New Top Menu

Table of Contents

Contents at a Glance … 3

Chapter 1: Introduction … 5

Why You Need This Book
About This Book And How To Use It
How This Book Is Organized
About The Companion Website
About The Symbols Used In This Book
About The Screenshots Used In This Book
About Windows 8


Chapter 2: Risks at a Glance … 9

Cracked Passwords
Online Tracking
Online Profiling
Unsecure Wireless Networks
Scams And Frauds
Identity Theft
Physical Security

Chapter 3: Importance of Good Passwords (Passphrases) … 12

What Makes A Good Passphrase
Automatically Generating Strong Passphrases
A Single Weak Password Can Be Your Undoing (You Should Always Use Different Passphrases)
Formulas And Patterns Are Bad Too
The Domino Effect Of A Single Bad Passphrase
Using Tools To Keep Track Of Your Passphrases

Chapter 4: Minimizing your Online Digital Fingerprints (Learn about Online Tracking & Profiling) … 15

All Your Activities Are Being Tracked And Profiled
How Do They Do This?
IP Address Tracking
Device Fingerprinting
They Are Following You Too
But It’s Even Worse Than You Think
The Shape Of Things To Come
How Not To Leave Obvious Fingerprints In The First Place (Browsing In Private Mode)
Best Web Browser Anti-Tracking Plug-Ins (Add-Ons And Extensions)

Chapter 5: Protecting Yourself from Malware … 21

What Is Malware?
What Is A Virus?
What Is A Worm?
What Is A Trojan?
What Is A Rootkit?
What Are Adware And Spyware?
Using Anti-Malware Apps
Recommended Anti-Malware Apps
Are You Infected?
Suspicious Attachments And Links
Using Spam Filters
Keeping Your Device’s Operating System And Critical Apps Updated
Don’t Hide Your File Extensions
What’s Running On Your System? (Processes And Services) (Advanced Users)
Disabling A Service

Chapter 6: How to Protect Your Privacy and Security on Social Media … 29

Risks Of Being Social
What Facebook Collects About You
Advertisements And Profiling
Basic Facebook Privacy
Settings And Good Habits
Check That Your Most Basic Privacy Settings Are Right
Check How You Look To Other People
Going Through The Privacy Menu
Who Can Find You?
Accepting Friend Requests
What Never To Post
Pause And Reflect Before You Post
Frequently Review Your Facebook Activities (View Your Activity Log)
Monitoring Your Public Online Presence
Recommended Web Browser Plugins To Prevent Facebook Tracking
Social Logins And Single Sign-Ons (SSO)
Auto-Posts And Auto–Shares (The Risks Of Broadcasting)
A Few Words About Facebook Security
Enable Double Authentication With Your Mobile Phone
Linking Your Account To A Mobile Or Other Device
Enabling Login Approvals
Enable Login Notifications In The Security Settings
Detailed Walkthrough Of Other Facebook Privacy Settings (Advanced Users)
How To Limit People’s Access To Your Facebook Photos
Preventing Yourself From Being Tagged
Check And Control Your Likes
Protect Yourself (And Your Friends) From Targeted Advertisements
Risks Posed By Apps And Games
Limit The Access Your Facebook Apps Have To Your Account

Chapter 7: Preventing Identity Theft and Fraud … 49

Protecting Yourself From Phishing And Spoofing Attacks
If You Get Phished In
Safe Online Shopping
Know Your Merchant
‘S’ For Safe
Protecting Yourself From Keyloggers
Understanding Credit Reports And Data Brokers
Checking Your Record With Credit Reporting Agencies
Checking Other Sources (US Only)
More Resources

Chapter 8: Risks and Dangers of Wireless Networks and “Hotspots” … 54

Using Hotspots Securely
Beware Of Spoofers And Phishers
Beware Of Sniffers
Don’t Be Blasé About Your Home Internet Setup
How To Check If Your Home Internet Connection Is Vulnerable And Open To Attack
About War Driving
How To Properly Configure Your Wireless Internet Connection
Changing The Default Username And Passphrase
Disabling Your Router’s Automatic Broadcasting Feature – Service Set Identifier (SSID) Settings
Enable (Stronger) Encryption For Your Wireless Connection
Preventing Stranger’s Devices From Accessing Your Wireless Connection – Using Media Access Codes (Macs)
How To Determine Your Device’s MAC
How To Disable File Sharing

Chapter 9: Securing Your Devices … 61

Lock And Password Protect Your Devices
User Accounts And Privileges
Using A Limited User Account To Browse The Web
Disabling The Windows Guest Account
Chapter Recap
Protecting Your Ports (Advanced Users)
Testing Your Ports

Chapter 10: Keeping Your Children Safe Online … 69

There Is No Substitute For Attentive Parenting
Children Online Security Basics
Web Browsing Protection
Social Media Safety
Monitoring The Online Activities Of Your Children


Chapter 11: Getting Rid of the Trace Information Left Behind by your Web Browser … 72

Records Your Web Browser Keeps And How To Remove And Prevent Them
Web Browser History
Web Browser Cookies
Web Browser Cache
Web Browser Download History
Web Browser Auto Complete
Using Your Web Browser’s Privacy Mode
Protecting Your Bookmarks And Favorites
Using A Separate Web Browser For Sensitive Activities
Using A Separate User Account For Sensitive Activities

Chapter 12: Anonymous Web Browsing – How to Throw the Online Trackers, Profilers and Snoops off your Trail (Proxies & VPNs) … 80

What Is An IP Address?
IP Address = Your Online Fingerprint
The Privacy Risks
How To Browse The Web Anonymously With A Proxy
Easy-To-Use Web Form-Based Proxies
Finding An Open (Public) Web Proxy To Use
Setting Up A Web Proxy In Your Browser
Always Test The Proxy
Using A Premium Web Proxy Service
Anonymous Web Browsing Using A Virtual Private Network (VPN)
How A VPN Works
How To Choose The Best VPN For You
Exit Gateway Locations
Advanced Features
A Word About Technical Specifications
Customer Experience
Recommended VPN Services
Best Overall Choice Especially For Privacy
Best Choice For Beginners
Other Popular VPN Services
Testing Your Web Anonymizing VPN Service: What Is My IP Address?
Resources To Check Your IP Address
How To Use A Web Ripping App To Mass Download Items From The Web Like A Vacuum Cleaner (Advanced Users)

Chapter 13: Using Tor (The Onion Router) to be Anonymous on the Web … 94

What Is Tor?
How Tor Works
Tor May Slow You Down
How To Get Started Using Tor
Tor’s Limitations
Best Practices For Using Tor
Further Tor Topics (Advanced Users)

Chapter 14: Secure, Private and Anonymous Email … 101

How Private Is Your Email Address?
Email Basics
Email Travels Over The Internet As Plain Text
How Email Can Be Traced (Headers)
Recommended Secure Email Services
Using An Alternate Webmail Account For A Basic Level Of Security And Privacy
Setting Up Your Alternate Webmail Account
Using Temporary Email For Private Sign-Ups
How Temporary Email Works
Recommended Disposable Email Services
Web-Based Anonymous Remailers
Recommended Web-Based Remailers
Using Remailers To Send Anonymous Email Messages (Advanced Users)
Using The Proper Remailer ‘Syntax’
How Safe Are Remailers?
Advanced ‘Mixmaster’ Remailer Features
Remailers and Attachments

Chapter 15: Using Encryption to Hide and Keep Safe Your Personal Stuff … 114

Encryption Overview
Encryption Keeps Your Stuff Ultra Secure
A Quick Reminder About The Importance Of Passphrases
How Encryption Apps Work
Encrypted Virtual Drives (EVD)
Encrypting Everything
Recommended Encryption Apps
Encryption And Portable Storage Devices (Drives, USB Memory Sticks And Cards)
Don’t Be Obsessed With Capacity
Using SD And Micro Memory Cards

Chapter 16: How to Download and Share Torrents Using File-Sharing and be Anonymous while Torrenting … 121

What Are Torrents?
It’s Harder To Be Anonymous When Torrenting
How Torrents Work
How To Download Torrents
The Privacy Risks Of Downloading And Sharing Torrents
Copyright Infringement
Malware-Infected And Fake Torrents
How To Find Torrents (With Search Tips)
How To Tell Which Torrents Will Download Fastest
Copyright-Safe Torrent Indexes
Popular Torrent Indexes
General Search Engines
Shield Yourself With An IP Address Protection Tool
Hide Your True IP Address With A Torrent Anonymizing Service
Free Vs. Premium Services
How To Choose A Torrent Anonymizing Service
Supports Torrents (P2P)
Torrent Anonymizing And Web Anonymizing Services Are Different
Exit Gateway Considerations
Advanced Features
Download Speeds
Privacy Policy
Recommended Torrent Anonymizing Service
Other Torrent-Friendly Anonymizing VPN Services
How To Download Torrents Anonymously (In Step-By-Step Details)
Step 1: Start Your IP Address Protection Tool
Step 2: Start Your Torrent Anonymizing Service
Step 3: Confirm What IP Address Your Torrent App Is Transmitting
Checking Your Torrent IP Address
Checking Your Torrent IP Address By Monitoring Your Ports (Advanced Users)
Step 4: Make Sure To Use A Web Anonymizing Service When Visiting Torrent Indexes And Other Websites Related To Your Torrent Activities
Step 5: Start Downloading And Sharing Torrents!
Optional Steps: Encrypt Your Torrent Downloads And Clear Trace Information From Your Device

Chapter 17: Getting Rid of Other Kinds of Trace Information Left Behind on Your Devices … 142

Why You Need To Remove Trace Data From Your Devices
The Kinds Of Trace Information Left Behind On Your Devices
How To Use A Privacy Cleaning App
Recommended Privacy Cleaning Apps For Clearing Unwanted Trace Data
Clearing Your Most Recently Used (MRU) Records
The Records Windows Registry Keeps
Cleaning The Windows Registry Of Trace Data (Advanced Users)
Accessing The Registry
Part 1: Finding The Sensitive Information
Part 2: Removing Sensitive Information From The Registry
Cleaning Difficult Trace Data From Your Windows Device (Advanced Users)
Removing Temporary Files
Finding And Deleting ‘Flash’ Cookies
Flushing Cached DNS Entries
Cleaning Up After Leaky Apps, Compound Files And Private File Systems
Clearing The Windows Paging (Swap) File
How To Edit The Registry To Clear The Paging File
About Forensic Software (Advanced Users)
How Forensic Software Experts Go About Their Task
How To Affordably Examine Your Own Desktop Or Laptop Computer

Chapter 18: Permanently Deleting (Wiping) Your Sensitive Items and Data … 162

What Happens When You Delete An Item?
Using A Shredder For Your Digital Items
Recommended Wiping Apps And Tools
Wiping Apps
File Recovery (Undelete) Apps
Sensitive Data Can Also Be Recovered From Your Hard Drive’s File Slack
How To Fully And Entirely Wipe The Contents Of Storage Media
Recommended Drive Wiping Apps
What Even Wiping (Sometimes) Leaves Behind: Directory Entries (Advanced Users)
Why Directory Entries Remain
Risks From Temporary Files And Filenames
Getting Right Down To The Cluster Level Of Your Drives
Detailed Example Of How To Permanently Delete Files By Wiping Items And Purging Directory Entries (Advanced Users)
Recapping The Lessons Learned

Chapter 19: Secure, Private and Anonymous Usenet … 172

About Usenet, Its Newsgroups And Its Many Downloads
How Usenet Is Organized
What Are You Missing? (Censored Newsgroups)
What Is A Newsreader App?
Recommended Usenet Newsreader Apps
Privacy Risks (How Safe Is Usenet?)
Even Only “Lurking” Leaves A Trail (How Safe Is It To Download From Usenet?)
Posting Is Traceable
Posting Under An Alias Is Still Traceable
Bypassing Usenet Censorship
Using Premium Usenet Services To Access Censored Newsgroups
What To Look For In A Usenet Provider
Recommended Usenet Providers
Other Tips For Effective Usenet Downloading
Bypassing Censorship Using Open News Servers
How To Use An Open News Server
Finding Open News Servers With An NNTP Sniffer (Advanced Users)
Using An NNTP Sniffer App
How To Anonymously Post To Usenet (Advanced Users)
Your Usenet Posts Can Be Traced Back To You
You Can’t Achieve Usenet Anonymity Using A Web Proxy, Tor Or A VPN
How You Can Post Anonymously To Usenet
Using A Web-Based Form To Post Anonymously To Usenet
Post Anonymously To Usenet With A Mail2News Remailer Gateway (Advanced Users)
Using Specialized Apps To Post Anonymously To Usenet (Advanced Users)

Chapter 20: Privacy at your Workplace; Security at your Small Office / Home Office … 188

Don’t Be Stupid At Work
“NSFW” And Personal Web Browsing At Work
Device Security At Work
The Privacy Risks Posed By Printers And Copiers
How Print-Outs Can Be Traced
Which Printers Have Tracking Dots ?
Photocopiers Also Carry Risks
How To Protect Yourself
Small Office / Home Office (SOHO) Considerations
Security And Privacy Strategies For Sohos


Annex A: Online Privacy Checks You Should Do Right Now (Quick Privacy Audit) … 193

General Tracking
What’s Public?
Google (& Youtube)
Torrent File-Sharing
Usenet Newsgroups

Annex B: Device Privacy Checks You Should Do Right Now (How to Snoop on Yourself Doing a Quick Trace Data Audit) … 196

Deleted Items
Most Recently Used Items
Web Browser History
Downloads Folder And History
Web Browser Bookmarks
Web Browser Autocomplete
Web Browser Cookies
Detecting Deleted Items With A File Recovery (Undelete) App
Searching Item Names
Manually Searching The Registry (Advanced Users)

Annex C: Quick and Practical Checklist for Protecting your Internet Privacy, Anonymity and Security … 204

Putting It All Together
The Basics (Achieving Security)
Intermediate (Enhancing Privacy)
Advanced (Reaching Anonymity)
Last Thoughts
A Final Word

# # #

No comments yet.

Leave a Reply

Email is used for major announcements only. For more frequent tips & news, follow us on Facebook.