It also runs on low-system resources so it isn't going to bog down your system. It has a very good detection rate and is one of the few to be able to locate some of the most undetectable rootkits out there today. Malwarebytes is an equal to but less taxing program you can try out. I normally, Comodo Anti-Virus is the top choice but it does bog down most Windows Computers that don't have more than 4gb of RAM and a good processor. Everything suspicious is also run Sandboxed so it is isolated and can't harm your computer. It gives lots of alerts but that is good because YOU are in control. You can also find pre-set profiles online and import them right into the program which is a handy feature for those without much knowledge. It is very versatile and has some incredibly advanced features included that work to keep you safe. It actively monitors what your programs are doing with the current network connection and attempts to block anything that might harm your computer. You can monitor these connections by seeing which servers may have been used for malicious content in the past and steering clear of them.Ĭomodo Firewall operates with a more application based approach. It monitors and controls incoming and outgoing connections at an IP based level and lets you see the good and bad connections. PeerBlock is a network based Firewall that lets you control who your computer "talks" to on the internet. I don't have very much personal experience with programs on Linux as I always used that OS for "other things" but I will post what little I do know. You don't need to use the exact same programs as I have listed but these ones are generally your safest and most secure choice. I am going to post my suggestions on programs and a brief description of each. This poses as a risk to your security because these are the types of programs that are going to end up saving you in the future. Some people who come on here don't even understand how to properly configure simple programs like CCLeaner or Bleachbit. You need diversity and flexibility and a very basic program won't usually do what you want it to and provide a gap in your security. Despite what many people think, Microsoft Security Essentials is NOT the kind of program you want on your system. As well, not all programs are "suitable" for the job of keeping you safe. If you miss any one of the above mini categories and can't identify a program that would fit into it, it poses as a security risk for yourself. There are a few things you "NEED" on all operating systems to keep yourself secure. That's 3 more than Mac and Linux but it isn't something you can't work around. Don't fret Windows users, the NSA (National Security Association) only has like 3 backdoors in all Microsoft based systems. However, in terms of security, that order should go Linux, Mac OSX, Windows. Most people here are probably using Windows, followed by Linux and then Mac OSX. It is ideal to be on a Linux operating system like Tails or Whonix but they are definitely more difficult to use than let's say Windows or OSX. However, it isn't convenient or even remotely easy for some people to just switch operating systems at the bat of an eye. The comments were very helpful though if you were able to sift through the arguing. That thread can be found BY CLICKING HERE. Needless to say, this caused a flame war between Linux users and the rest. There was a thread posts asking members which OS they thought was the best for CP. The link to the original (outdated) post will be place in the header of the section. I have acquired some new knowledge over the last few weeks and have continued to research proven methods to keep you all safe. If I have already covered a topic in-depth, I still suggest that you read that corresponding topic in THIS thread. Adding VPNs and VMs to Enhance Anonymity This tutorial is going to cover the following topics but might deviate here and there on some side notes: I have been working closely with computers for over 10 years now so my knowledge is fairly extensive. My name is LittleSmiles and I am a pretty big computer nerd and security/privacy advocate. Welcome! Hopefully you are here because you intend on gaining some knowledge about staying secure and anonymous in the on-topic world. If you don't read it, your fault when you get caught and jailed. I do NOT apologies for the length of this. This post will be locked for comments so if you have any questions, please PM them to me. However, I am going to be posting one massive thread on EVERYTHING relating to your personal security and anonymity, how to store topic files securely, etc. I have posted a few guides for different things and added them to the PlayPen Forum.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |