Archive for the Computer Security Category

How to hide any file inside of a picture

Posted in Computer Security on November 22, 2007 by jamesshrugged

This video tutorial explains how to hide any file inside of a .jpg. The picture will still be able to be viewed normal, and will have a thumbnail as usual. The only telling feature is that the file size will be large. Hide your secret stuff in one of these, and just leave it in a folder with a million other jpgs, and good luck to whoever is trying to find it..



Posted in Anonymity, Computer Security with tags , , on November 22, 2007 by jamesshrugged

Here are a few tips on communicating anonymously.

1) Use public resources: Pay phones and Internet Cafe’s. Store items you don’t want to associate with yourself in a public facility; bowling alleys often have places for storage. They normally don’t check for ID, so give a fake name and info.

2) Use pre-paid cell phones, available from $30 from stores like Walmart. These allow you to call without signing anything, no information is provided. Use phone cards, pay with cash.

3) On that note, always pay with cash.

4) Never give identifiable information over the phone or internet. Things like your full name, social security number, address, etc. common sense.

5) when you mail something, do it from a busy drop box, wear gloves when handling anything than has to do with the letter or package. For gods sake, do not lick the stamp.

6) Use anonymous email, from the internet cafe. Hotmail is an obvious choice, since it takes about 3 seconds to set one up and no real personal information is required.

Computer Security

Posted in Anonymity, Computer Security with tags , on November 22, 2007 by jamesshrugged

This program set gives you the ability to browser the internet completely anonymously. This version is CD portable, which means that you can take it with you and use it on any computer that you use. It is based on the very secure proxy system called Tor. Form the site:

“Tor is a software project that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the Internet’s TCP protocol. ”

Computer security is very important, as it seems that both the US federal government and foreign governments are interested in knowing what you look at on the web.

%d bloggers like this: