This book is now available as part of both The Big Computer Privacy Book Bundle and The Big Computer Hackers Book Bundle. Get more for less.
Privacy isn't dead yet. In this guide we explore some of the tools and technologies that will enable us to secure our systems and reclaim our privacy.
We will look at 25 fantastic tools and learn about the underlying concepts about how they work and what limitations they might have. We will look at 25 interesting tools, we won't waste your time by talking about which antivirus product to choose, although important, there are more creative and interesting solutions available. We will consider problems such as how to hide our activities from the Internet Service Providers (ISPs), encrypt our digital communications and fortify our home networks in quite an advanced way.
We will consider 25 tools over 8 separate areas. Those areas are:
We start off at the beginning considering how we can physically lockdown our devices, we look at concepts such as how to bring the logical cryptographic security into the physical world and protect the physical data collected about us found in the most unlikely of places.
As we improve our understanding about security we will consider more advanced tools and then at the end we will look some truly interesting and effective technologies that will stop even the most advanced hackers and attackers.
Whenever possible we try to make use of open-source, free tools, to keep the cost of trying them out down. Some tools are paid-for, but the vast majority are available to download for free. When it comes to security, open-source (community built) applications are definitely the way to go. They allow us to have confidence in the fact that the tools have no backdoors or security flaws maliciously built in and the fact they are free is just a very nice bonus!
Scroll up to the top of the page and buy this book now to reclaim your privacy.
Privacy isn't dead yet. In this guide we explore some of the tools and technologies that will enable us to secure our systems and reclaim our privacy.
We will look at 25 fantastic tools and learn about the underlying concepts about how they work and what limitations they might have. We will look at 25 interesting tools, we won't waste your time by talking about which antivirus product to choose, although important, there are more creative and interesting solutions available. We will consider problems such as how to hide our activities from the Internet Service Providers (ISPs), encrypt our digital communications and fortify our home networks in quite an advanced way.
What Topics are Covered?
We will consider 25 tools over 8 separate areas. Those areas are:
- Physical security
- Online security
- Account security
- Digital payments
- Privacy enhancing software
- Operating system security
- Advanced home network fortification
- Mobile security
We start off at the beginning considering how we can physically lockdown our devices, we look at concepts such as how to bring the logical cryptographic security into the physical world and protect the physical data collected about us found in the most unlikely of places.
As we improve our understanding about security we will consider more advanced tools and then at the end we will look some truly interesting and effective technologies that will stop even the most advanced hackers and attackers.
How Much will it Cost?
Whenever possible we try to make use of open-source, free tools, to keep the cost of trying them out down. Some tools are paid-for, but the vast majority are available to download for free. When it comes to security, open-source (community built) applications are definitely the way to go. They allow us to have confidence in the fact that the tools have no backdoors or security flaws maliciously built in and the fact they are free is just a very nice bonus!
Scroll up to the top of the page and buy this book now to reclaim your privacy.