<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>computer security Archives - Reactual</title>
	<atom:link href="https://reactual.com/tag/computer-security/feed" rel="self" type="application/rss+xml" />
	<link>https://reactual.com/tag/computer-security</link>
	<description>Useful Tools and Products</description>
	<lastBuildDate>Wed, 25 May 2016 18:00:55 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://reactual.com/wp-content/uploads/2022/10/cropped-D5LAqfLWwAIaiJG-1-32x32.jpeg</url>
	<title>computer security Archives - Reactual</title>
	<link>https://reactual.com/tag/computer-security</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Top Rated File Encryption Software For PCs</title>
		<link>https://reactual.com/software/top-rated-file-encryption-software-pcs.html</link>
					<comments>https://reactual.com/software/top-rated-file-encryption-software-pcs.html#comments</comments>
		
		<dc:creator><![CDATA[Justin Thomas]]></dc:creator>
		<pubDate>Sat, 23 Jul 2011 15:38:02 +0000</pubDate>
				<category><![CDATA[Software]]></category>
		<category><![CDATA[app]]></category>
		<category><![CDATA[Auto]]></category>
		<category><![CDATA[available]]></category>
		<category><![CDATA[axcrypt]]></category>
		<category><![CDATA[best encryption]]></category>
		<category><![CDATA[cell]]></category>
		<category><![CDATA[com]]></category>
		<category><![CDATA[computer]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[Cons]]></category>
		<category><![CDATA[creation]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Direct]]></category>
		<category><![CDATA[disk encryption]]></category>
		<category><![CDATA[Drive]]></category>
		<category><![CDATA[encrypted files]]></category>
		<category><![CDATA[Encryption]]></category>
		<category><![CDATA[encryption algorithms]]></category>
		<category><![CDATA[encryption review]]></category>
		<category><![CDATA[encryption software]]></category>
		<category><![CDATA[External]]></category>
		<category><![CDATA[File]]></category>
		<category><![CDATA[file encryption]]></category>
		<category><![CDATA[file encryption software]]></category>
		<category><![CDATA[free encryption]]></category>
		<category><![CDATA[Ice]]></category>
		<category><![CDATA[include]]></category>
		<category><![CDATA[interface]]></category>
		<category><![CDATA[Key]]></category>
		<category><![CDATA[king]]></category>
		<category><![CDATA[kruptos 2]]></category>
		<category><![CDATA[kruptos 2 professional]]></category>
		<category><![CDATA[LED]]></category>
		<category><![CDATA[levels]]></category>
		<category><![CDATA[Life]]></category>
		<category><![CDATA[Los]]></category>
		<category><![CDATA[Low]]></category>
		<category><![CDATA[makes]]></category>
		<category><![CDATA[memory]]></category>
		<category><![CDATA[Men]]></category>
		<category><![CDATA[meo]]></category>
		<category><![CDATA[New]]></category>
		<category><![CDATA[number]]></category>
		<category><![CDATA[offer]]></category>
		<category><![CDATA[one]]></category>
		<category><![CDATA[Online]]></category>
		<category><![CDATA[PC encryption]]></category>
		<category><![CDATA[pc world]]></category>
		<category><![CDATA[per]]></category>
		<category><![CDATA[port]]></category>
		<category><![CDATA[Power]]></category>
		<category><![CDATA[Press]]></category>
		<category><![CDATA[price]]></category>
		<category><![CDATA[pro]]></category>
		<category><![CDATA[Product]]></category>
		<category><![CDATA[rated]]></category>
		<category><![CDATA[red]]></category>
		<category><![CDATA[review]]></category>
		<category><![CDATA[reviewers]]></category>
		<category><![CDATA[reviews]]></category>
		<category><![CDATA[Rice]]></category>
		<category><![CDATA[RTi]]></category>
		<category><![CDATA[running]]></category>
		<category><![CDATA[safebit]]></category>
		<category><![CDATA[set]]></category>
		<category><![CDATA[soft]]></category>
		<category><![CDATA[speed]]></category>
		<category><![CDATA[support]]></category>
		<category><![CDATA[system]]></category>
		<category><![CDATA[Tex]]></category>
		<category><![CDATA[the]]></category>
		<category><![CDATA[thin]]></category>
		<category><![CDATA[Tool]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[Top]]></category>
		<category><![CDATA[top rated]]></category>
		<category><![CDATA[Top Review Sources]]></category>
		<category><![CDATA[usb]]></category>
		<category><![CDATA[use]]></category>
		<category><![CDATA[used]]></category>
		<category><![CDATA[Useful]]></category>
		<category><![CDATA[volume]]></category>
		<category><![CDATA[Ware]]></category>
		<category><![CDATA[way]]></category>
		<category><![CDATA[website]]></category>
		<category><![CDATA[word]]></category>
		<category><![CDATA[work]]></category>
		<category><![CDATA[x]]></category>
		<guid isPermaLink="false">https://reactual.com/?p=3425</guid>

					<description><![CDATA[<ul>
<li><a href="https://reactual.com/?p=3425#kruptos">Kruptos 2 Professional ($15)</a></li>
<li><a href="https://reactual.com/?p=3425#meo">MEO (Free)</a></li>
<li><a href="https://reactual.com/?p=3425#axcrypt">AxCrypt (Free)</a></li>
<li><a href="https://reactual.com/?p=3425#safebit">SafeBit ($40)</a></li>
</ul>
<p>The post <a href="https://reactual.com/software/top-rated-file-encryption-software-pcs.html">Top Rated File Encryption Software For PCs</a> appeared first on <a href="https://reactual.com">Reactual</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>File encryption software allows you to secure individual files and folders by associating a key with the data you wish to protect. Only by entering the key will a user have access to the encrypted files. Unlike disk encryption—where a master key is used to lock down all the data on a volume—file encryption allows you to selectively encrypt data while employing different encryption algorithms and keys for different files. We’ve taken a close look at professional and user reviews on sites such as CNET, PC Advisor, Dowload.com, Softpedia, Lifehacker, PC World, digZIP, and rbytes in order to bring you the top rated file encryption software for PCs:</p>
<p><a name="kruptos"></a></p>
<figure id="attachment_3429" aria-describedby="caption-attachment-3429" style="width: 212px" class="wp-caption aligncenter"><a href="https://www.kruptos2.co.uk/order.html"><img fetchpriority="high" decoding="async" class="size-full wp-image-3429" src="https://reactual.com/wp-content/uploads/2011/07/Kruptos-2-Professional.gif" alt="Kruptos 2 Professional" width="212" height="262" /></a><figcaption id="caption-attachment-3429" class="wp-caption-text">Kruptos 2 Professional</figcaption></figure>
<h2>Kruptos 2 Professional ($15)</h2>
<p>Pros:</p>
<ul>
<li>Easy to use</li>
<li>Can mask file names</li>
<li>Includes secure deletion and self-extracting file creator tools</li>
</ul>
<p>Cons:</p>
<ul>
<li>Limited functionality without payment</li>
</ul>
<p>Top Review Sources:</p>
<ul>
<li>CNET: 5.0/5.0 “Kruptos 2, with all its features, is what every user needing simple file encryption desires”</li>
<li>PC Advisor: “Simple and effective file and folder encryption at an excellent price point”</li>
<li>Download.com User Reviews: 4.0/5.0 (130+ reviews)</li>
</ul>
<p><a href="https://www.kruptos2.co.uk/order.html" target="_blank">Kruptos 2 Professional</a> provides an easy way to password protect any number of files, with the option of masking even the file names themselves. Part of what makes Kruptos 2 Professional easy to use is its tight integration with Windows; right-click a file and you are only one more click away from encrypting it. You can also drag and drop files and folders onto the Kruptos user interface in order to encrypt them. After decrypting a file for editing, Kruptos will automatically re-encrypt it upon close. The program uses the 256-bit Blowfish algorithm to encrypt files. Kruptos also includes a secure file deletion tool, self-extracting file creator, and the ability to encrypt a USB flash drive.</p>
<p>Kruptos 2 Professional is available for purchase on the <a href="https://www.kruptos2.co.uk/order.html" target="_blank">manufacturer’s website</a>.</p>
<p><a name="meo"></a></p>
<figure id="attachment_3430" aria-describedby="caption-attachment-3430" style="width: 150px" class="wp-caption aligncenter"><a href="https://www.nchsoftware.com/encrypt/index.html"><img decoding="async" class="size-full wp-image-3430" src="https://reactual.com/wp-content/uploads/2011/07/MEO.jpg" alt="MEO" width="150" height="198" srcset="https://reactual.com/wp-content/uploads/2011/07/MEO.jpg 150w, https://reactual.com/wp-content/uploads/2011/07/MEO-100x132.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /></a><figcaption id="caption-attachment-3430" class="wp-caption-text">MEO</figcaption></figure>
<h2>MEO (Free)</h2>
<p>Pros:</p>
<ul>
<li>Free</li>
<li>Interface is as simple as it gets</li>
<li>Tiny installation footprint</li>
</ul>
<p>Cons:</p>
<ul>
<li>Advertisements</li>
<li>Email encryption isn’t as straightforward as file encryption</li>
</ul>
<p>Top Review Sources:</p>
<ul>
<li>CNET: 4.0/5.0 “As far as free file encryption programs go, this is one of the better ones we&#8217;ve seen”</li>
<li>Softpedia User Reviews: 3.8/5.0 (25+ reviews)</li>
<li>Download.com User Reviews: 4.5/5.0 (5+ reviews)</li>
</ul>
<p><a href="https://www.nchsoftware.com/encrypt/index.html" target="_blank">MEO</a> has a bare-bones interface that puts those new to the encryption game at ease. Encryption and decryption are simple processes that take only a couple of clicks, either from the MEO interface or from a Windows context menu. MEO allows you to create self-extracting encrypted folders. The program provides the option to encrypt an email, though novices may find MEO’s method of doing this hard to follow. The product’s main demerit is its advertising; MEO will prompt you to install additional software during installation (though you can opt out). MEO employs the Triple DES 256-bit algorithm.</p>
<p>MEO can be downloaded directly from the <a href="https://www.nchsoftware.com/encrypt/index.html" target="_blank">publisher</a>.</p>
<p><a name="axcrypt"></a></p>
<figure id="attachment_3432" aria-describedby="caption-attachment-3432" style="width: 312px" class="wp-caption aligncenter"><a href="https://www.axantum.com/axcrypt/"><img decoding="async" class="size-full wp-image-3432" src="https://reactual.com/wp-content/uploads/2011/07/AxCrypt.jpg" alt="AxCrypt" width="312" height="51" srcset="https://reactual.com/wp-content/uploads/2011/07/AxCrypt.jpg 312w, https://reactual.com/wp-content/uploads/2011/07/AxCrypt-300x49.jpg 300w" sizes="(max-width: 312px) 100vw, 312px" /></a><figcaption id="caption-attachment-3432" class="wp-caption-text">AxCrypt</figcaption></figure>
<h2>AxCrypt (Free)</h2>
<p>Pros:</p>
<ul>
<li>Free</li>
<li>Fully integrated into Windows</li>
<li>Includes file shredder and self-extracting file creator</li>
</ul>
<p>Cons:</p>
<ul>
<li>No support for 256-bit encryption</li>
</ul>
<p>Top Review Sources:</p>
<ul>
<li>CNET: 5.0/5.0 “AxCrypt is both powerful and easy to use, and we think that it&#8217;s a great way to keep files secure for users of all experience levels”</li>
<li>Lifehacker: One of the “Five Best File Encryption Tools”</li>
<li>PC World: “A simple, free way to encrypt individual files”</li>
</ul>
<p><a href="https://www.axantum.com/axcrypt/" target="_blank">Axantum’s AxCrypt</a> provides a free and easy way to deploy AES-128 encryption on your PC. Fully integrated with Windows, AxCrypt is operated exclusively via the context menu—there is no other user interface. The program supports the creation of self-extracting files, plus includes a file shredder for secure deletion. You can set a passcode on encrypted files, or you can create a key file. A key file is typically stored on removable media such as a USB flash drive. When you insert the drive into the computer, it will allow decryption. AxCrypt’s online help file is thorough and quite useful for both new and experienced users.</p>
<p>You can download AxCrypt from the <a href="https://www.axantum.com/axcrypt/" target="_blank">publisher’s site</a>.</p>
<p><a name="safebit"></a></p>
<figure id="attachment_3433" aria-describedby="caption-attachment-3433" style="width: 250px" class="wp-caption aligncenter"><a href="https://www.safebit.net/order.html"><img loading="lazy" decoding="async" class="size-full wp-image-3433" src="https://reactual.com/wp-content/uploads/2011/07/SafeBit.jpg" alt="SafeBit" width="250" height="373" srcset="https://reactual.com/wp-content/uploads/2011/07/SafeBit.jpg 250w, https://reactual.com/wp-content/uploads/2011/07/SafeBit-201x300.jpg 201w" sizes="auto, (max-width: 250px) 100vw, 250px" /></a><figcaption id="caption-attachment-3433" class="wp-caption-text">SafeBit</figcaption></figure>
<h2>SafeBit ($40)</h2>
<p>Pros:</p>
<ul>
<li>Easy-to-use interface</li>
<li>Strong, flexible encryption</li>
</ul>
<p>Cons:</p>
<ul>
<li>Cost</li>
<li>Only one encryption algorithm</li>
</ul>
<p>Top Review Sources:</p>
<ul>
<li>Softpedia: 4.5/5.0 “Very Good”</li>
<li>digZIP: “SafeBit Disk Encryption is uncomplicated software with an attractive interface that securely converts files unnoticed”</li>
<li>rbytes User Rating: 3.5/5.0</li>
</ul>
<p><a href="https://www.safebit.net/order.html" target="_blank">NeoByte Solutions’ SafeBit</a> employs an intuitive, clean interface, helping make file encryption tasks go quickly and smoothly. Advanced users will appreciate the plethora of customization options. To encrypt your data, SafeBit requires you to create a password-protected virtual drive (called a “safe”). You may create as many safes as you’d like. Users are able to save their passwords on external memory—such as a flash drive—to create a key they can use to unlock and lock their safes. The program operates transparently, encrypting your files automatically as you work within a virtual drive. In the process, SafeBit will not drag down the speed and responsiveness of your system. SafeBit makes use of a single encryption algorithm: AES-256. AES-256 is an effective algorithm, but some reviewers express disappointment in it being the only one offered, given the cost of the program. SafeBit includes a virtual keyboard as a safeguard against keyloggers. The help files are robust, and allow a beginner to get up and running quickly.</p>
<p>You can purchase SafeBit on the <a href="https://www.safebit.net/order.html" target="_blank">official website</a>.</p>
<p>The post <a href="https://reactual.com/software/top-rated-file-encryption-software-pcs.html">Top Rated File Encryption Software For PCs</a> appeared first on <a href="https://reactual.com">Reactual</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://reactual.com/software/top-rated-file-encryption-software-pcs.html/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>An Introduction To Online Privacy Tools: Part 1</title>
		<link>https://reactual.com/software/security-goals.html</link>
					<comments>https://reactual.com/software/security-goals.html#respond</comments>
		
		<dc:creator><![CDATA[Justin Thomas]]></dc:creator>
		<pubDate>Fri, 20 May 2011 23:33:17 +0000</pubDate>
				<category><![CDATA[Software]]></category>
		<category><![CDATA[Arc]]></category>
		<category><![CDATA[Auto]]></category>
		<category><![CDATA[available]]></category>
		<category><![CDATA[Car]]></category>
		<category><![CDATA[card]]></category>
		<category><![CDATA[com]]></category>
		<category><![CDATA[computer]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[Cons]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Designed]]></category>
		<category><![CDATA[detail]]></category>
		<category><![CDATA[Ear]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[file sharing]]></category>
		<category><![CDATA[ghost]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[hour]]></category>
		<category><![CDATA[include]]></category>
		<category><![CDATA[information]]></category>
		<category><![CDATA[Key]]></category>
		<category><![CDATA[Keylogging]]></category>
		<category><![CDATA[king]]></category>
		<category><![CDATA[Low]]></category>
		<category><![CDATA[made]]></category>
		<category><![CDATA[makes]]></category>
		<category><![CDATA[manager]]></category>
		<category><![CDATA[Men]]></category>
		<category><![CDATA[meo]]></category>
		<category><![CDATA[monitor]]></category>
		<category><![CDATA[Multi]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[one]]></category>
		<category><![CDATA[Online]]></category>
		<category><![CDATA[online privacy]]></category>
		<category><![CDATA[per]]></category>
		<category><![CDATA[person]]></category>
		<category><![CDATA[port]]></category>
		<category><![CDATA[preference]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[private browsing]]></category>
		<category><![CDATA[private email]]></category>
		<category><![CDATA[pro]]></category>
		<category><![CDATA[reading]]></category>
		<category><![CDATA[reason]]></category>
		<category><![CDATA[red]]></category>
		<category><![CDATA[return]]></category>
		<category><![CDATA[RTi]]></category>
		<category><![CDATA[running]]></category>
		<category><![CDATA[secure browsers]]></category>
		<category><![CDATA[secure email]]></category>
		<category><![CDATA[secure instant messages]]></category>
		<category><![CDATA[series]]></category>
		<category><![CDATA[Service]]></category>
		<category><![CDATA[set]]></category>
		<category><![CDATA[support]]></category>
		<category><![CDATA[surveillances]]></category>
		<category><![CDATA[system]]></category>
		<category><![CDATA[the]]></category>
		<category><![CDATA[thin]]></category>
		<category><![CDATA[Tool]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[Top]]></category>
		<category><![CDATA[torrents]]></category>
		<category><![CDATA[use]]></category>
		<category><![CDATA[used]]></category>
		<category><![CDATA[VPNs]]></category>
		<category><![CDATA[website]]></category>
		<category><![CDATA[wifi security]]></category>
		<category><![CDATA[wireless]]></category>
		<category><![CDATA[word]]></category>
		<category><![CDATA[work]]></category>
		<category><![CDATA[Works]]></category>
		<category><![CDATA[x]]></category>
		<guid isPermaLink="false">https://reactual.com/?p=7232</guid>

					<description><![CDATA[<p>There are many reasons to seek privacy on the internet. These days, we have ISPs monitoring our connections, corporations tracking and consolidating our information across multiple websites. We have governments and other institutions routinely monitoring our internet activities. We have hackers, identity thieves and criminals attempting to access our computers and steal our personal information. [&#8230;]</p>
<p>The post <a href="https://reactual.com/software/security-goals.html">An Introduction To Online Privacy Tools: Part 1</a> appeared first on <a href="https://reactual.com">Reactual</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>There are many reasons to seek privacy on the internet. These days, we have ISPs monitoring our connections, corporations tracking and consolidating our information across multiple websites. We have governments and other institutions routinely monitoring our internet activities. We have hackers, identity thieves and criminals attempting to access our computers and steal our personal information.</p>
<p>Basically, internet privacy should be of interest to everyone. Even if you feel you have &#8220;nothing to hide&#8221; you probably still value having curtains on your windows, or not having your credit card statements available for anyone to read. Likewise, most people are not comfortable with having every email they write and every web site they visit being broadcasted to the public.</p>
<h2>Overview</h2>
<p>In this series of articles I&#8217;ll be covering the following topics:</p>
<ul>
<li>Making your web browsing private</li>
<li>Installing a VPN or &#8220;Virtual Private Network&#8221;</li>
<li>Securing your computers and wireless network</li>
<li>Encrypting your email and instant messages</li>
</ul>
<p>These are basic secure measures &#8212; something everyone should have in place before they go online.</p>
<h3>Install The &#8220;HTTPs Everywhere&#8221; Browser Extension</h3>
<p><a href="https://www.eff.org/https-everywhere"><img loading="lazy" decoding="async" title="https-everywhere" src="https://reactual.com/wp-content/uploads/2012/05/https-everywhere.jpg" alt="" width="510" height="127" /></a></p>
<p>Why you&#8217;d want to do this:</p>
<ul>
<li>To stop eavesdroppers tracking the sites you visit</li>
<li>To stop eavesdroppers monitoring the information your send via HTTP</li>
</ul>
<p>The <a href="https://www.eff.org/https-everywhere">HTTPs Everywhere</a> is an extension for the Firefox and Chrome browsers, made by the <a href="https://www.eff.org">Electronic Frontiers Foundation</a>. It encrypts your communications with many major websites, giving you a basic level of web browsing privacy. For example, if you are reading email in Gmail or Hotmail, your email messages will be encrypted before they are sent to your web browser. Similarly, an eavesdropper won&#8217;t be able to detect what Wikipedia articles you are reading, or what items you are purchasing at an online store. However, this is true only for the websites that <a href="https://www.eff.org/https-everywhere">HTTPs Everywhere</a> supports, and only for the parts of those websites that support HTTPs connections. Here&#8217;s a <a href="https://gitweb.torproject.org/https-everywhere.git/tree/HEAD:/src/chrome/content/rules">raw list</a> of the sites they support.</p>
<p>Note that HTTPS Everywhere does not conceal the identities of the sites you access, or the amount of time you spend using them. For example, an eavesdropper can tell you accessed Wikipedia for an hour, but they won&#8217;t be able to see which particular articles you read on Wikipedia.</p>
<h3>Install The &#8220;Ghostery&#8221; Browser Extension</h3>
<p><a href="https://www.ghostery.com/"><img loading="lazy" decoding="async" title="ghostery-set" src="https://reactual.com/wp-content/uploads/2012/05/ghostery-set.jpg" alt="" width="550" height="120" /></a></p>
<p><a href="https://www.ghostery.com/">Ghostery</a> is a browser extension that blocks the &#8220;invisible&#8221; web. It detects trackers, web bugs, pixels, and beacons placed on web pages by Facebook, Google Analytics, and over 1,000 other ad networks, behavioral data providers and web publishers.</p>
<p>I like <a href="https://www.ghostery.com/">Ghostery</a> because it&#8217;s a &#8220;set and forget&#8221; add-on  &#8212; Ghostery will continue to work silently in the background as you browse, removing all those undesirable tracking elements in web pages. I prefer to turn off the notification the blocked elements (you can find this option in the Ghostery preferences).</p>
<h3>Use A Search Engine That Doesn&#8217;t Log Your Searches</h3>
<p><a href="https://www.duckduckgo.com/"><img loading="lazy" decoding="async" title="duckduckgo-ad" src="https://reactual.com/wp-content/uploads/2012/05/duckduckgo-ad1-550x220.jpg" alt="" width="550" height="220" /></a></p>
<p>Why you&#8217;d want to do this:</p>
<ul>
<li>To stop search engines logging and storing your searches</li>
<li>To stop web sites and other corporations from collecting and selling your personal information</li>
</ul>
<p>Many popular search engines like Google and Bing, save your search history. Typically, your searches are saved along with some information about your computer (e.g. your <a href="https://duckduckgo.com/IP_Address">IP address</a>, <a href="https://duckduckgo.com/User_agent">User agent</a> and often a unique identifier stored in a <a href="https://duckduckgo.com/HTTP_cookie">browser cookie</a>), and if you are logged in, your account information (e.g. name and email address).</p>
<p>With this information, your searches can be tied together. This means someone can see everything you&#8217;ve been searching, not just one isolated search. You can usually find out a lot about a person from their search history.</p>
<p>They also put cookies on your browser to uniquely identify you. For example, when you search for something private, you are sharing that private search not only with your search engine, but also with all the sites that you clicked on (for that search). See <a href="https://donttrack.us/">this page</a> for more info.</p>
<p>If you want to avoid this tracking, you can make use of search engine that take privacy seriously, like <a href="https://www.startpage.com">StartPage</a> or <a href="https://www.duckduckgo.com">DuckDuckGo</a>.</p>
<p>I like <a href="https://www.startpage.com">StartPage</a> by <a href="https://www.ixquick.com">Ixquick</a> because they incorporate search results from Google. Startpage removes all identifying information from your query and submits it anonymously to Google. They get the results and return them to you privately. <a href="https://www.startpage.com">StartPage</a> also includes a free web proxy, which can open sites anonymously for you.</p>
<p>Ixquick&#8217;s Privacy Policy is routinely being confirmed by two independent organizations &#8212; <a href="https://www.european-privacy-seal.eu/awarded-seals/de-080001p/" target="_blank">Europrise</a> and <a href="https://www.certifiedsecure.com/certificates/6a19001f6fb552665f5db54fe61fac07/">Certified Secure</a>.</p>
<p><a href="https://www.duckduckgo.com">DuckDuckGo</a> is another good search engine with a focus on privacy. Like StartPage, DuckDuckGo and does not record user information &#8212; see their <a href="https://duckduckgo.com/privacy.html">privacy policy</a> for the details.</p>
<h3>Configure Your Web Browser For Privacy</h3>
<p><a href="https://reactual.com/wp-content/uploads/2012/05/12_04_10_DoNotFollow_Firefox4.jpg" data-rel="lightbox-image-0" data-rl_title="" data-rl_caption=""><img loading="lazy" decoding="async" title="" src="https://reactual.com/wp-content/uploads/2012/05/12_04_10_DoNotFollow_Firefox4.jpg" alt="" width="488" height="338" /></a></p>
<p>You can easily adjust your web browser to enhance your privacy. You can turn off <a href="https://en.wikipedia.org/wiki/Third-party_cookie#Privacy_and_third-party_cookies">third-party cookies</a> &#8212; these are cookies that are sent to advertising firms. Turning off these cookies just means you&#8217;ll be tracked less &#8212; it won&#8217;t affect your browsing ability. I prefer to turn off cookies completely, and use the <a href="https://dietrich.cx/Development/CookieWhitelistWithButtons">Cookie Whitelist</a> add-on to only accept cookies from specific sites that I log into.</p>
<p>You can install a extension like <a href="https://adblockplus.org">Adblock Plus</a> (Firefox, Chrome) to block ads, thereby reducing the amount of information collected by advertisers.</p>
<p>You can turn off Java and Flash in your browser (both can be a security risk &#8212; see an explanation <a href="https://noscript.net/faq#qa1_10">here</a>).</p>
<p>You can install an extension like <a href="https://noscript.net/">No Script</a> (Firefox only), which stops web pages loading and running Javascript, Java and Flash. Using <a href="https://noscript.net/">No Script</a> can be tedious but it protects against attacks like <a title="Wikipedia definition for XSS" href="https://en.wikipedia.org/wiki/Cross_site_scripting" target="_blank" rel="nofollow external">Cross-Site Scripting (XSS)</a> and <a href="https://en.wikipedia.org/wiki/Clickjacking">Clickjacking</a> (a trick that causes you to click and run a malicious program).</p>
<h3></h3>
<h3>Use A Password Manager</h3>
<p><a href="https://agilebits.com/onepassword"><img loading="lazy" decoding="async" title="1password" src="https://reactual.com/wp-content/uploads/2012/05/1password.jpg" alt="" width="570" height="358" /></a></p>
<p>It makes sense to use password manager like <a href="https://lastpass.com/">LastPass</a>, <a href="https://keepass.info/">KeePass</a> or <a href="https://agilebits.com/onepassword">1Password</a>. Password managers allow you create strong, unique passwords for each website you log into. Also, Password Managers can automatically log into websites for you, which prevents <a href="https://en.wikipedia.org/wiki/Keystroke_logging">key-logging</a> (attempts to capture your keystrokes and hence your passwords). <a href="https://lastpass.com/">LastPass</a> and <a href="https://keepass.info/">KeePass</a> are free and are both good programs. <a href="https://agilebits.com/onepassword">1Password</a> is the most polished and is frequently updated, but costs $50.</p>
<p>Continued&#8230; Read <a href="https://reactual.com/privacy-services/internet-security-tools-part-2.html">Part 2</a> of this article series.</p>
<p>The post <a href="https://reactual.com/software/security-goals.html">An Introduction To Online Privacy Tools: Part 1</a> appeared first on <a href="https://reactual.com">Reactual</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://reactual.com/software/security-goals.html/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Page Caching using Disk: Enhanced 

Served from: reactual.com @ 2026-04-28 00:59:23 by W3 Total Cache
-->