When you go online, you leave tracks all over the place. You could be hanging out with friends on IM, checking out websites, or downloading music.There are various ways that information about you or your activities can be collected without your knowledge or consent:
- There may already be information about you published on the web
- Downloading freeware or shareware
- Search engines
- Electronic commerce
- E-mail and cryptography
- Dangers of Internet Relay Chat
Tracing on the Internet
The best way to cover your tracks on the Internet is to surf on a proxy cascade, a pool of hundreds of servers. This will give you a new IP address, and the connection between your PC and the website would also be heavily encrypted. Using Firefox with an Add-on such as Torpark, or Foxy Proxy is the way to go, or you may use the anonymization service JAP/JonDo.In contrast to normal Firefox operation, Torpark starts without any installation whatsoever
Tor is an abbreviation for The Onion Router.It prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol.
Protection from Trojan Spying
To encrypt your hard disk use TrueCrypt.It is a free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux.It can also encrypt a hard disk partition or storage device, such as USB flash drive.No data stored on an encrypted volume can be read (decrypted) without using the correct password or correct encryption key. Until decrypted, a TrueCrypt volume appears to be nothing more than a series of random numbers. The entire file system is encrypted (i.e., file names, folder names, contents of every file, and free space).
BitLocker Drive Encryption is a full disk encryption feature included with Microsoft's Windows Vista Ultimate, Windows Vista Enterprise, Windows Server 2008 and Windows 7 Ultimate Beta operating systems designed to protect data by providing encryption for entire volumes.
ZfoneTM is a new secure VoIP phone software product which lets you make encrypted phone calls over the Internet. It encrypts your call so that only the other person can hea r you speak.The Zfone software detects when the call starts, and initiates a cryptographic key agreement between the two parties, and then proceeds to encrypt and decrypt the voice packets on the fly.
CookieCooker is a tool that enables you to protect your behavior and your interests from being spied on on the internet.It also protects your email and postal mail account against spam by using trash mail serives and marking your postal adresses. By a report function user community create a database of address sellers. CookieCooker changes the cookies set by web servers on the own home computer to falsify the user profiles collected by the web servers
Steganos Locknote is the open source software enables users to quickly and easily protect confidential notes, passwords, addresses, phone numbers or other sensitive information. LockNote looks and acts like a normal text file; however, it can only be opened with a password chosen by the user. The encrypted memo can be saved to a USB stick and used while on the road or on another PC
Exif Tag Remover allows you to easily delete the Exif tag and other metadata tags. By doing so before publishing an image you take an active step toward protecting your privacy on the Internet.Jpeg images often contain hidden information about the image and it's creator, so called metadata tags. These tags are written to the files by digital cameras and photo editing software. There are many different tags, such as Exif, IPTC, XMP & Comments.
The test does the following:
- Checks for pop-up windows
- Shows the browser “headers” which is the hidden information your web browser sends a web site.
- Checks to see if port 80 and 16771 are open to see if your browser shows images and if you have a firewall blocking traffic on port 16771.
- Checks your web browser version and determines the capabilities from a database.
- Checks for browser plug-ins that re installed.
- Traces your IP address.
- Determine who owns the domain associated with the IP address of your Internet connection.
- Looks up your the servers that handle mail for the domain associated with the IP address of your Internet connection.
- Determine who manages the IP address of your Internet connection.
- Lists the installed fonts on your computer.
Visit Online Guide to Practical Privacy Tools : http://epic.org/privacy/tools.html