Header Ads

Extreme Online Privacy and Security Steps


Even if you’re not worried about industrial surveillance, there’s no such thing as perfect security.
People who feel facebook is secure must see this.

Mark Zuckerberg uses tape over his webcam. 

Now, why does he require a tape over his own Laptop? IF he does he has a doubt about online privacy too, and now what do you think can you trust his FACEBOOK to be secure.
If he is so worried about getting hacked surely his server too can and then what about your recorded secret Data collected by facebook.


Lets Find out Some Extreme steps you can take for your privacy.

1. Secure your email

Outlook and other email clients allow you to install a personal security certificate, which can be used to encrypt email so that only assigned receivers can read it, or digitally sign your messages to verify that they came from you. You can get your own certificate from comodo.com also it's completely free. The drawback is that your recipients need to use a compatible email system – if they’re using Gmail on their smartphone, they’ll simply be annoyed when you keep sending them unreadable strings of garbled data (Believe me, your security is much more important) . “It also means you’ve got to preserve your laptop,” If your laptop’s stolen and your password is written on a Post-it note on the screen, then what’s the use of the encryption?”

2. Keep your system Clean

If you use Windows, Android or MAC/i-OS then it’s essential to assure that only reliable software is working on it. Unfortunately, this can be difficult, as new devices almost come preinstalled with a handful of unwanted applications. These can spoil your performance – and threaten your privacy and security by collecting personal data. The good news is that Windows 10 includes a new “Reset Windows” feature that reverts the OS to a freshly installed environment, removing all external software in the process. Make this the first thing you do when you buy a new laptop and you’ll be rid of all those packaged items for good. Be conscious that this will wipe any personal files on the hard disk, along with programs you might want to keep. A more curative procedure is to open up programs and features, scour the list of installed programs and remove any applications you don’t want or recognize.
On Android You can go to your settings - Apps - ( click on unwanted app and then on Uninstall)

3. Be virtual


Running programs in a virtual environment, rather than on your “real” desktop, makes it harder for viruses to immerse their hooks into your computer and if you do get infected, it’s easy to roll back your software to an earlier state. When I have to download something that I am suspicious of, I prefer doing that in a virtual machine, then disconnect the VM from the network before opening it. Virtualisation isn’t a remedy, though. Many attacks are aimed at stealing your passwords and banking details; if you get tricked into sharing these, virtualisation won’t make a blocked bit of difference.


4. Keep a Spare, secure PC


Several computer infections are caused by people ignorantly visiting unreliable websites or downloading malicious software. Keep your banking and payment details secure by assigning a second computer – possibly an old laptop – as your “secure” device and do your gaming, email and web browsing elsewhere. Shut it down when not in use, so even if an opportunist hacker manages to get on your network, they won’t be able to obtain your extremely valuable information. If you don’t have a spare computer lying around, then you can create a soft “wall” between your online accounts by installing a second browser on your main PC and using it only for secure transactions.

5. Browse the web incognito

A VPN (virtual private network) service lets you surf the internet from a false location. They’re popularly used to bypass territorial restrictions on streaming video services or other blocked contents; using a private channel also privatize exactly what you’re accessing, so your online activity can’t be tracked by your ISP, neither by hackers or government spies.
TOR AND TOR BROWSER LINKS ARE COPY RIGHT TO TOR PROJECT

For the ultimate in security, consider using the Tor web browser (torproject.org), a free tool that routes your traffic through a network of servers all over the world, making it definitely difficult for anyone to observe or track your activity. Tor is favorite of defense, whistleblowers, political rebels, and criminals, but it can be frustrating to use on a slower connection: when all your connections are rerouted over China, Brazil and any number of other countries in between, websites tend to load quite slowly certainly.

6. Switch to hipster applications


It’s isn't simply the operating system that’s vulnerable to attacks. Cyber-criminals/ Hackers can and do gain security leaks in applications of all sorts, which is why we’re regularly being notified to install updates and patches. Just as you can avoid most viruses by switching away from MAC, you can reduce your risk by using less popular software that’s less likely to be targeted: for example, instead of Chrome, you could switch to the Opera browser. Instead of Microsoft Office, consider Apache OpenOffice or LibreOffice (which has the additional benefit of being free).
“When you see an unusual piece of software that you favor downloading, you might not know if it’s no longer being updated. It may contain vulnerabilities that aren’t being patched.” If you choose the road less traveled, make sure your applications are being properly maintained or you could be leaving yourself more exposed than ever.

7. Set your router to a stealth mode

If a stranger can get on your wireless network, there’s no limit to the problem they can cause for you and same is the situation if you use the connection that belongs to or is administered by the third party . The primary way to stop them is to set a strong password, but you shouldn't stop there. Jump into your router’s configuration page, you’ll find the advantage to hide its SSID – which is, the name of your wireless network – so that only those who know its name can discover and connect to it.
Leaving all rest things aside you should secure your Wi-Fi connection with MAC ID filter in the configuration option of your router. 
You can also make it harder for trespassers to get on to your network by turning down the transmission strength so that devices in neighboring houses or outside on the street can’t get a sound connection. “That assure that no one else can use your router, but it might mean that “Lowering the power makes life harder for hackers but also for the person in your spare bedroom wanting to watch TataSky Mobile at 1 am.”

8 Check your online footprint


Like it or Don't, there’s a huge amount of personal and professional information about all of us moving around on the internet. And it’s an enormous security risk: a dedicated attacker could easily collect sufficient information to pretend to be you, or a close associate, and gain access to information they shouldn’t.

If you’re anxious about your online profile, companies such as London Digital Security Centre (londondsc.co.uk) will – for a fee – sweep the internet to find out precisely what’s out there and help you get sensitive items removed. “It’s the digital equivalent of a credit check,” principal security researcher at Kaspersky Lab. “If some stuff has been exposed that perhaps you’d prefer not to get out, perhaps a picture’s ended up somewhere and you don’t know how? Then it’s something to think about.”

Prevention is better than cure. “Focus on what you’re sharing, and examine the security settings on your social networks,”  both Google and Facebook offer their own free “privacy check-up” services to help you avoid oversharing.

“Google your own name and set up a Google Alert for yourself”, so that you receive a notification whenever a new mention of your name appears online. “It’s not arrogant to have alerts set for your own name and address. It’s amazing what you can find out.”



Powered by Blogger.