Guide To Computer Security (2022): Difference between revisions

From NewgonWiki
Jump to navigation Jump to search
(Created page with "Placeholder")
 
(Template)
Line 1: Line 1:
Placeholder
<div style="margin-left: 25px; float: right;">__TOC__</div>The original '''Guide to Computer Security''' was produced by the [[Newgon.com Support Team]] after consultation with the [[Newgon.com]] forum community in 2008. It explained how you could protect data stored on your hard drive and stay anonymous on the internet. The guide may be of interest to people who wish to protect their anonymity and data from adversaries. An updated version is currently under development.
 
==Operating Systems==
 
As of December 2021, Windows 10 is the most popular operating system. It is widely considered to be a very poor choice for data security and privacy. Other options include...
 
===Windows 10===
 
====Securing Windows 10====
 
===Windows 7===
 
====Securing Windows 7====
 
===Linux===
 
===Live CDs===
 
==Data Protection==
 
===Encryption===
 
===Secure Erasure===
 
===Firewalls and Anti-Virus Protection===
 
==Network Security==
 
===Proxies===
 
====Tor====
 
====VPNs====
 
====Web-based proxy servers====
 
===E-mail===
 
===Chat===
 
==Useful Links==

Revision as of 11:43, 5 December 2021

The original Guide to Computer Security was produced by the Newgon.com Support Team after consultation with the Newgon.com forum community in 2008. It explained how you could protect data stored on your hard drive and stay anonymous on the internet. The guide may be of interest to people who wish to protect their anonymity and data from adversaries. An updated version is currently under development.

Operating Systems

As of December 2021, Windows 10 is the most popular operating system. It is widely considered to be a very poor choice for data security and privacy. Other options include...

Windows 10

Securing Windows 10

Windows 7

Securing Windows 7

Linux

Live CDs

Data Protection

Encryption

Secure Erasure

Firewalls and Anti-Virus Protection

Network Security

Proxies

Tor

VPNs

Web-based proxy servers

E-mail

Chat

Useful Links