Guide to Computer Security (Archive): Difference between revisions

From NewgonWiki
Jump to navigation Jump to search
mNo edit summary
No edit summary
Line 1: Line 1:
[[Media:Guide_to_Computer_Security.pdf‎|'''Guide to Computer Security''']] was produced by tpka [[Colonel Abrams]] after a consultation with the [[Newgon.com]] forum community. It explains how you can protect data stored on your hard drive and stay anonymous on the internet. The guide is a must-read for any law-abiding [[childlover]] or youth who is concerned with avoiding the scrutiny of [[Vigilantism|cyber-vigilantes]] and corrupt law enforcement officers.
[[Media:Guide_to_Computer_Security.pdf‎|'''Guide to Computer Security''']] was produced by tpka [[Colonel Abrams]] after a consultation with the [[Newgon.com]] forum community. It explains how you can protect data stored on your hard drive and stay anonymous on the internet. The guide should be read by anyone who has a special interest in avoiding the scrutiny of [[Vigilantism|cyber-vigilantes]] and corrupt law enforcement officers. It should ''not'', however be seen as a vital first step to participation in [[Newgon.com]] or any similar websites.


The guide is divided into the following sections:
The guide is divided into the following sections:

Revision as of 04:44, 21 November 2008

Guide to Computer Security was produced by tpka Colonel Abrams after a consultation with the Newgon.com forum community. It explains how you can protect data stored on your hard drive and stay anonymous on the internet. The guide should be read by anyone who has a special interest in avoiding the scrutiny of cyber-vigilantes and corrupt law enforcement officers. It should not, however be seen as a vital first step to participation in Newgon.com or any similar websites.

The guide is divided into the following sections:

Section 1: Protecting data stored on your hard drive

1.1. Locking down Windows

1.2. Avoiding Malware

1.3. Cleaning / Erasing

1.4. Encryption

1.5. Security Note on USB Drives and Wear-Leveling

1.6. Other Methods

1.6.1. Live CDs
1.6.2. Portable Applications
1.6.3. System Drive Emulation software
1.6.4. Virtual Machines

Section 2: Protecting data while in transit over networks (Internet, Email, etc).

2.1. Email

2.1.1. PGP

2.2. Web-Surfing

2.2.1. Free proxies
2.2.2. Commercial software
2.2.3. Tor

2.3. Other Network Usage (Chat, Anonymous Remailers, File-Sharing)

Section 3: Useful Links

Full guide PDF

Guide to Computer Security