Main Menu |
Most Favorited Images |
Recently Uploaded Images |
Most Liked Images |
Top Reviewers |
cockalatte |
646 |
MoneyManMatt |
490 |
Still Looking |
399 |
samcruz |
399 |
Jon Bon |
396 |
Harley Diablo |
377 |
honest_abe |
362 |
DFW_Ladies_Man |
313 |
Chung Tran |
288 |
lupegarland |
287 |
nicemusic |
285 |
You&Me |
281 |
Starscream66 |
279 |
George Spelvin |
265 |
sharkman29 |
255 |
|
Top Posters |
DallasRain | 70795 | biomed1 | 63285 | Yssup Rider | 61016 | gman44 | 53296 | LexusLover | 51038 | offshoredrilling | 48672 | WTF | 48267 | pyramider | 46370 | bambino | 42704 | CryptKicker | 37220 | The_Waco_Kid | 37077 | Mokoa | 36496 | Chung Tran | 36100 | Still Looking | 35944 | Mojojo | 33117 |
|
|
10-13-2012, 02:10 PM
|
#1
|
Account Disabled
Join Date: Feb 23, 2011
Posts: 1,656
|
Want top level security?
Use a preconfigured USB drive for all of your hobbying needs. Private browsing, no history, encryption, use it in any computer and not leave a trace on the computer itself, scrub pictures, password vault, etc. Would this be useful to anyone?
I'm thinking about writing instructions on how to create one, just wondering if anybody would use it. (Be paranoid enough too use that much security)
|
|
Quote
| 4 users liked this post
|
10-13-2012, 04:03 PM
|
#2
|
Premium Access
Join Date: Mar 12, 2012
Location: Washington DC Area
Posts: 636
|
It would be truly appreciated. If you do not mind, recommend having a version for Windows and a version for Mac systems. There are a few ladies that use Macs - some programs and/or process does not easily translate to the Mac.
|
|
Quote
| 1 user liked this post
|
10-13-2012, 05:26 PM
|
#3
|
Account Disabled
Join Date: Feb 23, 2011
Posts: 1,656
|
Quote:
Originally Posted by plainjoe
It would be truly appreciated. If you do not mind, recommend having a version for Windows and a version for Mac systems. There are a few ladies that use Macs - some programs and/or process does not easily translate to the Mac.
|
It would probably be easier, since its on a USB and could be used on any other computer, for the people that do use a Mac to install a version of Wine and be able to run windows programs on the Mac. I could do an additional part on how to install Wine on a Mac, that's no problem (just not as user friendly).
|
|
Quote
| 1 user liked this post
|
10-14-2012, 07:17 AM
|
#4
|
Valued Poster
Join Date: Aug 5, 2010
Location: World Citizen
Posts: 886
|
There are several Non-install programs out there that do these things. I have been using them in my Operational Security in this world of ours for years.
Search for "portable software" or "non-install software" should bring up a decent list.
|
|
Quote
| 1 user liked this post
|
10-15-2012, 12:45 PM
|
#5
|
Pending Age Verification
User ID: 140596
Join Date: Jun 21, 2012
Location: Colorado Springs
Posts: 68
My ECCIE Reviews
|
could you suggest some reading material that I could bring myself up-to-date on these issues?
happy monday!
|
|
Quote
| 1 user liked this post
|
10-24-2012, 02:24 PM
|
#6
|
Valued Poster
Join Date: Nov 21, 2011
Location: 'round town...
Posts: 1,518
|
Go to portableapps.com. Everything you need to load up a usb is there.
|
|
Quote
| 1 user liked this post
|
10-24-2012, 04:04 PM
|
#7
|
Meet & Greet Organizer
Join Date: Dec 17, 2009
Location: "Hobbyverse"
Posts: 7,112
|
2 things to think about before using only a USB drive for your hobbying efforts.
1.) a USB is only as secure (and valuable in and of itself) if
1.a) you keep it properly encrypted and secured, and
1.b) keep a back-up copy somehow, somewhere, because even "flash memory only" USBs can become corrupted and thus unreadable.
Since USBs generally can be used only with a laptop or a computer and not necessarily with a handheld like an Android or a Tablet (possibly a double ended "mini" USB full USB cord combo could work with a phone or Tablet.... I haven't yet seen (or searched) for "mini" USB drives, but I know there are "adapters" out there that possibly could work in the above situation) be prepared to be without access to your data for significant periods.
2. ) Even though much of your data can be stored within the thumb drive, such as mail, spread sheets, documents, photos, etc., there is no way to conceal or safeguard any of your transmissions once they go out on the 'net. So, somewhere, there is obviously a record of all your email either via your own ISP (internet provider) or your email account provider, and, even if you are using Wi-Fi somewhere unless that is encrypted, entirely possibly (although not necessarily likely) those communications could be intercepted.
Nothing wrong with trying to be secure!
The most rudimentary precautions are usually forgotten by all of us at some time or another:
-- Password protecting your computer!
-- Shutting it down, or locking it when you walk away "for just a minute" or concealing the screen from others who might see it!
-- Having multiple accounts on your computer "just in case" someone else might need to use it.
ETCETERA.
|
|
Quote
| 3 users liked this post
|
10-25-2012, 05:45 AM
|
#8
|
Valued Poster
Join Date: Aug 5, 2010
Location: World Citizen
Posts: 886
|
Two apps that are invaluable for this world of ours-
Here is a software that has proven very, very effective and is perfect for this world of ours.
I have been using in for my personal and private life for a couple of years now and it has never failed me.
#1
FREE SafeHouse Explorer Encryption
PASSWORD PROTECT - MAKE FILES INVISIBLE
SafeHouse Explorer is FREE super-strong 256-bit encryption software for any hard drive or USB Flash memory stick. Total privacy with a familiar Windows Explorer-like interface.
- Full version is 100% FREE to everyone.
- Complete stand-alone privacy solution.
- Can run directly from USB memory sticks.
- Can create self-extracting encrypted vaults.
- Incredibly easy to use, nothing to learn.
http://www.safehousesoftware.com
#2-
File Wiper
Delete files securely with this software!
Just right click on files or directories and select "Send to / Free File Wiper" to erase them completely!
Or ... you can drag & drop them on the trashcan to perform the wipe operation.
Files are overwritten with standard and random patterns (up to 7 overwrites).
To ensure maximum privacy also the filename is wiped before deletion.
After the wipe, the files cannot be undeleted and restored.
Up to four wipe methods (from 1 pass to 7 passes).
http://download.cnet.com/Free-File-W...-75447382.html
Information keeps us safe!
|
|
Quote
| 2 users liked this post
|
11-09-2012, 02:02 PM
|
#9
|
Pending Age Verification
User ID: 77903
Join Date: Apr 9, 2011
Location: West Warwick RI
Posts: 194
My ECCIE Reviews
|
If you do not engage in explicit talk through email, or phone, there is no need for this. Unless your a client who feels the need to post explicit reviews from his home IP address, and pays the review site by debit card as many hobbyist do.
|
|
Quote
| 1 user liked this post
|
11-12-2012, 02:12 AM
|
#10
|
Account Disabled
Join Date: Jul 28, 2011
Location: dallas
Posts: 14
|
This guide is not provided for any illegal use or promote such use in anyway. I take no liability for any damages to any party who use this guide. Everything I write on this forum are my fantasies. Always Always use VPN( corporate level secure network). However, VPN providers can get in trouble for not providing information to 'asked' people. So you need to use out of country provider, and you need to use vpn provider who doesn't store user log in/log out i.p address information. https://www.privateinternetaccess.com/pages/buy-vpn/ $39.95. then change your computer MAC-address by using http://www.technitium.com/tmac/index.html. Always run ESET or Kaspersky internet security software. Lastly not the least use Truecrypt or Hard drive encryption with at least 32 to 64 character password. Anything less than 32 character can be cracked with brute force attack. Don't use any words in dictionary for your password, and get used to ^#).>, numbers, and capital letters. Truecrypt is free. It is a great tool for usb drives
http://www.truecrypt.org/
Remember, Hard drive encryption is better, but it require $100/yearly software to support the drive. ex:WinMagic is one of very few companies that has software for hard drive encryption.
http://www.newegg.com/Product/Produc...82E16822168002 cost only $80 for Opal compliant hard drive encryption. software encryption(like truecrypt) is slower and less secure. It is less secure because of Cold boot attack (they come and take our laptop while keys are still present in RAM). The hard drive encryption does not store keys in RAM.. Anyhow, Make sure you use hidden drive and a decoy drive with aes+serpent+twofish if you still decide to go with less secure software encryption(truecrypt),
And before you do all this, wipe clean your drive using DoD 7 passes because Encryption protects you only from the day you start encryption. http://www.dban.org/ for deleting(technically rewriting) the old hard drive for free(open source)
Anything you've done on that computer prior to encryption will still be accessible using EnCase(forensic tool)
Again, there are many forensic software available- http://www.lostpassword.com/kit-forensic.htm - for decrypting Any 'software' encryption(true-crypt,Bitlocker ..etc).
|
|
Quote
| 1 user liked this post
|
11-13-2012, 06:19 AM
|
#11
|
Valued Poster
Join Date: Aug 5, 2010
Location: World Citizen
Posts: 886
|
@awsometx- "Anything you've done on that computer prior to encryption will still be accessible using EnCase(forensic tool)
Again, there are many forensic software available- http://www.lostpassword.com/kit-forensic.htm - for decrypting Any 'software' encryption(true-crypt,Bitlocker ..etc)."
Your statement is not entirely correct. Encryption exists that EnCase wil lnot crack. But these programs are not cheap and are not commonly used in the Consumer market.
Information keeps us all safe.
|
|
Quote
| 1 user liked this post
|
11-13-2012, 08:43 PM
|
#12
|
Account Disabled
Join Date: Jul 28, 2011
Location: dallas
Posts: 14
|
This guide is not provided for any illegal use or promote such use in anyway. I take no liability for any damages to any party who use this guide. Everything I write on this forum are my fantasies.
VPN service is not fool proof, and it can sometimes adversely affect your free speech. Read terms and conditions of each VPN service, and it is bad business for them to tell customers they are not really 'secure'. Many or majority of VPN 'connections' can cause identify theft because you're ' inside a secure network' of another people just like you who may be attackers. In some cases, you're far better of using ISP than using VPN service.
@jframe2
Work cited from Truecrypt "" On some types of storage media, when data is overwritten with other data, it may be possible to recover the overwritten data using techniques such as magnetic microscopy. This also applies to data that are overwritten with their encrypted form (which applies when Truecrypt initially encrypts an unencrypted partition or drive). According to some studies and governmental publications, recovery of overwritten data can be prevented ( or made very difficult) by overwriting the data with pseudorandom and certain non-random data a certain number of times. Therefore, if you believe that an adversary might be able to use such techniques to recover the data you intend encrypt, you may want to select one of the wipe modes. "
Quote:
Originally Posted by awesometx
This guide is not provided for any illegal use or promote such use in anyway. I take no liability for any damages to any party who use this guide. Everything I write on this forum are my fantasies. Always Always use VPN( corporate level secure network). However, VPN providers can get in trouble for not providing information to 'asked' people. So you need to use out of country provider, and you need to use vpn provider who doesn't store user log in/log out i.p address information. https://www.privateinternetaccess.com/pages/buy-vpn/ $39.95. then change your computer MAC-address by using http://www.technitium.com/tmac/index.html. Always run ESET or Kaspersky internet security software. Lastly not the least use Truecrypt or Hard drive encryption with at least 32 to 64 character password. Anything less than 32 character can be cracked with brute force attack. Don't use any words in dictionary for your password, and get used to ^#).>, numbers, and capital letters. Truecrypt is free. It is a great tool for usb drives
http://www.truecrypt.org/
Remember, Hard drive encryption is better, but it require $100/yearly software to support the drive. ex:WinMagic is one of very few companies that has software for hard drive encryption.
http://www.newegg.com/Product/Produc...82E16822168002 cost only $80 for Opal compliant hard drive encryption. software encryption(like truecrypt) is slower and less secure. It is less secure because of Cold boot attack (they come and take our laptop while keys are still present in RAM). The hard drive encryption does not store keys in RAM.. Anyhow, Make sure you use hidden drive and a decoy drive with aes+serpent+twofish if you still decide to go with less secure software encryption(truecrypt),
And before you do all this, wipe clean your drive using DoD 7 passes because Encryption protects you only from the day you start encryption. http://www.dban.org/ for deleting(technically rewriting) the old hard drive for free(open source)
Anything you've done on that computer prior to encryption will still be accessible using EnCase(forensic tool)
Again, there are many forensic software available- http://www.lostpassword.com/kit-forensic.htm - for decrypting Any 'software' encryption(true-crypt,Bitlocker ..etc).
|
|
|
Quote
| 1 user liked this post
|
11-14-2012, 09:14 PM
|
#13
|
Account Disabled
Join Date: May 9, 2012
Location: Dallas
Posts: 453
|
Some good tips in here
|
|
Quote
| 1 user liked this post
|
|
AMPReviews.net |
Find Ladies |
Hot Women |
|