Privacy Tools

sparksspace | Monday, April 20, 2009 | 2 comments

When you go online, you leave tracks all over the place. You could be hanging out with friends on IM, checking out websites, or downloading music.There are various ways that information about you or your activities can be collected without your knowledge or consent:

  • Cookies
  • HTTP
  • Browsers
  • There may already be information about you published on the web
  • Downloading freeware or shareware
  • Search engines
  • Electronic commerce
  • E-mail
  • E-mail and cryptography
  • Spam
  • Dangers of Internet Relay Chat

Tracing on the Internet

 

The best way to cover your tracks on the Internet is to surf on a proxy cascade, a pool of hundreds of servers. This will give you a new IP address, and the connection between your PC and the website would also be heavily encrypted. Using Firefox with an Add-on such as Torpark, or Foxy Proxy is the way to go, or you may use the anonymization service JAP/JonDo.In contrast to normal Firefox operation, Torpark starts without any installation whatsoever

 

Tor is an abbreviation for The Onion Router.It prevents somebody watching your Internet 4-20-2009 8-28-48 AMconnection from learning what sites you visit, and it prevents the sites you visit from  learning your physical location. Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol.

 

dl2   TOR  | JAP/JonDo

 

Protection from  Trojan Spying

 

To encrypt your hard disk  use TrueCrypt.It is a free open-source disk encryption softwaretruecryptda4 for Windows Vista/XP, Mac OS X, and Linux.It can also encrypt a hard disk partition or storage device, such as USB flash drive.No data stored on an encrypted volume can be read (decrypted) without using the correct password or correct encryption key. Until  decrypted, a TrueCrypt volume appears to be nothing more than a series of random numbers. The entire file system is encrypted (i.e., file names,  folder names, contents of every file, and free space).

dl2 TrueCrypt

 

BitLocker Drive Encryption is a full disk encryption feature included with Microsoft's Windows Vista Ultimate, Windows Vista Enterprise, Windows Server 2008 and Windows 7 Ultimate Beta operating systems designed to protect data by providing encryption for entire volumes.

 

Protection from: Telephone TracingWin-animated-Secure

ZfoneTM is a new secure VoIP phone software product which lets you make encrypted phone calls over the Internet. It encrypts your call so that only the other person can hea r you speak.The Zfone software detects when the call starts, and initiates a cryptographic key agreement between the two parties, and then proceeds to encrypt and decrypt the voice packets on the fly.

 

dl2 ZfoneTM

 

OtherTools

CookieCooker is a tool that enables you to protect your behavior and your interests from being spied on on the internet.It also  protects your email and postal mail account against spam by using trash mail serives and marking your postal adresses. By a report function user community create a database of address sellers. CookieCooker changes the cookies set by web servers on the own home computer to falsify the user profiles collected by the web servers

dl2 CookieCooker

 

Steganos Locknote is  the open source software enables users to quickly and easily4-20-2009 9-03-20 PM protect confidential notes, passwords, addresses, phone numbers or other sensitive information. LockNote looks and acts like a normal text file; however, it can only be opened with a password chosen by the user. The encrypted memo can be saved to a USB stick and used while on the road or on another PC

dl2 Steganos-LockNote | Mirror

 

 

Exif Tag Remover allows you to easily delete the Exif tag and other metadata tags. By doing so before publishing an image you take an active step toward protecting your privacy logoon the Internet.Jpeg images often contain hidden information about the image and it's creator, so called metadata tags. These tags are written to the files by digital cameras and  photo editing software. There are many different tags, such as Exif, IPTC, XMP & Comments.

 

 

 dl2 Exif Tag Remover

 

 

 

Analyze your internet connection with 4-20-2009 8-35-25 AM

 

The test does the following:

  • Checks for pop-up windows
  • Shows the browser “headers” which is the hidden information your web browser sends a web site.
  • Checks to see if port 80 and 16771 are open to see if your browser shows images and if you have a firewall blocking traffic on port 16771.
  • Checks your web browser version and determines the capabilities from a database.
  • Checks for browser plug-ins that re installed.
  • Traces your IP address.
  • Determine who owns the domain associated with the IP address of your Internet connection.
  • Looks up your the servers that handle mail for the domain associated with the IP address of your Internet connection.
  • Determine who manages the IP address of your Internet connection.
  • Lists the installed fonts on your computer.

   Check  arrow  4-20-2009 8-34-09 AM

 

Visit Online Guide to Practical Privacy Tools : http://epic.org/privacy/tools.html

Category: , , ,

Welcome to SparksSpace . This blog launched on Dec 2007 with a focus on Technology.You can find latest Computer Software, Tutorials, Tricks,Tips & Software promotions here!

2 comments:

  1. Thanks so much for that information
    since its always better to browse thru proxies
    and i have been using firefox browser so i think i will install this add on torpark

    ReplyDelete
  2. Welcome,Yes torpark(xB Browser) is good one.Version 2.9.1.2 include unspecified updates, enhancements & bug fixes

    ReplyDelete