Showing posts with label HIDE YOUR ONLINE TRACKS. Show all posts
Showing posts with label HIDE YOUR ONLINE TRACKS. Show all posts

Tuesday, July 26, 2011

Search securely on Google over SSL

Are you afraid that your search terms and results on google are being intercepted by your company, ISP or any third party?. This can be easily prevented by using encrypted Google service.

Google SSL search
Google SSL search uses SSL to establish a end-to-end encrypted connection between your browser and Google, this prevents the third parties from intercepting your communication.
SSL (Secure Sockets layer) is a protocol which helps to establish a encrypted and secure channel between the user and the host. This makes the information intercepted by third parties unreadable.
Here is the link to encrypted Google service.
https://encrypted.google.com/

Note:- To make sure you are browsing securely check that in the URL there is https instead of http.
          Remember this is only for securely searching on Google, the third parties will know about the
          website you click from the search results.

Saturday, July 23, 2011

Exif data - Security measures

All the professional photographers are familiar with the term "Exif data". But general public most probably must have never heard of this term. so here is bit information to get you started with.
Exif (Exchangeable image file format) is a specification used to store data in a image. This data contains very important information about the image like the model of the camera used to take the image, date and time at which the image was taken, location of where the image was taken (if the camera or smartphone is GPS enabled) etc. This can be very helpful for photographers to later study the images and find optimal camera settings for the best images.To view exif data you need a exif viewer. here is one OPanda Iexif.

But this also has a bad side. Here are security issues that can be presented due to Exif data.
  • Many times people take their embarrassing images covering their face, which they post online in the spur of the moment. But it should be noted that exif data can provide information which can be used to identify the person in the image. People with bad intentions may take advantages of such situations by black mailing the person in the image.
  • Many times the time and date of the image is intended to be kept secret, for many personal reason but exif data can reveal this information very easily.
  • Exif information can be used wrongly to bully people on sites like 4chan.
Now you can avoid all this inconveniences due to exif data by taking some simple security measures.
  • Select the option "for web" while saving the image.
  • You can easily remove exif data from a image using software like Exif Tag Remover

Friday, August 20, 2010

SEND ANONYMOUS EMAILS

Sometimes while sending email it is very important for you to send it anonymously for several professional or personal reasons. Many sites on the internet claim to do so, but many times they  are just spams. but here is a genuine website which can be used to send anonymous emails for free.

WWW.ANONYMOUSE.ORG

NOTE :- Sending illegal mails like death threats, harassment notes, etc because the site will provide your info to the legal authorities in such cases.

Tuesday, August 17, 2010

PRIVACY ERASER PRO (erase your internet activity logs)

Your computer tracks logs of your online and computer application activities like your surfing habits, your favorite sites etc. this logs are stored in the hard drive which can be misused by spyware and spybots, so these logs should be deleted in order to protect your privacy.


PRIVACY ERASER PRO
 
It is a Internet eraser which erases all tracks of your online and computer activities.With simply one click, Privacy Eraser Pro allows you to erase Internet history, erase browser history, erase address bar history, erase cookies, erase internet cache, autocomplete memory, saved password, index.dat files of your browser, and Window's swap file, temp folders, run history, search history, open/save history, recent documents and more. With Privacy Eraser Pro you can schedule cleaning tasks run at a time that is most convenient for you.it supports all major browsers like Mozilla firefox, google chrome, AOL, Apple Safari and Opera etc.

DOWNLOAD

Monday, June 28, 2010

DISPOSABLE EMAIL ID (10 Minute Mail)

In this chaotic cyberworld its very necessary to take care of your email accounts. Today mostly all the online services and other softwares need you to provide them with you email id to prove your authenticity. But you may not be comfortable providing your regular email id to the service which you do not trust currently or you may want to use the service just once and don't see the need to provide them with your real email id. Disposable email id are very useful in this matter. Some of the other reasons to use disposable email id are
  • Sending anonymous email .
  • Sending emails for which you don't want replies.
  • Avoiding spam to your genuine email id.
  • or just want a temporary email id to accept, sign up authenticating emails.
here is one of the online service that provides a disposable id.

10 MINUTES MAIL
10 Minute Mail provides you with a disposable email id for the duration of 10 minutes. When you visit the site you will be instantly provided with a email id, you can use it to do your required work. If you are accepting a reply wait on the same page any received email will be shown on the same page in the lower section. You will be shown in realtime how much time is left for the id to expire. If you need some extra time click on the "Give me 10 more minutes" option under the email id to receive more 10 minutes.
To know more about the service and use it CLICK HERE

Thursday, June 24, 2010

Ghost Of Browser - Browsing Internet Secretly



Ghostzilla browser for Windows is a tool that shields you from the looks of people around you, when they try to see if you are surfing the Web.
With Ghostzilla, they see your normal work screen. You see the Web page, drawn to appear inside your work application and to look like that application to a bystander



for a detailed description please click read more.

If someone comes too close, move the mouse away from the Web page and it disappears, leaving the original application frame. When the coast clears, another mouse move brings Ghostzilla and the Web page back inside your application.
The browser always has only one window, framed in your work application, but you can surf multiple pages at once in different tabs. Needless to say,
popup ads can't exist. You are not even bothered by the in-page ads -- any non-tiny image is hidden unless you hover the mouse over its frame.

It uses a clever approach that completely integrates the browser interface into virtually any application interface as well as Windows Explorer.

In addition, it changes the web page colors and appearance to a discreet black and white document style that nicely blends with most business type documents. Even if your boss was standing right behind you, he would probably never suspect, that what you re looking at is a live web page.

To further disguise the web page, all large pictures are initially hidden and only shown when you hold your mouse over each. The Ghostzilla browser uses the Mozilla browsing engine and supports all the web standards.

The browser interface can be called via a secret mouse movement and instantly hidden when your mouse changes focus. A true must-have app for any surfing addict!

Features:

· adapts to all applications
· full Web standards support
· multi-page (tabbed) browsing
· disabled pop-up windows
· built-in Google search
· text zoom in/out
· runs directly from CD, without installation
· does not write to Windows registry
· does not leave files on your PC
· keeps setting and history hidden and encrypted, or on a floppy
· not shown in taskbar when hidden
· six levels of camouflage



DOWNLOAD LINK

Wednesday, June 16, 2010

Cyberghost VPN

Today we blog, mail, chat, share things on the internet. For some of us Web is like a second home. But web is not an anonymous place, our online activities leave a trail behind them which can be easily tracked and the user's sensitive information can fall in wrong hands. There are lots of ways to browse the web securely one of it is to use a VPN. Here is one such VPN.
cyberghost vpn allows the user to surf on the net anonymously. The user's ip address is hidden and the information is encrypted.

DOWNLOAD
 
© 2009 Cybertronic Devil. All Rights Reserved | Powered by Blogger
Design by psdvibe | Bloggerized By LawnyDesigns