Table of Contents

Contents at a Glance … 3

Chapter 1: Introduction … 5

Why You Need This Book
About This Book And How To Use It
How This Book Is Organized
About The Companion Website
About The Symbols Used In This Book
About The Screenshots Used In This Book
About Windows 8

PART I – THE BASICS … 9

Chapter 2: Risks at a Glance … 9

Cracked Passwords
Online Tracking
Online Profiling
Malware
Unsecure Wireless Networks
Scams And Frauds
Phishing
Spoofing
Identity Theft
Physical Security
Spam
Adversaries

Chapter 3: Importance of Good Passwords (Passphrases) … 12

Introduction 12
What Makes A Good Passphrase 12
Automatically Generating Strong Passphrases 13
A Single Weak Password Can Be Your Undoing (You Should Always Use Different Passphrases) 13
Formulas And Patterns Are Bad Too 13
The Domino Effect Of A Single Bad Passphrase 13
Using Tools To Keep Track Of Your Passphrases 14

Chapter 4: Minimizing your Online Digital Fingerprints (Learn about Online Tracking & Profiling) … 15

Introduction 15
All Your Activities Are Being Tracked And Profiled 15
How Do They Do This? 16
IP Address Tracking 16
Device Fingerprinting 16
They Are Following You Too 16
But It’s Even Worse Than You Think 17
The Shape Of Things To Come 18
How Not To Leave Obvious Fingerprints In The First Place (Browsing In Private Mode) 18
Best Web Browser Anti-Tracking Plug-Ins (Add-Ons And Extensions) 19

Chapter 5: Protecting Yourself from Malware … 21

What Is Malware? 21
What Is A Virus? 21
What Is A Worm? 21
What Is A Trojan? 22
What Is A Rootkit? 22
What Are Adware And Spyware? 23
Using Anti-Malware Apps 23
Recommended Anti-Malware Apps 23
Are You Infected? 23
Suspicious Attachments And Links 24
Using Spam Filters 24
Keeping Your Device’s Operating System And Critical Apps Updated 24
Don’t Hide Your File Extensions 25
What’s Running On Your System? (Processes And Services) (Advanced Users) 26
Disabling A Service 28

Chapter 6: How to Protect Your Privacy and Security on Social Media … 29

Introduction 29
Risks Of Being Social 29
What Facebook Collects About You 29
Advertisements And Profiling 30
Basic Facebook Privacy 31
Introduction 31
Settings And Good Habits 31
Check That Your Most Basic Privacy Settings Are Right 32
Check How You Look To Other People 32
Going Through The Privacy Menu 33
Who Can Find You? 34
Accepting Friend Requests 34
What Never To Post 35
Pause And Reflect Before You Post 36
Frequently Review Your Facebook Activities (View Your Activity Log) 37
Monitoring Your Public Online Presence 37
Recommended Web Browser Plugins To Prevent Facebook Tracking 38
Social Logins And Single Sign-Ons (SSO) 38
Auto-Posts And Auto–Shares (The Risks Of Broadcasting) 39
A Few Words About Facebook Security 40
Enable Double Authentication With Your Mobile Phone 40
Linking Your Account To A Mobile Or Other Device 40
Enabling Login Approvals 41
Enable Login Notifications In The Security Settings 42
Detailed Walkthrough Of Other Facebook Privacy Settings (Advanced Users) 43
How To Limit People’s Access To Your Facebook Photos 43
Preventing Yourself From Being Tagged 44
Check And Control Your Likes 46
Protect Yourself (And Your Friends) From Targeted Advertisements 46
Risks Posed By Apps And Games 47
Limit The Access Your Facebook Apps Have To Your Account 47

Chapter 7: Preventing Identity Theft and Fraud … 49

Introduction 49
Protecting Yourself From Phishing And Spoofing Attacks 49
If You Get Phished In 50
Safe Online Shopping 50
Know Your Merchant 50
‘S’ For Safe 51
Protecting Yourself From Keyloggers 51
Understanding Credit Reports And Data Brokers 52
Checking Your Record With Credit Reporting Agencies 52
Checking Other Sources (US Only) 52
More Resources 53

Chapter 8: Risks and Dangers of Wireless Networks and “Hotspots” … 54

Introduction 54
Using Hotspots Securely 54
Beware Of Spoofers And Phishers 54
Beware Of Sniffers 55
Don’t Be Blasé About Your Home Internet Setup 55
How To Check If Your Home Internet Connection Is Vulnerable And Open To Attack 56
About War Driving 56
How To Properly Configure Your Wireless Internet Connection 56
Changing The Default Username And Passphrase 56
Disabling Your Router’s Automatic Broadcasting Feature – Service Set Identifier (SSID) Settings 57
Enable (Stronger) Encryption For Your Wireless Connection 57
Preventing Stranger’s Devices From Accessing Your Wireless Connection – Using Media Access Codes (Macs) 57
How To Determine Your Device’s MAC 58
How To Disable File Sharing 59

Chapter 9: Securing Your Devices … 61

Introduction 61
Lock And Password Protect Your Devices 61
User Accounts And Privileges 61
Using A Limited User Account To Browse The Web 64
Disabling The Windows Guest Account 65
Chapter Recap 66
Protecting Your Ports (Advanced Users) 66
Testing Your Ports 67

Chapter 10: Keeping Your Children Safe Online … 69

Introduction 69
There Is No Substitute For Attentive Parenting 69
Children Online Security Basics 69
Web Browsing Protection 70
Social Media Safety 70
Monitoring The Online Activities Of Your Children 70

PART II – ENHANCED METHODS FOR INCREASING YOUR PRIVACY & SECURITY AND HOW TO BE ANONYMOUS ONLINE … 72

Chapter 11: Getting Rid of the Trace Information Left Behind by your Web Browser … 72

Introduction 72
Records Your Web Browser Keeps And How To Remove And Prevent Them 72
Web Browser History 72
Web Browser Cookies 74
Web Browser Cache 75
Web Browser Download History 76
Web Browser Auto Complete 76
Using Your Web Browser’s Privacy Mode 76
Protecting Your Bookmarks And Favorites 77
Using A Separate Web Browser For Sensitive Activities 78
Using A Separate User Account For Sensitive Activities 78

Chapter 12: Anonymous Web Browsing – How to Throw the Online Trackers, Profilers and Snoops off your Trail (Proxies & VPNs) … 80

Introduction 80
What Is An IP Address? 80
IP Address = Your Online Fingerprint 81
The Privacy Risks 81
How To Browse The Web Anonymously With A Proxy 81
Easy-To-Use Web Form-Based Proxies 82
Finding An Open (Public) Web Proxy To Use 83
Setting Up A Web Proxy In Your Browser 83
Always Test The Proxy 84
Using A Premium Web Proxy Service 84
Anonymous Web Browsing Using A Virtual Private Network (VPN) 85
How A VPN Works 85
How To Choose The Best VPN For You 86
Cost 86
Exit Gateway Locations 86
Advanced Features 87
A Word About Technical Specifications 87
Customer Experience 87
Recommended VPN Services 88
Best Overall Choice Especially For Privacy 88
Best Choice For Beginners 89
Other Popular VPN Services 91
Testing Your Web Anonymizing VPN Service: What Is My IP Address? 91
Resources To Check Your IP Address 91
How To Use A Web Ripping App To Mass Download Items From The Web Like A Vacuum Cleaner (Advanced Users) 92

Chapter 13: Using Tor (The Onion Router) to be Anonymous on the Web … 94

Introduction 94
What Is Tor? 94
How Tor Works 94
Tor May Slow You Down 95
How To Get Started Using Tor 95
Tor’s Limitations 98
Best Practices For Using Tor 99
Further Tor Topics (Advanced Users) 100

Chapter 14: Secure, Private and Anonymous Email … 101

Introduction 101
How Private Is Your Email Address? 101
Email Basics 102
Email Travels Over The Internet As Plain Text 102
How Email Can Be Traced (Headers) 103
Recommended Secure Email Services 104
Using An Alternate Webmail Account For A Basic Level Of Security And Privacy 105
Setting Up Your Alternate Webmail Account 106
Using Temporary Email For Private Sign-Ups 106
Introduction 106
How Temporary Email Works 107
Recommended Disposable Email Services 108
Web-Based Anonymous Remailers 108
Recommended Web-Based Remailers 109
Using Remailers To Send Anonymous Email Messages (Advanced Users) 110
Using The Proper Remailer ‘Syntax’ 111
How Safe Are Remailers? 112
Advanced ‘Mixmaster’ Remailer Features 112
Remailers And Attachments 113

Chapter 15: Using Encryption to Hide and Keep Safe Your Personal Stuff … 114

Introduction 114
Encryption Overview 114
Encryption Keeps Your Stuff Ultra Secure 115
A Quick Reminder About The Importance Of Passphrases 116
How Encryption Apps Work 116
Encrypted Virtual Drives (EVD) 116
Encrypting Everything 117
Recommended Encryption Apps 118
Encryption And Portable Storage Devices (Drives, USB Memory Sticks And Cards) 118
Don’t Be Obsessed With Capacity 118
Using SD And Micro Memory Cards 119

Chapter 16: How to Download and Share Torrents Using File-Sharing and be Anonymous while Torrenting … 121

Introduction 121
What Are Torrents? 121
It’s Harder To Be Anonymous When Torrenting 122
How Torrents Work 122
How To Download Torrents 123
The Privacy Risks Of Downloading And Sharing Torrents 125
Copyright Infringement 126
Malware-Infected And Fake Torrents 126
How To Find Torrents (With Search Tips) 127
How To Tell Which Torrents Will Download Fastest 127
Copyright-Safe Torrent Indexes 127
Popular Torrent Indexes 128
General Search Engines 128
Shield Yourself With An IP Address Protection Tool 129
Hide Your True IP Address With A Torrent Anonymizing Service 130
Free Vs. Premium Services 130
How To Choose A Torrent Anonymizing Service 131
Supports Torrents (P2P) 131
Torrent Anonymizing And Web Anonymizing Services Are Different 131
Exit Gateway Considerations 132
Advanced Features 132
Download Speeds 132
Privacy Policy 132
Recommended Torrent Anonymizing Service 133
Other Torrent-Friendly Anonymizing VPN Services 133
How To Download Torrents Anonymously (In Step-By-Step Details) 134
Introduction 134
Step 1: Start Your IP Address Protection Tool 134
Step 2: Start Your Torrent Anonymizing Service 134
Step 3: Confirm What IP Address Your Torrent App Is Transmitting 135
Checking Your Torrent IP Address 136
Checking Your Torrent IP Address By Monitoring Your Ports (Advanced Users) 139
Step 4: Make Sure To Use A Web Anonymizing Service When Visiting Torrent Indexes And Other Websites Related To Your Torrent Activities 140
Step 5: Start Downloading And Sharing Torrents! 141
Optional Steps: Encrypt Your Torrent Downloads And Clear Trace Information From Your Device 141

Chapter 17: Getting Rid of Other Kinds of Trace Information Left Behind on Your Devices … 142

Introduction 142
Why You Need To Remove Trace Data From Your Devices 142
The Kinds Of Trace Information Left Behind On Your Devices 142
How To Use A Privacy Cleaning App 143
Recommended Privacy Cleaning Apps For Clearing Unwanted Trace Data 143
Clearing Your Most Recently Used (MRU) Records 145
The Records Windows Registry Keeps 147
Cleaning The Windows Registry Of Trace Data (Advanced Users) 148
Introduction 148
Accessing The Registry 148
Part 1: Finding The Sensitive Information 148
Part 2: Removing Sensitive Information From The Registry 150
Cleaning Difficult Trace Data From Your Windows Device (Advanced Users) 151
Removing Temporary Files 151
Finding And Deleting ‘Flash’ Cookies 152
Flushing Cached DNS Entries 153
Cleaning Up After Leaky Apps, Compound Files And Private File Systems 156
Clearing The Windows Paging (Swap) File 156
How To Edit The Registry To Clear The Paging File 158
About Forensic Software (Advanced Users) 159
Introduction 159
How Forensic Software Experts Go About Their Task 160
How To Affordably Examine Your Own Desktop Or Laptop Computer 160

Chapter 18: Permanently Deleting (Wiping) Your Sensitive Items and Data … 162

Introduction 162
What Happens When You Delete An Item? 162
Using A Shredder For Your Digital Items 164
Recommended Wiping Apps And Tools 164
Wiping Apps 164
File Recovery (Undelete) Apps 165
Sensitive Data Can Also Be Recovered From Your Hard Drive’s File Slack 166
How To Fully And Entirely Wipe The Contents Of Storage Media 167
Recommended Drive Wiping Apps 167
What Even Wiping (Sometimes) Leaves Behind: Directory Entries (Advanced Users) 167
Introduction 168
Why Directory Entries Remain 168
Risks From Temporary Files And Filenames 169
Getting Right Down To The Cluster Level Of Your Drives 169
Detailed Example Of How To Permanently Delete Files By Wiping Items And Purging Directory Entries (Advanced Users) 170
Recapping The Lessons Learned 171

Chapter 19: Secure, Private and Anonymous Usenet … 172

Introduction 172
About Usenet, Its Newsgroups And Its Many Downloads 172
How Usenet Is Organized 172
What Are You Missing? (Censored Newsgroups) 173
What Is A Newsreader App? 173
Recommended Usenet Newsreader Apps 175
Privacy Risks (How Safe Is Usenet?) 175
Even Only “Lurking” Leaves A Trail (How Safe Is It To Download From Usenet?) 175
Posting Is Traceable 176
Posting Under An Alias Is Still Traceable 177
Bypassing Usenet Censorship 177
Using Premium Usenet Services To Access Censored Newsgroups 177
What To Look For In A Usenet Provider 178
Recommended Usenet Providers 178
Other Tips For Effective Usenet Downloading 179
Bypassing Censorship Using Open News Servers 179
How To Use An Open News Server 180
Finding Open News Servers With An NNTP Sniffer (Advanced Users) 180
Using An NNTP Sniffer App 180
How To Anonymously Post To Usenet (Advanced Users) 183
Introduction 183
Your Usenet Posts Can Be Traced Back To You 183
You Can’t Achieve Usenet Anonymity Using A Web Proxy, Tor Or A VPN 184
How You Can Post Anonymously To Usenet 184
Using A Web-Based Form To Post Anonymously To Usenet 184
Post Anonymously To Usenet With A Mail2News Remailer Gateway (Advanced Users) 186
Using Specialized Apps To Post Anonymously To Usenet (Advanced Users) 186

Chapter 20: Privacy at your Workplace; Security at your Small Office / Home Office … 188

Introduction 188
Don’t Be Stupid At Work 188
“NSFW” And Personal Web Browsing At Work 188
Device Security At Work 189
The Privacy Risks Posed By Printers And Copiers 189
How Print-Outs Can Be Traced 190
Which Printers Have Tracking Dots ? 190
Photocopiers Also Carry Risks 190
How To Protect Yourself 190
Small Office / Home Office (SOHO) Considerations 190
Security And Privacy Strategies For Sohos 191

PART III – ANNEXES OF SPECIAL INTEREST … 193

Annex A: Online Privacy Checks You Should Do Right Now (Quick Privacy Audit) … 193

General Tracking 193
What’s Public? 193
Google (& Youtube) 193
Email 194
Facebook 194
Torrent File-Sharing 194
Usenet Newsgroups 194

Annex B: Device Privacy Checks You Should Do Right Now (How to Snoop on Yourself Doing a Quick Trace Data Audit) … 196

Introduction 196
Deleted Items 196
Most Recently Used Items 197
Web Browser History 197
Downloads Folder And History 198
Web Browser Bookmarks 198
Web Browser Autocomplete 198
Web Browser Cookies 199
Detecting Deleted Items With A File Recovery (Undelete) App 199
Searching Item Names 200
Manually Searching The Registry (Advanced Users) 201

Annex C: Quick and Practical Checklist for Protecting your Internet Privacy, Anonymity and Security … 204

Putting It All Together 204
The Basics (Achieving Security) 204
Intermediate (Enhancing Privacy) 205
Advanced (Reaching Anonymity) 205
Last Thoughts 206
A Final Word 208

# # #

css.php