Select language / زبان خود را انتخاب کنيد

Computer Security

USEFUL TIPS FOR USING A COMPUTER MORE SECURELY

Computer surveillance has become a huge and advanced industry. From governments and intelligence services, through companies and advertisers, to criminals and hackers, more people than your think are interested in the data stored on your computer. Below are some tips to help you protect yourself as much as possible.

1. Encrypt your important files and folders.

Why? Because anyone who can gain remote access or hack into your computer (and it’s not that difficult!) can gain access to pretty much any file stored on your computer. Also, if police and intelligence agencies get hold of your computer, they can easily bypass your operating system’s password and access your files, using special discs like UBCD4Win or Hiren’s BootCD.

How? There are many encryption programmes nowadays that can do this for you, e.g. TrueCrypt, GPG4Win, BitLocker, Luks, eCryptfs, etc. There is a good comparison of encryption software on Wikipedia.

IMPORTANT: Note that encrypting and decrypting single files is not completely safe. Why? Because if you don’t re-encrypt the file after decrypting it and delete the resulting ‘cleartext’ file, you will end up with two versions of the file, so unencrypted data will still be there on your disk. The only way to be totally safe is to encrypt your computer’s hard drive altogether, or at least your Home partition (My Computer in Windows).

2. If that is too much hassle, and your files and folders are not that secret but are still a little bit sensitive, at least protect your files and folders with a password.

How? The easiest way to do this is to compress the folder you want to protect (as a zip archive) and entering a password under ‘Other options’. There are many other ways and programmes to do similar things, depending on your operating system.

3. Use a shredding programme to delete important, sensitive files.

Why? Because retrieving or recovering deleted data from disks (using a technology called Magnetic Force Microscopy) is easier than you think.

How? There are special programmes that ‘wipe’ the file beyond recovery by repeatedly writing special patterns to it so that it is completely destroyed. Popular ones include File Shredder, CBL Data Shredder, Wipe, diskscrub and so on.

4. Use different, strong passwords for different things.

Why? Because weak passwords are easy to crack with simple techniques like ‘brute force’, ‘password dictionaries’ and so on. Examples of weak or predictable passwords include simple dictionary words or predictable things like names or dates of birth. Replacing some letters with commonly used replacement symbols, like 3 for ‘e’ or @ for ‘a’, is not as safe as you think.

How? Strong passwords use a long-ish combination of upper- and lower-case letters, digits and symbols, e.g. whY?m3!! (from ‘why me’), which shouldn’t be very difficult to remember.

The other important thing about passwords is not to use the same password for all your accounts.

Why? Because if one account is hacked, then all your other accounts (emails, FB, bank, etc.) are potentially at risk too. If you find it difficult to remember all your passwords, write them down and keep the piece of paper in a secure place (but be careful not to forget where you put it or store it somewhere where others might easily find it one day!). And it’s always a good idea to change your passwords from time to time.

If you are using the Mozilla Firefox web browser (which is recommended) and prefer the browser to store your passwords because you can’t be bothered to enter them every time, it is strongly recommended – especially if you share your computer with other people – that you set up a ‘master password’. This means Firefox will ask you for this one password every time you want to access a password-protected page, like an email login page. You can do that from the ‘Security’ tab in ‘Preferences’.

IMPORTANT: Never ever send passwords as plain text via email, Facebook messages, mobile phone texts and so on. It defeats the whole point of passwords!

5. Keep your software up to date.

Why? Because out-of-date software, which is no longer maintained by developers, may have some security risks and loopholes that others could utilise to gain access to your computer.

Speaking of updates, it is advised that you try to avoid – as much as possible – commercial operating systems and software (Windows and Mac OS). Linux and open-source software are generally more secure, and they are free!

6. Be extra careful when using public or shared computers, e.g. in internet cafés.

Why? Because public computers are often not configured to be very secure, might store you passwords and other details, or might even have spying software installed on them. If you didn’t have a choice but to use a public computer to do your political stuff, it is a good idea to change your password afterwards. And if you can, try to clear the browser’s history and cache before you leave (you will find these options in the browser’s settings or preferences, depending on which browser and operating system they are using).

REMEMBER: Security is only effective as long as everyone in the group takes it seriously. If one person is not very careful and ‘leaks’ data, all the others in the group are at risk.

 

 

Iran doesn’t want Bashar al-Assad ‘president for life’ – almost

Iran doesn’t want Bashar al-Assad ‘president for life’ – almost

The Iranian deputy foreign minister for Arab and African affairs claims his government is not seeking to keep Syria’s dictator in power forever, implying he could potentially be replaced by another ally of Iran. Yet Amir Abdollahian insists that Bashar al-Assad still serves Iran’s purported strategic interests, […]

Read more

Desperate, defiant messages to al-Assad and Iran from Aleppo barrel bomb victims

Watch this video in which the residents of the Sha’ar district in Aleppo send desperate yet defiant messages, shortly after their neighbourhood saw some of the worst waves of barrel-bomb bombardment in the last three months on 4 April 2014. Various people come randomly to the camera […]

Read more

Despotic regimes: seedbeds for Islamists groups

Despotic regimes: seedbeds for Islamists groups

“The real poultry farm that breeds Islamist groups is the despotic, dictatorial regimes. For they were the ones who suffocated the spirit of the people and submerged them with (empty) slogans and with terror, and exacerbated their problems with subordination and plunder. It is them who push […]

Read more

Iranian border guards released. Any lessons learnt?

Iranian border guards released. Any lessons learnt?

After almost two months of scramble, Jaish al-Adl yesterday announced on its Facebook page that the four abducted Iranian border guards had all been released. In a statement, the group claimed the decision was solely made in response to “the demand of Sunni clerics” and as a […]

Read more

Hezbollah denounces destruction of (Shia) holy sites in Syria, ignores thousands of mosques destroyed by the regime

Hezbollah denounces destruction of (Shia) holy sites in Syria, ignores thousands of mosques destroyed by the regime

Hezbollah Lebanon issued a statement last week condemning “terrorist organizations” for destroying “shrines and Islamic and Christian sanctities in Syria.” The statement was in reaction to a decision by the al-Qaeda-linked terrorist group known as the Islamic State in Iraq and Sham (ISIS) to demolish what’s left […]

Read more

As in Iran so in Turkey: No Twitter for people, only for state officials

As in Iran so in Turkey: No Twitter for people, only for state officials

The least one can say about the Turkish prime minister’s decision two weeks ago to ban Twitter in his country, it was a hilariously hypocritical decision. For Mr Erdogan has a Twitter account himself and tweets frantically all day long. But many people may not know that […]

Read more

Iranian general admits ‘advising’ Syrian regime on establishing ‘shabbiha’ paramilitary force

Iranian general admits ‘advising’ Syrian regime on establishing ‘shabbiha’ paramilitary force

A prominent Iranian general has admitted that Sepah Pasdaran played an important role in setting up a Syrian paramilitary militia known as the National Defence Frorces, which has terrorised Syrian dissidents and committed grave human rights abused since the start of the Syrian revolution in March 2011. […]

Read more

Angelina Jolie meets Syria’s ‘lost children’, says nothing about who caused their tragedy

The United Nations High Commission for Refugees (UNHCR) has released a new, moving short film following the agency’s Special Envoy Angelina Jolie as she visits a Syrian refugee camp in al-Bekaa Valley, Lebanon, and meets with 11-year-old Hala and her five orphan siblings. https://www.youtube.com/watch?v=QLpj9u_QXjk EDITOR’S COMMENT: It […]

Read more

Hezbollah flexing Bashar al-Assad’s muscles in Yabroud

Hezbollah flexing Bashar al-Assad’s muscles in Yabroud

[download from https://www.facebook.com/photo.php?fbid=612741042144362&set=a.115713961847075.28467.115708715180933&type=1&theater] Cartoon by Ili Saliba. Source: Syrian Revolution Caricature FB page COMMENT: Indeed, if it wasn’t for Hezbollah and their masters in Tehran, Bashar al-Assad would have fallen a long time ago.  

Read more

Where are Iranian trained forces?

Where are Iranian trained forces?

A cartoon by Iranian well-known cartoonist, Mana Neyestani. In the first frame, one of the figures ask why these five common soldiers have been abandoned in a tent in such a death trap near the border and questions the whereabouts of Iranian trained forces. The second frame […]

Read more
Page 14 of 28« First...1213141516...20...Last »