Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Some basic security considerations.
#1
To help secure yourself when online, I think that these should be an important basic consideration.

Don't download from untrusted sources.

Run any doubtful apps through a Sandbox.

Sandboxie download here:

http://www.sandboxie.com/

Upload whatever possible files for online virus/spyware scanning.

www.virus-trap.org
www.virustotal.com
http://scanner.novirusthanks.org/
www.jotti.org

Use a safer web browser, for example Firefox,

http://www.mozilla.org/

with add-ons such as:

BetterPrivacy

Protects against 'Super'/Flash Cookies.

https://addons.mozilla.org/en-US/firefox/addon/6623

Ghostery

Blocks hidden, 3rd party web bugs.

https://addons.mozilla.org/en-US/firefox/addon/9609

NoScript

Additional protection, blocking of scrpts/plugins, on sites.

https://addons.mozilla.org/en-US/firefox/addon/722

TACO

Sets permanent 'opt-out' cookies from 90 advertising sites.

https://addons.mozilla.org/en-US/firefox/addon/11073

WOT - Web Of Trust

Web site safety ratings.

https://addons.mozilla.org/en-US/firefox/addon/3456

KeySrambler

Protects against keyloggers.

https://addons.mozilla.org/en-US/firefox/addon/3383

KeyScrambler installer software, download here:

http://www.qfxsoftware.com/

Make sure that your anti-virus/spyware definitions are up to date
and use a Firewall and a VPN.

Firewall - Just Google for one, as there are too many to list here. Also, See what other members here are saying about the various firewall's available.

VPN - Virtual Private Network.

www.itshidden.com

No software to install, and free.

NOTE: Although they claim that they do not keep any IP logs, to ensure privacy, and it clearly states on point 5 of their web site:

* Total Privacy, no records of your surfing are kept by us [Paid/Free]

Also:

What information do you store?

We do not store any information as we are not required to do so.

This seems to be in some doubt now, as pointed out by D3N, although I could not see that reference he included in his post here, anywhere on their web site!

But if any keeping of logs is not a major issue to you, just follow the setup instructions at the site, it's really simple and takes a couple of minutes to set it up.

I have found it to be very reliable and I'd prefer to trust them, above anybody else, because of what I said below.

Also, use a degree of common sense.

Safer surfing all!
Reply
#2
Quote:Use a safer web browser, for example Firefox,

Well, I know you might be thinking that Internet Explorer 8 is not safe. However, they have a lot of features that prevent browser hijacking, and prevent exploits.

Firefox is also safe and it is faster then IE8.

Nice tutorial though Smile.
Reply
#3
Some useful information you have given here.

Let's just hope that those who aren't familiar with them read this thread and consider using these programs.
[Image: 3326yvl.jpg]

Reply
#4
Good tutorial. Sandboxie is the one I recommend, safest approach.
Reply
#5
I recommend mentioning anubis for suspicious file analysis. It gives a lot of indepth information about the program. Great guide overall Smile
Reply
#6
(10-05-2009, 02:54 PM)Elektrisk Wrote: I recommend mentioning anubis for suspicious file analysis. It gives a lot of indepth information about the program. Great guide overall Smile

Thanks for putting what I forgot =)
Reply
#7
(10-05-2009, 06:02 AM)Michael Wrote: Well, I know you might be thinking that Internet Explorer 8 is not safe. However, they have a lot of features that prevent browser hijacking, and prevent exploits.

Firefox is also safe and it is faster then IE8.

Nice tutorial though Smile.

Thanks, as far as IE is concerened, I just don't like anythiing about Active Content at all! Can be very dangerous and do just about anything to your PC.
(10-05-2009, 10:37 AM)Skill Wrote: Some useful information you have given here.

Let's just hope that those who aren't familiar with them read this thread and consider using these programs.

Thanks for the positive feedback!
(10-05-2009, 02:45 PM)St0rmW1nd Wrote: Good tutorial. Sandboxie is the one I recommend, safest approach.

Thanks! Yeah, I like it very much,
Reply
#8
Nice tutorial, it will help some people out.
[Image: 29ol3br.png]
Reply
#9
(10-05-2009, 02:54 PM)Elektrisk Wrote: I recommend mentioning anubis for suspicious file analysis. It gives a lot of indepth information about the program. Great guide overall Smile

Sorry for the delay and thanks for the positive response!

To be honest, I did include Anubis in the first instance, but I coudn't get the page to load yesterday, and after having a few goes at it, I thought it best not to include a dead link, even if it was temporary.

A good suggestion though.
(10-05-2009, 07:40 PM)n4q Wrote: Nice tutorial, it will help some people out.

Thank you.
Reply
#10
itshidden is a lie, they wouldn't be able to report us to our ISP if no logs were kept.


Code:
Without prejudice to our other rights under these terms and conditions, if you breach these terms and conditions in any way, we may take such action as we deem appropriate to deal with the breach, including suspending your access to the website, prohibiting you from accessing the website, blocking computers using your IP address from accessing the website, contacting your internet service provider to request that they block your access to the website and/or bringing court proceedings against you.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Top 43 Cyber Security Tools to Improve Your Network Security tk-hassan 0 793 01-29-2020, 04:00 AM
Last Post: tk-hassan
  [Basic Security] Test Your Security Here cheeseburger 22 9,224 04-09-2011, 09:45 PM
Last Post: Resistance
  [Guide]Very basic guide for general security Zurmi 14 6,901 11-02-2010, 10:28 AM
Last Post: Zurmi

Forum Jump:


Users browsing this thread: 4 Guest(s)