Computer Security Guide

Online protection for the non-technical

Why use Third Party Software to Create an Encrypted File Container

It wasn’t long ago when TrueCrypt was the most popular encryption tool out there.  Since its demise a couple years ago, people have been scrambling to find a replacement.  For those that use Mac’s – you’re in luck.  The Mac operating system comes with the ability to create an encrypted file container without the need for third-party software.  All you need to do is go into the Disk Utility tool and create a “New Image”.  When you create a new image, simply name the file, select Mac OS Extended (Journaled) as your file system, and choose your encryption.   Natively, you will be able to select either 128-bit or 256 bit AES encryption.  Obviously, 128 will be faster to create but 256 will be more secure.

March 28, 2015 Posted by | Business, Personal, Privacy, Security | , , , , , | Leave a comment

Use Tor (The Onion Router) to Browse the Internet Safely

Tor is not new but still works quite well.  For those that do not know, Tor is free software that helps you defend against a form of network surveillance known as traffic analysis.  Network surveillance threatens personal freedom and privacy, confidential business activities and relationships.

Tor works by bouncing your communications around a distributed network of relays run by volunteers all around the world (known as exit nodes).  Tor prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.  The great thing about Tor is that it works with many of your existing applications such as web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol.

October 8, 2012 Posted by | Uncategorized | , , , , , | Leave a comment

Use Tor Orbot on Android Devices for Safer Communications

Orbot is an application that allows mobile phone users to access the web, instant messaging and email without being monitored or blocked by their mobile internet service provider. Orbot brings the features and functionality of Tor to the Android mobile operating system.

Orbot contains Tor, libevent and privoxy. Orbot provides a local HTTP proxy and the standard SOCKS4A/SOCKS5 proxy interfaces into the Tor network. Orbot has the ability to transparently torify all of the TCP traffic on your Android device when it has the correct permissions and system libraries.

Enhance your privacy, break through firewalls and communicate more safely.

Orbot is the official port of Tor to Android. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet.

Find Orbot on the Android Marketplace (https://play.google.com/store/apps/details?id=org.torproject.android&hl=en)

October 8, 2012 Posted by | Privacy | , , , , , , , | 1 Comment