Home Security Computer Quick Paranoid’s Guide to Computer Security in 2017

Quick Paranoid’s Guide to Computer Security in 2017

Digital safety guide

If you are obsessed with an idea that some evildoers can hack your computer, track your IP address and delete your personal information, then check this article out to learn about some easy tricks that can help you to enhance your digital security.

Encrypt your files

Encrypt your files

If you have some really sensitive files on your computer, you may want to want to make them more secure. You can use encryption for this purpose. Most of the modern operating systems have built-in options to encrypt all the documents.

For higher security, use PGP encryption and third-party encryption software like VeraCrypt that encrypt your data on-the-fly. Keep all the encrypted files on a separate removable storage device like USB or external hard drive. Make sure that this device is hidden well.

Whenever you encrypt anything, use a really strong password that consists of letters, numbers and specific symbols. That would make it much harder to hack. Never use the same password for different purposes.

Decide which computer to use

Is my computer safe

If you want to send someone private information online, think twice which computer to use for this purpose. It’s not safe to contact anyone from your work computer as other people may have access to it.

If you still use your home computer, make sure that OS and the software is up to date. Does your PC have the latest version of antivirus on it? Do you have any firewall software installed?

To conceal your personality from attentive eyes, use a public computer at an internet cafe or a public Wi-Fi network. The public computers may lack the software you need and public Wi-Fi is surely less secure than any private network, but their mass usage can help you to hide who you are.

Whichever computer you use, don’t forget that your online activities still can be tracked by your IP address and that browser software keep the history of your actions. Use private browsing or incognito options to hide your traces, or better yet, use Tor.

Use Tor to hide your personality online

How to use Tor

The Tor network is designed to bounce your online activities through a number of relays to hide your location. It helps to hide your IP address and makes it very difficult to understand where a specific message came from. Also you can configure Tor in such a way so as to immediately clear up your browser history and to hide your private information online.

You need Tor software to get access to the Tor network. It’s free and it is fully compatible with the most popular OS, such as Windows, Mac and Linux. Once you install it, you can use it just like any other usual browser.

To maximize your security, use Tails

How to use Tails

Tails, which is the abbreviation of The Amnesiac and Incognito Live System, is an OS that is all about nothing else but security. It uses Tor network by default, it helps you to identify local monitoring, when you log out, it deletes any unencrypted content. It has a much higher level of security than any other mobile or desktop operating system.

Moreover, you don’t need to reinstall your current OS to be able to use it. Just download and install it to a USB stick and then select an option “start from USB” when launching the machine.

Was this article useful? Feel free to tell us in the comments and check out 12 top security threats of 2017 and 9 best antivirus solutions to protect you.