
Chrome - https://chrome.google.com/webstore/detail/user-agent-switcher-for-c/djflhoibgkdhkhhcedjiklpkjnoahfmg
Firefox - https://addons.mozilla.org/en-US/firefox/addon/user-agent-switcher/
IPFuck/IPFlood
Used for hiding IP address by using multiple proxies simultaneously, which obfuscates the user's IP address.
Chrome - https://chrome.google.com/webstore/detail/ipfuck/bjgmbpodpcgmnpfjmigcckcjfldcicnd
Firefox - https://addons.mozilla.org/en-us/firefox/addon/ipflood/
Security
Getting secured and safe while on the computer is very important, and also the pattern of getting infected is not that pathetic, atleast you can prevent it by following different measures.
Disk Encryption
Disk encryption is a way of encrypting HDD so that the private files won't be breached,
the data won't be readable due to protection; and cannot be decrypted easily without authorization.
TrueCrypt Disk Encryption Software:
http://www.truecrypt.org
Symantec PGP Encryption(Paid)
http://www.symantec.com/encryption
Antivirus, AntiMalware, AntiKeyloggers and Firewalls
Antiviruses and Antimalware are a great boon these days, it protects your computer against viruses and other malicious software.
Free Antivirus:
http://avast.com/
Free AntiMalwares:
http://malwarebytes.org/
http://superantispyware.com/
Free Virus Removal Tools:
http://www.softpedia.com/get/Antivirus/Kaspersky-Virus-Removal-Tool.shtml
http://www.bitdefender.com/free-virus-removal/
http://www.microsoft.com/security/pc-security/malware-removal.aspx
Free Antikeylogger:
http://www.aplin.com.au/neos-safekeys-v3...s-v3-works
http://networkintercept.com/vrkeyboard.html
Free Firewall:
http://personalfirewall.comodo.com/
http://www.zonealarm.com/security/en-us/zonealarm-pc-security-free-firewall.htm
Windows Firewall (Windows XP/7 built-in)
Paid AVs and AMs:
http://kaspersky.com/
http://bitdefender.com/
Online Malware-scanning tools:
http://camas.comodo.com/
http://virustotal.com/
https://mwanalysis.org/
http://anubis.iseclab.org/
http://bleepingcomputer.com/startups/
http://malwr.com/
http://minotauranalysis.com/
http://onlinescan.avast.com/
http://www.isthisfilesafe.com/
http://online.us.drweb.com/
http://vxvault.siri-urz.net/ViriList.php
Anti-Forensics
Anti-forensics, is basically a method to make it hard to recover data, secure deletion and system wiping to stay out of privacy and security breaches.
Anti-forensic tools
CCleaner - http://piriform.com/
CCleaner can clear browsing history/cache/cookies, temporary system files, windows log files, DNS cache, IIS log and other files.
BCWipe - http://www.jetico.com/wiping-bcwipe/
BCWipe uses military-grade procedures to remove any traces of file, BCWipe complies with U.S. Department of Defense (DoD 5220.22-M), U.S. Department of Energy (DoE M 205.1-2) and other deletion standards.
BleachBit - http://bleachbit.sourceforge.net/
BleachBit quickly frees disk space and tirelessly guards your privacy. Free cache, delete cookies, clear Internet history, shred temporary files, delete logs, and discard junk you didn't know was there.
Eraser - http://eraser.heidi.ie/
Eraser is an advanced security tool for Windows which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns.
Windows Anti-Forensics Guide
[1.2 GB, 3hrs and 7 mins]
Youtube: http://www.youtube.com/watch?v=YxlSqvIpq5w
More: http://www.irongeek.com/i.php?page=security/windows-forensics-registry-and-file-system-spots
www.irongeek.com/downloads/anti-forensics-notacon.pdf
www.archive.org/download/Anti-Forensics-One-Big-File/anti-forensics.wmv
Check your anonymity online
https://panopticlick.eff.org/index.php
http://browserspy.dk/headers.php
http://stayinvisible.com/
Anonymity Tips
1. Do not post private information in the web, including your address, birthdate and contact info, including on your registration details, if the authorities found one, they will use it to track you.
2. Do not engange private activities while on public places, other people might see you.
3. Always use anonymity tools so your IP address is masked, if in case they found it out, the IP is fake.
4. Do not brag or talk about hacking, obviously, if you brag/talk about it with your friends, they might report you to the police.
5. Hide your files in an encrypted container, encrypting data on the USB is better.
6. Always use SSL when its available; it encrypts your details so that it would be safe.
7. Use SSH (Secure Shell) when connecting to a remote system, one good example is PuTTy.
8. A quote of the game "Hitman": "Never trust anyone; and rely on your instincts."
9. Try "proxy chaining", or using of multiple proxies.
10. Use a VPN together with a high-anonymity proxy so that there would be an increased privacy advantage.
By Rahul Developers
Share this
Comments
Post a Comment