Select language / زبان خود را انتخاب کنيد

Computer Security

USEFUL TIPS FOR USING A COMPUTER MORE SECURELY

Computer surveillance has become a huge and advanced industry. From governments and intelligence services, through companies and advertisers, to criminals and hackers, more people than your think are interested in the data stored on your computer. Below are some tips to help you protect yourself as much as possible.

1. Encrypt your important files and folders.

Why? Because anyone who can gain remote access or hack into your computer (and it’s not that difficult!) can gain access to pretty much any file stored on your computer. Also, if police and intelligence agencies get hold of your computer, they can easily bypass your operating system’s password and access your files, using special discs like UBCD4Win or Hiren’s BootCD.

How? There are many encryption programmes nowadays that can do this for you, e.g. TrueCrypt, GPG4Win, BitLocker, Luks, eCryptfs, etc. There is a good comparison of encryption software on Wikipedia.

IMPORTANT: Note that encrypting and decrypting single files is not completely safe. Why? Because if you don’t re-encrypt the file after decrypting it and delete the resulting ‘cleartext’ file, you will end up with two versions of the file, so unencrypted data will still be there on your disk. The only way to be totally safe is to encrypt your computer’s hard drive altogether, or at least your Home partition (My Computer in Windows).

2. If that is too much hassle, and your files and folders are not that secret but are still a little bit sensitive, at least protect your files and folders with a password.

How? The easiest way to do this is to compress the folder you want to protect (as a zip archive) and entering a password under ‘Other options’. There are many other ways and programmes to do similar things, depending on your operating system.

3. Use a shredding programme to delete important, sensitive files.

Why? Because retrieving or recovering deleted data from disks (using a technology called Magnetic Force Microscopy) is easier than you think.

How? There are special programmes that ‘wipe’ the file beyond recovery by repeatedly writing special patterns to it so that it is completely destroyed. Popular ones include File Shredder, CBL Data Shredder, Wipe, diskscrub and so on.

4. Use different, strong passwords for different things.

Why? Because weak passwords are easy to crack with simple techniques like ‘brute force’, ‘password dictionaries’ and so on. Examples of weak or predictable passwords include simple dictionary words or predictable things like names or dates of birth. Replacing some letters with commonly used replacement symbols, like 3 for ‘e’ or @ for ‘a’, is not as safe as you think.

How? Strong passwords use a long-ish combination of upper- and lower-case letters, digits and symbols, e.g. whY?m3!! (from ‘why me’), which shouldn’t be very difficult to remember.

The other important thing about passwords is not to use the same password for all your accounts.

Why? Because if one account is hacked, then all your other accounts (emails, FB, bank, etc.) are potentially at risk too. If you find it difficult to remember all your passwords, write them down and keep the piece of paper in a secure place (but be careful not to forget where you put it or store it somewhere where others might easily find it one day!). And it’s always a good idea to change your passwords from time to time.

If you are using the Mozilla Firefox web browser (which is recommended) and prefer the browser to store your passwords because you can’t be bothered to enter them every time, it is strongly recommended – especially if you share your computer with other people – that you set up a ‘master password’. This means Firefox will ask you for this one password every time you want to access a password-protected page, like an email login page. You can do that from the ‘Security’ tab in ‘Preferences’.

IMPORTANT: Never ever send passwords as plain text via email, Facebook messages, mobile phone texts and so on. It defeats the whole point of passwords!

5. Keep your software up to date.

Why? Because out-of-date software, which is no longer maintained by developers, may have some security risks and loopholes that others could utilise to gain access to your computer.

Speaking of updates, it is advised that you try to avoid – as much as possible – commercial operating systems and software (Windows and Mac OS). Linux and open-source software are generally more secure, and they are free!

6. Be extra careful when using public or shared computers, e.g. in internet cafés.

Why? Because public computers are often not configured to be very secure, might store you passwords and other details, or might even have spying software installed on them. If you didn’t have a choice but to use a public computer to do your political stuff, it is a good idea to change your password afterwards. And if you can, try to clear the browser’s history and cache before you leave (you will find these options in the browser’s settings or preferences, depending on which browser and operating system they are using).

REMEMBER: Security is only effective as long as everyone in the group takes it seriously. If one person is not very careful and ‘leaks’ data, all the others in the group are at risk.

 

 

Syrians ‘celebrating’ the new year

Syrians ‘celebrating’ the new year

 

Read more

Funeral of Syrian-Palestinians who died of starvation in Yarmouk

The funeral of four Syrian-Palestinians who died in the Yarmouk Camp in Damascus from starvation, caused by a months-long siege imposed by the Syrian army.  

Read more

‘Merry barrel bomb!’

‘Merry barrel bomb!’

A special Christmas banner from Kafarnabl, Idlib, Syria – 27/12/2013: “Merry barrel bomb! Merry terrorist Assad! Merry careless world! Merry big mouth Obama!”  

Read more

Iranian media and the Syrian ‘conflict’

“Never cross the official red line.” This is the the unwritten principle regulating Iranian media inside Iran in anything related to the country’s foreign policy. And Iran’s role in Syria (and in Lebanon) is certainly one of the most sensitive of these red lines. For how else […]

Read more

Who’s Who? – Sepah Qods

After its establishment in 1979, the Islamic Republic of Iran adopted an anti-American foreign policy that led, among other things, to the seizure of the US embassy in Iran and the subsequent US military operation known as the Tabas attack. The Islamic Republic then found itself in […]

Read more

The Kalashnikov is dead!

The Kalashnikov is dead!

Mikhail Kalashnikov, the Russian general who invented the Kalashnikov in 1974, has died. But his legacy lives on, certainly in Syria. For the popular automatic rifle, also known as AK-74, features on the flags of Hezbollah Lebanon and Sepah Pasdaran, both of which are fighting alongside the […]

Read more

Iranian money, oil and food are propping up the Syrian regime

A new investigation by Reuters reveals that millions of barrels of Iraqi crude oil have been delivered this year, under the radar, to the Syrian government through Lebanese and Egyptian trading companies, on board Iranian ships. The investigation, based on an examination of previously undisclosed shipping and […]

Read more

‘We haven’t seen anything like this before’

An ill, 73-old Syrian woman in a heart-breaking interview: We are living… no one can live like this. We are living a very difficult life – no sleep, no food, no water, no medicine, no money… we live on begging. We hadn’t seen anything like this before… […]

Read more

Reuters photographer killed in Aleppo

Reuters photographer killed in Aleppo

One of many moving photographs taken by a young Syrian photographer who died on Friday while documenting the battle over the Kindi hospital in Aleppo between rebels and regime forces. Molhem Barakat had been taking pictures for Reuters on a freelance basis. See more of Barakat’s pictures […]

Read more

Summary killings in secret ISIS detention centres

Amnesty International has published a briefing on the “torture, flogging and summary killings … in secret prisons run by the Islamic State in Iraq and Sham (ISIS)”, an armed group linked to Al-Qaeda that controls some areas in northern Syria. Amnesty identifies seven detention facilities used by […]

Read more
Page 23 of 28« First...10...2122232425...Last »