1. TOR BROWSER BUNDLE
Includes all you’ll need to access the Tor Network.
Makes it more difficult to trace Internet activity: Web browsing, online posts, instant messages and other communication forms. Cannot prevent monitoring of traffic entering/exiting the network. While Tor protects against traffic analysis, it cannot prevent traffic confirmation (also called end-to-end correlation).
2. BLEACH BIT
Many features to help you easily clean your computer, free-up space and maintain privacy.
3. TAILS
A live operating system. Start on almost any computer from DVD/USB stick. Preserves your privacy and anonymity.
Comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite and more.
4. ENCRYPTION OPTIONS
AxCrypt / DiskCryptor / BitLocker / AES Crypt / Kruptos 2 / BestCrypt / CloudFogger
Create virtual hard drives which encrypt any files you save onto them. Many types of encryption.
5. PIDGIN
Chat software that allows use of existing instant messaging accounts. Supports Facebook, Google Chat, AIM, MSN + more.
6. OFF THE RECORD
A simple plugin for Pidgin. It encrypts all conversations held using the software.
7. THUNDERBIRD
Free email software. Add your existing mail account to it.
8. ENIGMAIL
A security extension to Thunderbird. Write/receive emails signed and/or encrypted with the OpenPGP standard.
9. GNUPG
Free implementation of the OpenPGP standard. Encrypt and sign your emails.
This blog was originally conceived as a personal reference. Later I added notes and my publications
Sunday, November 24, 2013
Thursday, November 21, 2013
U.S. Army Reconnaissance and Surveillance Handbook
The official United States Army manual, U.S. Army Reconnaissance and Surveillance Handbook provides tactics, techniques, and procedures for reconnaissance and surveillance planning, mission management, and reporting. Throughout history, military leaders have recognized the importance of reconnaissance and surveillance. Gaining and maintaining contact with the enemy is essential to win the battle, and U.S. military history contains many examples where our knowledge of the enemy, or lack of knowledge, directly led to victory or defeat. The role of reconnaissance and surveillance has not diminished on the modern battlefield; if anything, it has become even more important. Battles at the combat training centers prove that a good reconnaissance and surveillance effort is critical to successful attacks. On the other hand, a poor reconnaissance and surveillance effort almost guarantees defeat for the commander. The message is clear: success on the battlefield begins with reconnaissance and surveillance. This essential handbook covers: SurveillancePreparationAssetsEquipmentPlanningMonitoringOrganizing MissionsElectronic warfareCounter-reconnaissanceAnd more! It also looks at the development of intelligence, employment considerations for reconnaissance, and defines the roles of various personnel in planning operations. Intended for maneuver commanders and their staffs; intelligence staffs and collection managers; and other personnel involved in planning and reconnaissance and counter-reconnaissance operations, and now available to everyone, U.S. Army Reconnaissance and Surveillance Handbook provides an insider&;s look into the world of Army intelligence.
Subscribe to:
Posts (Atom)