This page is a collection of materials related to our books.
Although now long surpassed by our website, the books is what got it all started. 🙂
'Privacy Books by Cogipas.com' contents (select to expand)
Here's the press release for the first edition of our first book on Web Wire.
New Book Helps to Fight Identity Theft, Hackers and other Cyber-Mischief
WEBWIRE – Tuesday, November 1, 2011
Palo Alto, California, USA - Nerel Online is pleased to present the new book, Complete Guide to Internet Privacy, Anonymity & Security (ISBN: 978-3-9503093-0-0). Many home computer users are asking what hope they can have to prevent their computers and personal information from being compromised by cyber-criminals when hackers have recently breached the most sophisticated IT security defenses of the world’s largest corporations and governments. As the new book proves, there is plenty that consumers can do to protect themselves.
The book contains over 300 pages of proven techniques and recommended software (including free software) that enables every day computer users to thwart all manner of risks – whether deterring identity thieves and cyber-criminals, preventing the tracking and profiling capabilities of search engines, social networking sites and powerful Internet players, using a proxy to hide IP addresses, or unblocking censored websites and downloads. The book is a comprehensive and easy-to-read guide with up-to-date information and screenshots that walk readers through the techniques and tools, be it for surfing the web, sharing peer-to-peer (p2p) and torrent downloads, chatting and instant messaging, accessing Usenet newsgroups, or securing information and communications with strong encryption.
Complete Guide to Internet Privacy, Anonymity & Security is currently available through Amazon (http://goo.gl/PqSV7), leading book stores, and the book’s sister website at https://www.cogipas.com. The Facebook page at https://www.facebook.com/cogipas supplements the book with further news and updates.
Table of Contents
Click the toggle below to see the full table of contents for the book.
Quick Links to Kindle ebook:
> USA > UK > Canada > Germany > France > Netherlands > Spain > Italy > Brazil > Japan > Australia > Mexico > India
Click to see Table of Contents
Contents at a Glance ... 3
Chapter 1: Introduction ... 5
Why You Need This Book
About This Book And How To Use It
How This Book Is Organized
About The Companion Website
About The Symbols Used In This Book
About The Screenshots Used In This Book
About Windows 8
PART I - THE BASICS ... 9
Chapter 2: Risks at a Glance ... 9
Unsecure Wireless Networks
Scams And Frauds
Chapter 3: Importance of Good Passwords (Passphrases) ... 12
What Makes A Good Passphrase
Automatically Generating Strong Passphrases
A Single Weak Password Can Be Your Undoing (You Should Always Use Different Passphrases)
Formulas And Patterns Are Bad Too
The Domino Effect Of A Single Bad Passphrase
Using Tools To Keep Track Of Your Passphrases
Chapter 4: Minimizing your Online Digital Fingerprints (Learn about Online Tracking & Profiling) ... 15
All Your Activities Are Being Tracked And Profiled
How Do They Do This?
IP Address Tracking
They Are Following You Too
But It’s Even Worse Than You Think
The Shape Of Things To Come
How Not To Leave Obvious Fingerprints In The First Place (Browsing In Private Mode)
Best Web Browser Anti-Tracking Plug-Ins (Add-Ons And Extensions)
Chapter 5: Protecting Yourself from Malware ... 21
What Is Malware?
What Is A Virus?
What Is A Worm?
What Is A Trojan?
What Is A Rootkit?
What Are Adware And Spyware?
Using Anti-Malware Apps
Recommended Anti-Malware Apps
Are You Infected?
Suspicious Attachments And Links
Using Spam Filters
Keeping Your Device’s Operating System And Critical Apps Updated
Don’t Hide Your File Extensions
What’s Running On Your System? (Processes And Services) (Advanced Users)
Disabling A Service
Chapter 6: How to Protect Your Privacy and Security on Social Media ... 29
Risks Of Being Social
What Facebook Collects About You
Advertisements And Profiling
Basic Facebook Privacy
Settings And Good Habits
Check That Your Most Basic Privacy Settings Are Right
Check How You Look To Other People
Going Through The Privacy Menu
Who Can Find You?
Accepting Friend Requests
What Never To Post
Pause And Reflect Before You Post
Frequently Review Your Facebook Activities (View Your Activity Log)
Monitoring Your Public Online Presence
Recommended Web Browser Plugins To Prevent Facebook Tracking
Social Logins And Single Sign-Ons (SSO)
Auto-Posts And Auto–Shares (The Risks Of Broadcasting)
A Few Words About Facebook Security
Enable Double Authentication With Your Mobile Phone
Linking Your Account To A Mobile Or Other Device
Enabling Login Approvals
Enable Login Notifications In The Security Settings
Detailed Walkthrough Of Other Facebook Privacy Settings (Advanced Users)
How To Limit People’s Access To Your Facebook Photos
Preventing Yourself From Being Tagged
Check And Control Your Likes
Protect Yourself (And Your Friends) From Targeted Advertisements
Risks Posed By Apps And Games
Limit The Access Your Facebook Apps Have To Your Account
Chapter 7: Preventing Identity Theft and Fraud ... 49
Protecting Yourself From Phishing And Spoofing Attacks
If You Get Phished In
Safe Online Shopping
Know Your Merchant
‘S’ For Safe
Protecting Yourself From Keyloggers
Understanding Credit Reports And Data Brokers
Checking Your Record With Credit Reporting Agencies
Checking Other Sources (US Only)
Chapter 8: Risks and Dangers of Wireless Networks and “Hotspots” ... 54
Using Hotspots Securely
Beware Of Spoofers And Phishers
Beware Of Sniffers
Don’t Be Blasé About Your Home Internet Setup
How To Check If Your Home Internet Connection Is Vulnerable And Open To Attack
About War Driving
How To Properly Configure Your Wireless Internet Connection
Changing The Default Username And Passphrase
Disabling Your Router’s Automatic Broadcasting Feature - Service Set Identifier (SSID) Settings
Enable (Stronger) Encryption For Your Wireless Connection
Preventing Stranger’s Devices From Accessing Your Wireless Connection - Using Media Access Codes (Macs)
How To Determine Your Device’s MAC
How To Disable File Sharing
Chapter 9: Securing Your Devices ... 61
Lock And Password Protect Your Devices
User Accounts And Privileges
Using A Limited User Account To Browse The Web
Disabling The Windows Guest Account
Protecting Your Ports (Advanced Users)
Testing Your Ports
Chapter 10: Keeping Your Children Safe Online ... 69
There Is No Substitute For Attentive Parenting
Children Online Security Basics
Web Browsing Protection
Social Media Safety
Monitoring The Online Activities Of Your Children
PART II – ENHANCED METHODS FOR INCREASING YOUR PRIVACY & SECURITY AND HOW TO BE ANONYMOUS ONLINE ... 72
Chapter 11: Getting Rid of the Trace Information Left Behind by your Web Browser ... 72
Records Your Web Browser Keeps And How To Remove And Prevent Them
Web Browser History
Web Browser Cookies
Web Browser Cache
Web Browser Download History
Web Browser Auto Complete
Using Your Web Browser’s Privacy Mode
Protecting Your Bookmarks And Favorites
Using A Separate Web Browser For Sensitive Activities
Using A Separate User Account For Sensitive Activities
Chapter 12: Anonymous Web Browsing – How to Throw the Online Trackers, Profilers and Snoops off your Trail (Proxies & VPNs) ... 80
What Is An IP Address?
IP Address = Your Online Fingerprint
The Privacy Risks
How To Browse The Web Anonymously With A Proxy
Easy-To-Use Web Form-Based Proxies
Finding An Open (Public) Web Proxy To Use
Setting Up A Web Proxy In Your Browser
Always Test The Proxy
Using A Premium Web Proxy Service
Anonymous Web Browsing Using A Virtual Private Network (VPN)
How A VPN Works
How To Choose The Best VPN For You
Exit Gateway Locations
A Word About Technical Specifications
Recommended VPN Services
Best Overall Choice Especially For Privacy
Best Choice For Beginners
Other Popular VPN Services
Testing Your Web Anonymizing VPN Service: What Is My IP Address?
Resources To Check Your IP Address
How To Use A Web Ripping App To Mass Download Items From The Web Like A Vacuum Cleaner (Advanced Users)
Chapter 13: Using Tor (The Onion Router) to be Anonymous on the Web ... 94
What Is Tor?
How Tor Works
Tor May Slow You Down
How To Get Started Using Tor
Best Practices For Using Tor
Further Tor Topics (Advanced Users)
Chapter 14: Secure, Private and Anonymous Email ... 101
How Private Is Your Email Address?
Email Travels Over The Internet As Plain Text
How Email Can Be Traced (Headers)
Recommended Secure Email Services
Using An Alternate Webmail Account For A Basic Level Of Security And Privacy
Setting Up Your Alternate Webmail Account
Using Temporary Email For Private Sign-Ups
How Temporary Email Works
Recommended Disposable Email Services
Web-Based Anonymous Remailers
Recommended Web-Based Remailers
Using Remailers To Send Anonymous Email Messages (Advanced Users)
Using The Proper Remailer ‘Syntax’
How Safe Are Remailers?
Advanced ‘Mixmaster’ Remailer Features
Remailers and Attachments
Chapter 15: Using Encryption to Hide and Keep Safe Your Personal Stuff ... 114
Encryption Keeps Your Stuff Ultra Secure
A Quick Reminder About The Importance Of Passphrases
How Encryption Apps Work
Encrypted Virtual Drives (EVD)
Recommended Encryption Apps
Encryption And Portable Storage Devices (Drives, USB Memory Sticks And Cards)
Don’t Be Obsessed With Capacity
Using SD And Micro Memory Cards
Chapter 16: How to Download and Share Torrents Using File-Sharing and be Anonymous while Torrenting ... 121
What Are Torrents?
It’s Harder To Be Anonymous When Torrenting
How Torrents Work
How To Download Torrents
The Privacy Risks Of Downloading And Sharing Torrents
Malware-Infected And Fake Torrents
How To Find Torrents (With Search Tips)
How To Tell Which Torrents Will Download Fastest
Copyright-Safe Torrent Indexes
Popular Torrent Indexes
General Search Engines
Shield Yourself With An IP Address Protection Tool
Hide Your True IP Address With A Torrent Anonymizing Service
Free Vs. Premium Services
How To Choose A Torrent Anonymizing Service
Supports Torrents (P2P)
Torrent Anonymizing And Web Anonymizing Services Are Different
Exit Gateway Considerations
Recommended Torrent Anonymizing Service
Other Torrent-Friendly Anonymizing VPN Services
How To Download Torrents Anonymously (In Step-By-Step Details)
Step 1: Start Your IP Address Protection Tool
Step 2: Start Your Torrent Anonymizing Service
Step 3: Confirm What IP Address Your Torrent App Is Transmitting
Checking Your Torrent IP Address
Checking Your Torrent IP Address By Monitoring Your Ports (Advanced Users)
Step 4: Make Sure To Use A Web Anonymizing Service When Visiting Torrent Indexes And Other Websites Related To Your Torrent Activities
Step 5: Start Downloading And Sharing Torrents!
Optional Steps: Encrypt Your Torrent Downloads And Clear Trace Information From Your Device
Chapter 17: Getting Rid of Other Kinds of Trace Information Left Behind on Your Devices ... 142
Why You Need To Remove Trace Data From Your Devices
The Kinds Of Trace Information Left Behind On Your Devices
How To Use A Privacy Cleaning App
Recommended Privacy Cleaning Apps For Clearing Unwanted Trace Data
Clearing Your Most Recently Used (MRU) Records
The Records Windows Registry Keeps
Cleaning The Windows Registry Of Trace Data (Advanced Users)
Accessing The Registry
Part 1: Finding The Sensitive Information
Part 2: Removing Sensitive Information From The Registry
Cleaning Difficult Trace Data From Your Windows Device (Advanced Users)
Removing Temporary Files
Finding And Deleting ‘Flash’ Cookies
Flushing Cached DNS Entries
Cleaning Up After Leaky Apps, Compound Files And Private File Systems
Clearing The Windows Paging (Swap) File
How To Edit The Registry To Clear The Paging File
About Forensic Software (Advanced Users)
How Forensic Software Experts Go About Their Task
How To Affordably Examine Your Own Desktop Or Laptop Computer
Chapter 18: Permanently Deleting (Wiping) Your Sensitive Items and Data ... 162
What Happens When You Delete An Item?
Using A Shredder For Your Digital Items
Recommended Wiping Apps And Tools
File Recovery (Undelete) Apps
Sensitive Data Can Also Be Recovered From Your Hard Drive’s File Slack
How To Fully And Entirely Wipe The Contents Of Storage Media
Recommended Drive Wiping Apps
What Even Wiping (Sometimes) Leaves Behind: Directory Entries (Advanced Users)
Why Directory Entries Remain
Risks From Temporary Files And Filenames
Getting Right Down To The Cluster Level Of Your Drives
Detailed Example Of How To Permanently Delete Files By Wiping Items And Purging Directory Entries (Advanced Users)
Recapping The Lessons Learned
Chapter 19: Secure, Private and Anonymous Usenet ... 172
About Usenet, Its Newsgroups And Its Many Downloads
How Usenet Is Organized
What Are You Missing? (Censored Newsgroups)
What Is A Newsreader App?
Recommended Usenet Newsreader Apps
Privacy Risks (How Safe Is Usenet?)
Even Only “Lurking” Leaves A Trail (How Safe Is It To Download From Usenet?)
Posting Is Traceable
Posting Under An Alias Is Still Traceable
Bypassing Usenet Censorship
Using Premium Usenet Services To Access Censored Newsgroups
What To Look For In A Usenet Provider
Recommended Usenet Providers
Other Tips For Effective Usenet Downloading
Bypassing Censorship Using Open News Servers
How To Use An Open News Server
Finding Open News Servers With An NNTP Sniffer (Advanced Users)
Using An NNTP Sniffer App
How To Anonymously Post To Usenet (Advanced Users)
Your Usenet Posts Can Be Traced Back To You
You Can’t Achieve Usenet Anonymity Using A Web Proxy, Tor Or A VPN
How You Can Post Anonymously To Usenet
Using A Web-Based Form To Post Anonymously To Usenet
Post Anonymously To Usenet With A Mail2News Remailer Gateway (Advanced Users)
Using Specialized Apps To Post Anonymously To Usenet (Advanced Users)
Chapter 20: Privacy at your Workplace; Security at your Small Office / Home Office ... 188
Don’t Be Stupid At Work
“NSFW” And Personal Web Browsing At Work
Device Security At Work
The Privacy Risks Posed By Printers And Copiers
How Print-Outs Can Be Traced
Which Printers Have Tracking Dots ?
Photocopiers Also Carry Risks
How To Protect Yourself
Small Office / Home Office (SOHO) Considerations
Security And Privacy Strategies For Sohos
PART III - ANNEXES OF SPECIAL INTEREST ... 193
Annex A: Online Privacy Checks You Should Do Right Now (Quick Privacy Audit) ... 193
Google (& Youtube)
Annex B: Device Privacy Checks You Should Do Right Now (How to Snoop on Yourself Doing a Quick Trace Data Audit) ... 196
Most Recently Used Items
Web Browser History
Downloads Folder And History
Web Browser Bookmarks
Web Browser Autocomplete
Web Browser Cookies
Detecting Deleted Items With A File Recovery (Undelete) App
Searching Item Names
Manually Searching The Registry (Advanced Users)
Annex C: Quick and Practical Checklist for Protecting your Internet Privacy, Anonymity and Security ... 204
Putting It All Together
The Basics (Achieving Security)
Intermediate (Enhancing Privacy)
Advanced (Reaching Anonymity)
A Final Word
Index of Book Updates
At the end of each chapter in 'Complete Guide to Internet Privacy, Anonymity & Security' are links to this site with any updated information.
To search this website, select the magnifying glass icon at upper-right in the top menu.
ch. 2 - Risks at a Glance
Search the site for risks at a glance.
ch. 3 - Importance of Good Passwords (Passphrases)
Lastpass (free) remains highly recommended for managing all your passwords, but another contender has emerged. Dashlane (free) is feature-rich password management app. It's most impressive feature is the ability to easily change one, some or even all your passwords at one time. A great comfort with growing major data breaches becoming a regular occurrence.
Make sure to enable any double-authentication features available for your accounts.
- for Google, go to https://www.google.com/landing/2step/
- for Facebook, go to Settings > Security > Login Approvals (or via https://www.cogipas.com/eb8c)
ch. 4 - Online Tracking and Profiling
Search the site for online tracking and profiling.
ch. 5 - Protecting Yourself from Malware
Search the site for malware.
ch.6 - How to Protect your Privacy on Social Media
Read all about What Not to Post on Facebook and a Detailed Walkthrough of Facebook's Privacy Settings.
You can also search the site for posts about social media.
ch. 7 - Preventing Identity Theft and Fraud
Search the site for posts about identity theft.
A reader made us aware that with Home Premium versions of Windows 7, you may not be able to create a new User account named Administrator.
The instructions and screenshots in chapter 7 of the book were done with Windows 7 Ultimate, not Home Premium. Following those instructions with Windows 7 Home Premium may result in an error message like that shown in the next screenshot.
If you use Windows Home Premium and get this error when trying to set up a decoy “Administrator” account, instead name the decoy account “Admin” (see the next screenshots) or something similar that will lead hackers to believe that it is the Administrator account.
ch. 8 - Risks and Dangers of Using Wireless Networks and “Hotspots” (Public Wi-Fi)
Search the site for posts about Wi-Fi.
ch. 9 - Securing Your Devices
Search the site for posts about device security.
ch. 10 - Keeping Your Children Safe from Online Dangers
Children are a growing target group for hackers and marketers alike. At times the Internet can be a very bad neighborhood from which you need to steer and guide your children away.
Search the site for posts about children.
ch. 11 - How to Get Rid of Web Browser Trace Information
It's hard to go wrong with the free & open source privacy clearing tool, BleachBit.
In addition to free tools, our book also recommended premium privacy protection app, Privacy Eraser Pro.
However, recent improvements in CCleaner make it a better choice as a premium history cleaning app. It is a solid and more user-friendly choice for clearing history, cache, cookie, MRU, temporary, log files and much more from your computer and other devices.
If your budget is stretched, don't worry as CCleaner is also available in a free version too.
ch. 12 - Anonymous Web Browsing
Search the site for related terms such as "anonymous" or "vpn".
ch. 13 - Using Tor (The Onion Router) to be Anonymous on the Web
As mentioned at the end of the book's chapter about using Tor (The Onion Router), perhaps you want to delve a little deeper into Tor or its wider community. If so, please see these Tor-related materials which cover:
- How to Configure Relays
- How to Access Tor if you are Blocked
- How to Help a Blocked Friend Access Tor
- Accessing Tor through a Proxy
More About TAILS
The TAILS (free & open source) live operating system was mentioned as in a 'Top Tip' in the chapter. TAILS represents the ultimate in online anonymity (it’s what Edward Snowden used), but it is a little complicated and for this reason is for advanced users only. A live operating system means one you can boot directly into from a computer from a USB or CD, leaving no traces of your activities behind. TAILS also forces all connections through Tor.
ch. 14 - Secure, Private and Anonymous Email
In addition to the free services offering disposable temporary email addresses, similar free services are available for bypassing website registration processes (saving you from sharing your email address). Check out BugMeNot and Login2.
Some readers have suggested that, like AnonymousSpeech and HushMail mentioned in the book, CounterMail is a good premium secure email provider.
Although instant messaging is different from email, it's worth mentioning the free app Off-the-record “OTR” should you wish to engage in any secure and anonymous real-time chatting online.
ch. 15 - Using Encryption
Search the site for posts about encryption.
ch. 16 - How to Download and Share Torrents
In addition to PIA and PureVPN as recommended torrent-friendly VPNs, IPVanish and NordVPN (see review) also cater to torrent users, boast some impressive privacy-enhancing features and are based outside of the US.
Recommended torrent file-sharing app µTorrent (free) received a beating recently from bundling some adware in its app. They quickly retreated and I believe that they learned their lesson, but if you are still leery, qBittorrent (free) is a great alternate file-sharing client app.
The book suggested TorGuard as a free resource for confirming that your IP address is masked when torrent file-sharing with your anonymizing VPN service enabled. Two additional free resources are IPLeak.net and ipMagnet.
ch. 17 - Secure, Private and Anonymous Usenet
In addition to the premium and uncensored Usenet providers mentioned in the book, we can further recommend:
- EasyNews a Usenet provider with a web browser-based interface, excellent especially for Usenet beginners. See the detailed EasyNews review.
- XLned a solid Usenet provider based outside the USA in the Netherlands
Suitable only for advanced users, SABnzbd (free) is an excellent automated Usenet app. Intermediate users should stick with the recommendations in the book, including Agent and GrabIt. Beginners may wish to use a web-based Usenet portal, such as EasyNews mentioned above, which make Usenet as easy as Google (search, preview, watch/download).
ch. 18 - Getting Rid of Trace Information Left Behind on Your Devices
Search the site for posts about trace data.
ch. 19 - Permanently Deleting (Wiping) Items and Data
Another good wiping app is CCleaner (free & premium versions). It offers easy wiping of files, drive free space and even entire storage media.
ch. 20 - Privacy at your Workplace; Security at your Small Office / Home Office (SOHO)
At this time, there are no updates or additional information for this chapter.
Annex A - Online Privacy Checks You Should Do Right Now
See our comprehensive list of Online Privacy Checks.
Annex B - Checking Your Device Privacy
Search the site for device privacy.
Annex C - Privacy Protection (Quick Start)
See our Advanced Privacy Protection and Online Anonymity Tips.
* * *
Notes About the 1st Edition
The following issues have been identified in the book.
- page 191: in the last paragraph the cross reference to "page Error! Bookmark not defined." should be instead to "page 196".
If you find more, please send an email to info "at" cogipas "dot" com.
Links - A chapter-by-chapter list of all the links in the book to save you from typing them into your browser. To access these materials you will be prompted for a username and password,
- For the username use "cogipas" (no quotes)
- For the password turn to the copyright page of the book (page 2) and use the website address that appears in the paranthesis on the second line of the page; so in the format "www.xxxxx-xxxxxx.com" (no quotes) as highlighted here.
Data Privacy Day Special: Free 250-page Kindle eBook
Data Privacy Day has to be among the lamest “international holidays” ever. To make it a little less lame, we are offering the Kindle version of our 250+ page book, ‘Complete Guide to Internet Privacy, Anonymity & Security’ absolutely free.
The book is Windows7-oriented and includes robust chapters on:
- online tracking & profiling
- social media safety
- private web browsing
- anonymous torrent-file sharing
- uncensored Usenet newsgroups
- how to keep your computer and other devices safe from snoops
The book will be free only on Data Privacy Day (January 28th) but, to cater to all time zones, also for a few hours before and after. Get your free copy today!
And remember, you do not need to have a Kindle device to read Kindle ebooks. Free Kindle reading apps are available for your Windows or Apple computer as well as for your Android or iOS tablets and smartphones.
As always, your book reviews would be much appreciated. Please consider assigning a star rating and adding a sentence or two as it really helps. Thank you!
Note: You will only see it for free by accessing the Amazon site for your country – unless using a VPN or SmartDNS 😉
Updated Kindle version Free until 29 December 2014
Complete Guide to Internet Privacy, Anonymity & Security (COGIPAS for short) was originally published almost 3 years ago and earned a 4+ star rating on Amazon in both the US and UK. Earlier this week, a second edition was published for Kindle with a major update of materials including robust chapters on online tracking & profiling, social media, Tor (a free web anonymizing service), torrent-file sharing and Usenet newsgroups.
Over the period 25 to 29 December the Kindle ebook is being made available for FREE across all Amazon sites including US, UK, Canada, and Germany. I do this primarily to benefit existing readers (grab your free updated copy), but also to reach a new audience.
And remember, you do not need to have a Kindle device to read Kindle ebooks. Free apps are available for your Windows or Apple computer as well as for your Android or iOS tablets and smartphones.
Your reviews would be much appreciated. Please consider assigning a star rating and adding a sentence or two as it really helps. Thank you!
Update: In the first 2 days of the 5-day promotion, over six-hundred and fifty (650) copies were downloaded, so get yours today.
New Edition! A fully updated and revised 2nd edition (2015) has now been released.
What's Covered in the Book
Whether you want to keep your Internet and computing activities away from the prying eyes of hackers, snoops, rogue ISPs, Big Brother, spying competitors, or any other unwelcome third-parties ... or are simply interested to learn more about Internet privacy, anonymity and security ...
The book is a comprehensive and easy-to-read guide with up-to-date information and screenshots that explain to readers the latest techniques and software tools needed to effectively counter these threats, whether for surfing the web, sharing peer-to-peer (p2p) and torrent downloads, chatting and instant messaging, using Usenet newsgroups or securing data on a computer with strong encryption. For example:
- the myriad of risks to your privacy and why they are important, all set out in plain English.
- learn how to conceal your IP address while surfing the Internet and protect from being tracked and profiled.
- learn how to safely use social networking sites, like Facebook, including the information you should never post.
- download torrents using peer-to-peer (P2P) software as privately and securely as possible, including how to mask your IP address while doing so.
- passwords are dead, so learn to generate strong passphrases for your online accounts and software that will thwart would-be hackers and their brute force attacks.
- use email and webmail accounts and learn about anonymous email services and remailers.
- learn why and how to cover your tracks purging unwanted trace information left on your computer by using washing software.
- make sure to securely delete your data - including hidden data in your computer’s unused clusters, system files and directory entries - and make it unrecoverable by snoops and hackers.
- use strong encryption to keep your hard drive and downloads private and secure, including from powerful computer forensic software.
- how to disable certain risky privacy settings like your browser’s cookies, caching and history lists
- safely take part in online chatting & IRC and instant messaging, using the best software and while masking your IP address.
- participate and contribute to Usenet newsgroups ONLY after you fully understand all of the privacy risks and learn how to strip out your IP address from posts.
Special interest topics are also covered such as how to protect your children and tell if a loved one is up to no good on their computer, as well as specific tips for small office / home office (SOHO) users.
Our Mention in The European Financial Review
Cogipas.com is pleased to announce that excerpts of its leading Internet privacy book were recently published in the European Financial Review, both the glossy print magazine and website. Check it Out! #cogipas #privacy
Here's the audio stream of my radio interview on KUCI 88.9 FM in Irvine, California (which aired on 4 June 2012) about the book.
To play it, just click directly here (streaming audio) or on the ‘Listen to this interview‘ link at the page Privacy Piracy > Matthew Bailey. It's about 30 minutes in duration.
Now available for Kindle, Complete Guide to Anonymous Torrent Downloading and File-sharing.
Torrent file-sharing is a quick and easy way to obtain all kinds of great media on the Internet, ranging from full-length movies, music files, video clips, ebooks, documents, apps, software programs, images, documents to basically any digital content you can think of.
Downloading and sharing torrents can feel anonymous, but this is deceptive. Unless you take some extra steps to protect your privacy while downloading and sharing torrents, the prying eyes of unwelcome snoops can eavesdrop, monitor and record your torrenting activities.
This Guide is your one-stop for how to download torrents anonymously. It briefly explains the technology behind torrents, outlines the risks you take when downloading and sharing torrents, recommends the best ways to find torrents, and takes you step-by-step through the process of downloading and sharing torrents anonymously, protecting your privacy throughout.
Much of the information available on this important topic is vague or glosses over important details. But if you want to be anonymous while downloading torrents and file-sharing you need reliable and detailed information. Being anonymous primarily means protecting your IP address (your online digital fingerprint) from disclosure. “Use a VPN” is too often the generic advice, but this leaves out too many important details. (For those new to the concept, a VPN is a service you can use to help keep you anonymous online). Staying anonymous for torrenting takes more than this.
For example, did you know that your web browsing habits can be used to learn about your torrent activities? Similarly, you rarely see any discussion of the offline privacy risks posed by downloading torrents or how to address these risks. As you can see, staying anonymous when downloading and sharing torrents takes some additional steps to protect yourself.
It is difficult to find reliable and accurate information because many online “reviews” for anonymizing services and VPNs are biased and hiding the fact that your clicks generate commissions for them. As a result, you cannot trust a lot of the information out there about anonymizing services and VPNs.
This no-nonsense Guide will take you through the entire process, step-by-step and with helpful screenshots and recommendations along the way. This Guide’s sole focus is torrents and only torrents, so get it today and start downloading and sharing torrents anonymously in confidence.
If torrents are a new concept to you, don’t worry, they are explained in the Guide without any fluff or technobabble. At the same time, even the most advanced users will learn new tips and tricks in this Guide.
Either way, from beginner to advanced, with the help of this Guide you will be downloading torrents anonymously like a pro in no time.
Get your copy now on Kindle at
- Amazon USA
- Amazon UK
- and other Amazon country sites
Interesting Internet Privacy Reading
If you want to further explore the topics found in our books and on our website, check out these Internet privacy books.
|Complete Guide to Internet Privacy, Anonymity & Security
Our founder's leading book has been fully updated and revised, and is available from Amazon and other leading book retailers in both Kindle and paperback (also on Amazon.co.uk and other Amazon sites).
|Hiding from the Internet: Eliminating Personal Online Information
See our full review: "Worth Every Penny: provides plenty of information and practical tactics for turning the tide in the battle for privacy"
|The Smart Girl's Guide to Privacy: A Privacy Guide for the Rest of Us
See our full review:"Bravo on an excellent and practical Internet privacy book relevant to everyone"
|Incognito Toolkit (subtitle: Tools, Apps, and Creative Methods for Remaining Anonymous, Private, and Secure While Communicating, Publishing, Buying, and Researching Online)
See our full review: "Full of good information to put you on the path to achieving anonymity"
|How to be Anonymous Online: A Step-By-Step Manual (deals mostly with TAILS and BitCoin)|
|Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World by leading Internet security author Bruce Schneier.|
|Take Control of Your Online Privacy (more Mac focused)|