Select language / زبان خود را انتخاب کنيد

Computer Security

USEFUL TIPS FOR USING A COMPUTER MORE SECURELY

Computer surveillance has become a huge and advanced industry. From governments and intelligence services, through companies and advertisers, to criminals and hackers, more people than your think are interested in the data stored on your computer. Below are some tips to help you protect yourself as much as possible.

1. Encrypt your important files and folders.

Why? Because anyone who can gain remote access or hack into your computer (and it’s not that difficult!) can gain access to pretty much any file stored on your computer. Also, if police and intelligence agencies get hold of your computer, they can easily bypass your operating system’s password and access your files, using special discs like UBCD4Win or Hiren’s BootCD.

How? There are many encryption programmes nowadays that can do this for you, e.g. TrueCrypt, GPG4Win, BitLocker, Luks, eCryptfs, etc. There is a good comparison of encryption software on Wikipedia.

IMPORTANT: Note that encrypting and decrypting single files is not completely safe. Why? Because if you don’t re-encrypt the file after decrypting it and delete the resulting ‘cleartext’ file, you will end up with two versions of the file, so unencrypted data will still be there on your disk. The only way to be totally safe is to encrypt your computer’s hard drive altogether, or at least your Home partition (My Computer in Windows).

2. If that is too much hassle, and your files and folders are not that secret but are still a little bit sensitive, at least protect your files and folders with a password.

How? The easiest way to do this is to compress the folder you want to protect (as a zip archive) and entering a password under ‘Other options’. There are many other ways and programmes to do similar things, depending on your operating system.

3. Use a shredding programme to delete important, sensitive files.

Why? Because retrieving or recovering deleted data from disks (using a technology called Magnetic Force Microscopy) is easier than you think.

How? There are special programmes that ‘wipe’ the file beyond recovery by repeatedly writing special patterns to it so that it is completely destroyed. Popular ones include File Shredder, CBL Data Shredder, Wipe, diskscrub and so on.

4. Use different, strong passwords for different things.

Why? Because weak passwords are easy to crack with simple techniques like ‘brute force’, ‘password dictionaries’ and so on. Examples of weak or predictable passwords include simple dictionary words or predictable things like names or dates of birth. Replacing some letters with commonly used replacement symbols, like 3 for ‘e’ or @ for ‘a’, is not as safe as you think.

How? Strong passwords use a long-ish combination of upper- and lower-case letters, digits and symbols, e.g. whY?m3!! (from ‘why me’), which shouldn’t be very difficult to remember.

The other important thing about passwords is not to use the same password for all your accounts.

Why? Because if one account is hacked, then all your other accounts (emails, FB, bank, etc.) are potentially at risk too. If you find it difficult to remember all your passwords, write them down and keep the piece of paper in a secure place (but be careful not to forget where you put it or store it somewhere where others might easily find it one day!). And it’s always a good idea to change your passwords from time to time.

If you are using the Mozilla Firefox web browser (which is recommended) and prefer the browser to store your passwords because you can’t be bothered to enter them every time, it is strongly recommended – especially if you share your computer with other people – that you set up a ‘master password’. This means Firefox will ask you for this one password every time you want to access a password-protected page, like an email login page. You can do that from the ‘Security’ tab in ‘Preferences’.

IMPORTANT: Never ever send passwords as plain text via email, Facebook messages, mobile phone texts and so on. It defeats the whole point of passwords!

5. Keep your software up to date.

Why? Because out-of-date software, which is no longer maintained by developers, may have some security risks and loopholes that others could utilise to gain access to your computer.

Speaking of updates, it is advised that you try to avoid – as much as possible – commercial operating systems and software (Windows and Mac OS). Linux and open-source software are generally more secure, and they are free!

6. Be extra careful when using public or shared computers, e.g. in internet cafés.

Why? Because public computers are often not configured to be very secure, might store you passwords and other details, or might even have spying software installed on them. If you didn’t have a choice but to use a public computer to do your political stuff, it is a good idea to change your password afterwards. And if you can, try to clear the browser’s history and cache before you leave (you will find these options in the browser’s settings or preferences, depending on which browser and operating system they are using).

REMEMBER: Security is only effective as long as everyone in the group takes it seriously. If one person is not very careful and ‘leaks’ data, all the others in the group are at risk.

 

 

Why Khamenei wants to destroy Iraq, Syria and Lebanon?

A new #Khamenei_in_Syria joke: Q: #Why_Khamenei wants to completely destroy Iraq, #Syria and Lebanon? A: Because he wants a view onto the Mediterranean. EXPLANATORY NOTES: Under the supreme leadership of Ayatollah Khamenei, Sepah Pasdaran has been responsible for much of the death and destruction in Syria, Lebanon […]

Read more

New series of jokes about #Khamenei_in_Syria

Sometimes all one can do in the face of death is laughter. In fact, laughter and joking can sometimes be the only adequate response to certain absurd situations. As American humourist Mark Twain once said, “The human race has one really effective weapon, and that is laughter… […]

Read more

LETTERS FROM SYRIA TO IRAN

LETTERS FROM SYRIA TO IRAN

INTERVIEW OF NAAME SHAAM WITH NOW ONLINES NEWS SITE ON: Role of Iran in Syria, strategic importance of Hezbollah for Pasdaran, etc. 17.4.2014 Hanin Ghaddar, managing editor of NOW, speaks with Naame Shaam Source: https://now.mmedia.me/lb/en/interviews/543426-letters-from-syria-to-iran It is no secret that Bashar al-Assad wouldn’t have survived till now […]

Read more

WHY SEPAH PASDARAN GUARANTEED BASHAR AL-ASSAD’S RE-ELECTION ON 3 JUNE 2014

WHY SEPAH PASDARAN GUARANTEED BASHAR AL-ASSAD’S RE-ELECTION ON 3 JUNE 2014

Everyone knows that the Syrian presidential ‘elections’ on 3 June 2014 are a farce. But it may be useful to remember why, and to consider the message the Iranian regime is sending to the world via these elections. First, there have never been free and fair elections […]

Read more

Video of Qassem Soleimani’s Syria ‘election rally’ at Iranian embassy in London

On the eve of the Syrian elections, Naame Shaam activists staged a mock ‘election rally’ for Gen. Qassem Soleimani in front of the Iranian embassy in London to highlight the role of Iran in fuelling the ongoing Syrian conflict. For more details, see our press release.   […]

Read more

Photos of Qassem Soleimani’s Syria ‘election rally’ at Iranian embassy in London

Photos of Qassem Soleimani’s Syria ‘election rally’ at Iranian embassy in London

On the eve of the Syrian elections, Naame Shaam activists staged a mock ‘election rally’ in front of the Iranian embassy in London to highlight the role of Iran in fuelling the ongoing Syrian conflict. For more details, see our press release. (to download high-resolution versions of […]

Read more

Iranian activists stage mock Syrian election rally outside London embassy

Iranian activists stage mock Syrian election rally outside London embassy

Activists: “Vote for Qassem Soleimani President of Syria and his deputy Bashar al-Assad London/Tehran, 2 June 2014 – On the eve of the Syrian elections, activists from the anonymous Iranian campaign group Naame Shaam [1] today staged a mock ‘election rally’ – in front of the Iranian […]

Read more

Iranian regime to ‘monitor’ Syrian presidential ‘elections’

Iranian regime to ‘monitor’ Syrian presidential ‘elections’

The Iranian Deputy Foreign Minister for Arab and African Affairs has confirmed the Iranian regime’s plans to send ‘observers’ to Syria to ‘monitor’ the country’s sham presidential election on 3 June 2014. “The Iranian parliament will dispatch a team to Syria soon to supervise the election and […]

Read more

As part of his Syria ‘election campaign’ tour: Qassem Soleimani visits family of killed Syrian shabbiha commander Hilal al-Assad

As part of his Syria ‘election campaign’ tour: Qassem Soleimani visits family of killed Syrian shabbiha commander Hilal al-Assad

“He killed the killed and walked in his funeral” The chief of Sepah Quds Gen. Qasem Soleimani has reportedly made a secret visit to Latakya to offer his belated condolences to the family of Hilal al-Assad, who was killed in Latakiya in March 2014. Hilal al-Assad, a […]

Read more

NAAME SHAAM TRANSLATES INTO PERSIAN HRW REPORT ABOUT ASSAD THE DICTATOR

NAAME SHAAM TRANSLATES INTO PERSIAN HRW REPORT ABOUT ASSAD THE DICTATOR

“Wasted Decade – Ten years of Bashar al-Assad in Power (2000-2010)” Tehran, 28 May 2014 – Naame Shaam has translated and published today into Persian the Human Rights Watch report “Wasted Decade”, which was released only in English and Arabic on July 16, 2010. This is an […]

Read more
Page 8 of 28« First...678910...20...Last »