<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>VPNs Archives - Reactual</title>
	<atom:link href="https://reactual.com/tag/vpns/feed" rel="self" type="application/rss+xml" />
	<link>https://reactual.com/tag/vpns</link>
	<description>Useful Tools and Products</description>
	<lastBuildDate>Wed, 25 May 2016 18:00:55 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://reactual.com/wp-content/uploads/2022/10/cropped-D5LAqfLWwAIaiJG-1-32x32.jpeg</url>
	<title>VPNs Archives - Reactual</title>
	<link>https://reactual.com/tag/vpns</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>An Introduction To Online Privacy Tools: Part 2</title>
		<link>https://reactual.com/software/internet-security-tools-part-2.html</link>
					<comments>https://reactual.com/software/internet-security-tools-part-2.html#respond</comments>
		
		<dc:creator><![CDATA[Justin Thomas]]></dc:creator>
		<pubDate>Sun, 22 May 2011 18:08:56 +0000</pubDate>
				<category><![CDATA[Software]]></category>
		<category><![CDATA[app]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[Arc]]></category>
		<category><![CDATA[Coffee]]></category>
		<category><![CDATA[com]]></category>
		<category><![CDATA[computer]]></category>
		<category><![CDATA[Cons]]></category>
		<category><![CDATA[Crashplan]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Designed]]></category>
		<category><![CDATA[Direct]]></category>
		<category><![CDATA[Drive]]></category>
		<category><![CDATA[drive encryption]]></category>
		<category><![CDATA[Ear]]></category>
		<category><![CDATA[Encryption]]></category>
		<category><![CDATA[File]]></category>
		<category><![CDATA[file sharing]]></category>
		<category><![CDATA[filter]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[hard drives]]></category>
		<category><![CDATA[Home]]></category>
		<category><![CDATA[Ice]]></category>
		<category><![CDATA[include]]></category>
		<category><![CDATA[Key]]></category>
		<category><![CDATA[king]]></category>
		<category><![CDATA[layer]]></category>
		<category><![CDATA[Low]]></category>
		<category><![CDATA[mac]]></category>
		<category><![CDATA[Macs]]></category>
		<category><![CDATA[made]]></category>
		<category><![CDATA[makes]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Men]]></category>
		<category><![CDATA[monitor]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[one]]></category>
		<category><![CDATA[Online]]></category>
		<category><![CDATA[online privacy]]></category>
		<category><![CDATA[per]]></category>
		<category><![CDATA[person]]></category>
		<category><![CDATA[phone]]></category>
		<category><![CDATA[port]]></category>
		<category><![CDATA[pot]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[pro]]></category>
		<category><![CDATA[Product]]></category>
		<category><![CDATA[products]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[rated]]></category>
		<category><![CDATA[reason]]></category>
		<category><![CDATA[red]]></category>
		<category><![CDATA[RTi]]></category>
		<category><![CDATA[series]]></category>
		<category><![CDATA[Service]]></category>
		<category><![CDATA[set]]></category>
		<category><![CDATA[soft]]></category>
		<category><![CDATA[support]]></category>
		<category><![CDATA[system]]></category>
		<category><![CDATA[tablet]]></category>
		<category><![CDATA[tablets]]></category>
		<category><![CDATA[tee]]></category>
		<category><![CDATA[the]]></category>
		<category><![CDATA[Thunder]]></category>
		<category><![CDATA[Tool]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[Top]]></category>
		<category><![CDATA[top rated]]></category>
		<category><![CDATA[truecrypt]]></category>
		<category><![CDATA[usb]]></category>
		<category><![CDATA[use]]></category>
		<category><![CDATA[used]]></category>
		<category><![CDATA[Useful]]></category>
		<category><![CDATA[vers]]></category>
		<category><![CDATA[VPNs]]></category>
		<category><![CDATA[wall]]></category>
		<category><![CDATA[Ware]]></category>
		<category><![CDATA[way]]></category>
		<category><![CDATA[website]]></category>
		<category><![CDATA[Wide]]></category>
		<category><![CDATA[wireless]]></category>
		<category><![CDATA[word]]></category>
		<category><![CDATA[work]]></category>
		<category><![CDATA[Works]]></category>
		<category><![CDATA[x]]></category>
		<guid isPermaLink="false">https://reactual.com/?p=7246</guid>

					<description><![CDATA[<p>This the second article in our series "Internet Privacy Tools For Everyone". This this part we focus on VPNs, Secure Email and other security tips.</p>
<p>The post <a href="https://reactual.com/software/internet-security-tools-part-2.html">An Introduction To Online Privacy Tools: Part 2</a> appeared first on <a href="https://reactual.com">Reactual</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This the second article in our series &#8220;An Introduction To Online Privacy Tools&#8221; (see the first part <a href="https://reactual.com/software/security-goals.html">here</a>).</p>
<h2>Install a VPN (Virtual Private Network)</h2>
<p><a href="https://reactual.com/wp-content/uploads/2011/11/vpn-feature.jpg" data-rel="lightbox-image-0" data-rl_title="" data-rl_caption=""><img fetchpriority="high" decoding="async" class="alignnone size-large wp-image-4193" title="" src="https://reactual.com/wp-content/uploads/2011/11/vpn-feature-640x234.jpg" alt="" width="550" height="201" srcset="https://reactual.com/wp-content/uploads/2011/11/vpn-feature-640x234.jpg 640w, https://reactual.com/wp-content/uploads/2011/11/vpn-feature-655x240.jpg 655w, https://reactual.com/wp-content/uploads/2011/11/vpn-feature-300x110.jpg 300w, https://reactual.com/wp-content/uploads/2011/11/vpn-feature.jpg 900w" sizes="(max-width: 550px) 100vw, 550px" /></a></p>
<p>Using a VPN or &#8220;virtual private network&#8221; is the best way to make your internet activities private. Until recently, VPNs were mostly used by companies to secure their employee&#8217;s network connections. There are now VPN services designed for personal use.</p>
<p>When you are connected to a VPN, all the data leaving your computer is encrypted. This makes it very difficult for hackers and eavesdroppers to monitor your internet connections.</p>
<p>This is particularly important if you use WiFi hotspots (in the local coffee shop or at a university for example). When you use a public WiFi you are broadcasting all of your data “in the clear” with typically no security whatsoever. This can include your emails, IM messages, web searches, and any other data sent or received over the wireless network.</p>
<p>Note that a VPN is different from a <a href="https://en.wikipedia.org/wiki/Proxy_server">web proxy</a>, which only redirects your browser connections. A VPN encrypts and redirects <em>all</em> your internet connections.</p>
<p>VPNs are also useful for keeping your online identity private. The web sites you visit and your online activities become reasonably anonymous, because your online connections are being routed through an anonymous computer. In fact, many people use VPNs to help them bypass censorship and limits imposed on them by their government.</p>
<p>If your work or school may also impose restrictions of your internet usage, a VPN can provide a secure tunnel to an unrestricted internet. Similarly, VPNs allow you to internationalize your online presence. Many websites (like Hulu) restrict content to specific countries, which can be frustrating if you are traveling away from your home country. Many people also use VPNs to help them bypass censorship and limits imposed on them by their government.</p>
<h2>Which VPNs To Use?</h2>
<p>There are many VPN services out there, here the VPN some recommendations:</p>
<ul>
<li>VPNs that focus privacy, and do not log your IP address and connections: <a href="https://www.privateinternetaccess.com/pages/buy-vpn/REACTUAL001">Private Internet Access</a> and <a href="https://www.ipvanish.com/?a_aid=greycoder">IPVanish</a></li>
<li>VPNs with servers in many countries: <a href="https://hidemyass.com/vpn/r2112">HMA</a> and <a href="https://www.astrill.com/a272e39ea">Astrill</a></li>
</ul>
<h2>Encrypt Your Email and Instant Messages</h2>
<p><a href="https://reactual.com/wp-content/uploads/2012/05/secure_email.jpg" data-rel="lightbox-image-1" data-rl_title="" data-rl_caption=""><img decoding="async" class="alignnone size-medium wp-image-7291" title="" src="https://reactual.com/wp-content/uploads/2012/05/secure_email-265x300.jpg" alt="" width="265" height="300" srcset="https://reactual.com/wp-content/uploads/2012/05/secure_email-265x300.jpg 265w, https://reactual.com/wp-content/uploads/2012/05/secure_email.jpg 490w" sizes="(max-width: 265px) 100vw, 265px" /></a></p>
<p>Encrypt emails you&#8217;d like to remain private. You can use <a href="https://www.mozilla.org/en-US/thunderbird/">Thunderbird</a> + <a href="https://enigmail.mozdev.org/home/index.php.html">Enigmail</a> to send encrypted email (using PGP). Use a secure Instant Message client or a plugin that supports OTR (<a href="https://en.wikipedia.org/wiki/Off-the-record_messaging">Off-The-Record messaging</a>). You can use <a href="https://www.ekiga.org/">Ekiga</a>, a free video, phone and instant message application, or you can use the free instant message client <a href="https://adium.im/">Audium</a> that supports OTR (Off-The-Record messaging).</p>
<h2>Secure Your Computers</h2>
<p>Set up your computer&#8217;s firewall. Only login in as an admin user when necessary. Use a strong passwords for your user accounts. Set your computer to log you out after 15 minutes. Encrypt your hard drives where possible. Some Mac and Linux installations have drive encryption built  into the operating system &#8212; you can turn on this encryption quite easily. You can also use <a href="https://www.truecrypt.org/">Truecrypt</a>, a piece of free software that can create encrypted drive disks that appear on your system as a regular files.</p>
<h2>Secure Your Home Network</h2>
<p>When setting up a wireless network use WPA2 encryption, use MAC address identification, set you network to not announce itself.</p>
<p>Set up you your router&#8217;s firewall &#8212; only open necessary ports.</p>
<h2>Secure Your Mobile Devices</h2>
<p><a href="https://reactual.com/wp-content/uploads/2012/05/iphoneLock.jpg" data-rel="lightbox-image-2" data-rl_title="" data-rl_caption=""><img decoding="async" class="alignnone size-full wp-image-7290" title="" src="https://reactual.com/wp-content/uploads/2012/05/iphoneLock.jpg" alt="" width="490" height="320" srcset="https://reactual.com/wp-content/uploads/2012/05/iphoneLock.jpg 490w, https://reactual.com/wp-content/uploads/2012/05/iphoneLock-300x195.jpg 300w" sizes="(max-width: 490px) 100vw, 490px" /></a></p>
<p>Secure your mobile devices with passwords, set them to log out after 5-15 minutes of inactivity. You can use a VPN on these phones and tablets. The process is a bit more tedious (mobile devices tend to disconnect VPNs quite often) but it does work.</p>
<h2>Other Security Tools and Tips</h2>
<p>Install a virus detector and malware (trojan horses, spyware, adware) detector. See our previous articles for recommended products: &#8220;<a href="https://reactual.com/software/mac-antispyware-utilities-2011.html">The Top Rated Anti-Spyware Utilities For Macs</a>&#8221; or &#8220;<a href="https://reactual.com/software/antivirus-software-pcs.html">The Top Rated Anti-Virus Software For PCs</a>&#8220;.</p>
<p>If you are interested in monitoring the internet connections by made by your computer, you can install a network monitor. This is another good way to discover malware on your system, but it requires you to do manual monitoring and researching. You can use the free <a href="https://www.softpedia.com/get/Network-Tools/Bandwidth-Tools/NetMonitor.shtml">Net Monitor</a> for Windows or the <a href="https://www.littlesnitch.com">Little Snitch</a> ($30) for Macs.</p>
<p>Internet browsers and the plugins like Flash leave traces of your online activities on your computer. This files are not cleared away, even if you tell you browser to reset or if you clear your browser cookies and caches. You can install a computer &#8220;cleanser&#8221; to delete these additional logs and caches. A good example of a cleanser for Mac is <a href="https://www.titanium.free.fr/forums.php">Onyx</a> (free).</p>
<p>Considering setting your computers to use <a href="https://www.opendns.com/">OpenDNS</a> for your DNS (domain name service). OpenDNS features phishing protection and misspelling correction, and optional <a title="Content filtering" href="https://en.wikipedia.org/wiki/Content_filtering">content filtering</a>.</p>
<p>You can back-up or store files securely in the &#8220;Cloud&#8221; using a paid service like <a href="https://www.crashplan.com">Crashplan</a>. This service can encrypt you files with 448 bit Blowfish encryption (very strong), and store them encrypted on Crashplan&#8217;s servers. You keep the encryption key &#8212; Crashplan never sees or stores the key.</p>
<p>Don&#8217;t open emails from questionable sources, and don&#8217;t install applications from questionable sources, especially those found on file sharing services (they tend to have malware, viruses or trojans). If you use a torrent client, set the client to use secure connections where possible, and set it to change to random ports if possible.</p>
<p><a href="https://www.torproject.org/">Tor</a> is free software that routes Internet traffic through a worldwide volunteer network of servers. Like a VPN it can create private internet connections. <a href="https://www.torproject.org/">Tor</a> isn&#8217;t as comprehensive as a VPN because it only works with the applications set to use Tor as a proxy. Tor tend to create slower internet connections than a VPN, but it is a free service, and it is can be run in tandem with a VPN for an extra layer of privacy.</p>
<div>If you need a high level of online privacy, use a secure, read-only <a href="https://www.debian.org/">Debian GNU/Linux</a> installation like Tails. <a href="https://tails.boum.org/">Tails</a> is free operating-system designed to be used from a DVD or a USB stick independently of the computer&#8217;s original operating system. Tails can be run in &#8220;read-only&#8221; installation, meaning it does not write any files to disk. This provides a high level of privacy because the operating system leave no traces of the user&#8217;s activities, and there&#8217;s little chance of the user being monitored by key-loggers and other tracking software.</div>
<p>The post <a href="https://reactual.com/software/internet-security-tools-part-2.html">An Introduction To Online Privacy Tools: Part 2</a> appeared first on <a href="https://reactual.com">Reactual</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://reactual.com/software/internet-security-tools-part-2.html/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>An Introduction To Online Privacy Tools: Part 1</title>
		<link>https://reactual.com/software/security-goals.html</link>
					<comments>https://reactual.com/software/security-goals.html#respond</comments>
		
		<dc:creator><![CDATA[Justin Thomas]]></dc:creator>
		<pubDate>Fri, 20 May 2011 23:33:17 +0000</pubDate>
				<category><![CDATA[Software]]></category>
		<category><![CDATA[Arc]]></category>
		<category><![CDATA[Auto]]></category>
		<category><![CDATA[available]]></category>
		<category><![CDATA[Car]]></category>
		<category><![CDATA[card]]></category>
		<category><![CDATA[com]]></category>
		<category><![CDATA[computer]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[Cons]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Designed]]></category>
		<category><![CDATA[detail]]></category>
		<category><![CDATA[Ear]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[file sharing]]></category>
		<category><![CDATA[ghost]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[hour]]></category>
		<category><![CDATA[include]]></category>
		<category><![CDATA[information]]></category>
		<category><![CDATA[Key]]></category>
		<category><![CDATA[Keylogging]]></category>
		<category><![CDATA[king]]></category>
		<category><![CDATA[Low]]></category>
		<category><![CDATA[made]]></category>
		<category><![CDATA[makes]]></category>
		<category><![CDATA[manager]]></category>
		<category><![CDATA[Men]]></category>
		<category><![CDATA[meo]]></category>
		<category><![CDATA[monitor]]></category>
		<category><![CDATA[Multi]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[one]]></category>
		<category><![CDATA[Online]]></category>
		<category><![CDATA[online privacy]]></category>
		<category><![CDATA[per]]></category>
		<category><![CDATA[person]]></category>
		<category><![CDATA[port]]></category>
		<category><![CDATA[preference]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[private browsing]]></category>
		<category><![CDATA[private email]]></category>
		<category><![CDATA[pro]]></category>
		<category><![CDATA[reading]]></category>
		<category><![CDATA[reason]]></category>
		<category><![CDATA[red]]></category>
		<category><![CDATA[return]]></category>
		<category><![CDATA[RTi]]></category>
		<category><![CDATA[running]]></category>
		<category><![CDATA[secure browsers]]></category>
		<category><![CDATA[secure email]]></category>
		<category><![CDATA[secure instant messages]]></category>
		<category><![CDATA[series]]></category>
		<category><![CDATA[Service]]></category>
		<category><![CDATA[set]]></category>
		<category><![CDATA[support]]></category>
		<category><![CDATA[surveillances]]></category>
		<category><![CDATA[system]]></category>
		<category><![CDATA[the]]></category>
		<category><![CDATA[thin]]></category>
		<category><![CDATA[Tool]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[Top]]></category>
		<category><![CDATA[torrents]]></category>
		<category><![CDATA[use]]></category>
		<category><![CDATA[used]]></category>
		<category><![CDATA[VPNs]]></category>
		<category><![CDATA[website]]></category>
		<category><![CDATA[wifi security]]></category>
		<category><![CDATA[wireless]]></category>
		<category><![CDATA[word]]></category>
		<category><![CDATA[work]]></category>
		<category><![CDATA[Works]]></category>
		<category><![CDATA[x]]></category>
		<guid isPermaLink="false">https://reactual.com/?p=7232</guid>

					<description><![CDATA[<p>There are many reasons to seek privacy on the internet. These days, we have ISPs monitoring our connections, corporations tracking and consolidating our information across multiple websites. We have governments and other institutions routinely monitoring our internet activities. We have hackers, identity thieves and criminals attempting to access our computers and steal our personal information. [&#8230;]</p>
<p>The post <a href="https://reactual.com/software/security-goals.html">An Introduction To Online Privacy Tools: Part 1</a> appeared first on <a href="https://reactual.com">Reactual</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>There are many reasons to seek privacy on the internet. These days, we have ISPs monitoring our connections, corporations tracking and consolidating our information across multiple websites. We have governments and other institutions routinely monitoring our internet activities. We have hackers, identity thieves and criminals attempting to access our computers and steal our personal information.</p>
<p>Basically, internet privacy should be of interest to everyone. Even if you feel you have &#8220;nothing to hide&#8221; you probably still value having curtains on your windows, or not having your credit card statements available for anyone to read. Likewise, most people are not comfortable with having every email they write and every web site they visit being broadcasted to the public.</p>
<h2>Overview</h2>
<p>In this series of articles I&#8217;ll be covering the following topics:</p>
<ul>
<li>Making your web browsing private</li>
<li>Installing a VPN or &#8220;Virtual Private Network&#8221;</li>
<li>Securing your computers and wireless network</li>
<li>Encrypting your email and instant messages</li>
</ul>
<p>These are basic secure measures &#8212; something everyone should have in place before they go online.</p>
<h3>Install The &#8220;HTTPs Everywhere&#8221; Browser Extension</h3>
<p><a href="https://www.eff.org/https-everywhere"><img loading="lazy" decoding="async" title="https-everywhere" src="https://reactual.com/wp-content/uploads/2012/05/https-everywhere.jpg" alt="" width="510" height="127" /></a></p>
<p>Why you&#8217;d want to do this:</p>
<ul>
<li>To stop eavesdroppers tracking the sites you visit</li>
<li>To stop eavesdroppers monitoring the information your send via HTTP</li>
</ul>
<p>The <a href="https://www.eff.org/https-everywhere">HTTPs Everywhere</a> is an extension for the Firefox and Chrome browsers, made by the <a href="https://www.eff.org">Electronic Frontiers Foundation</a>. It encrypts your communications with many major websites, giving you a basic level of web browsing privacy. For example, if you are reading email in Gmail or Hotmail, your email messages will be encrypted before they are sent to your web browser. Similarly, an eavesdropper won&#8217;t be able to detect what Wikipedia articles you are reading, or what items you are purchasing at an online store. However, this is true only for the websites that <a href="https://www.eff.org/https-everywhere">HTTPs Everywhere</a> supports, and only for the parts of those websites that support HTTPs connections. Here&#8217;s a <a href="https://gitweb.torproject.org/https-everywhere.git/tree/HEAD:/src/chrome/content/rules">raw list</a> of the sites they support.</p>
<p>Note that HTTPS Everywhere does not conceal the identities of the sites you access, or the amount of time you spend using them. For example, an eavesdropper can tell you accessed Wikipedia for an hour, but they won&#8217;t be able to see which particular articles you read on Wikipedia.</p>
<h3>Install The &#8220;Ghostery&#8221; Browser Extension</h3>
<p><a href="https://www.ghostery.com/"><img loading="lazy" decoding="async" title="ghostery-set" src="https://reactual.com/wp-content/uploads/2012/05/ghostery-set.jpg" alt="" width="550" height="120" /></a></p>
<p><a href="https://www.ghostery.com/">Ghostery</a> is a browser extension that blocks the &#8220;invisible&#8221; web. It detects trackers, web bugs, pixels, and beacons placed on web pages by Facebook, Google Analytics, and over 1,000 other ad networks, behavioral data providers and web publishers.</p>
<p>I like <a href="https://www.ghostery.com/">Ghostery</a> because it&#8217;s a &#8220;set and forget&#8221; add-on  &#8212; Ghostery will continue to work silently in the background as you browse, removing all those undesirable tracking elements in web pages. I prefer to turn off the notification the blocked elements (you can find this option in the Ghostery preferences).</p>
<h3>Use A Search Engine That Doesn&#8217;t Log Your Searches</h3>
<p><a href="https://www.duckduckgo.com/"><img loading="lazy" decoding="async" title="duckduckgo-ad" src="https://reactual.com/wp-content/uploads/2012/05/duckduckgo-ad1-550x220.jpg" alt="" width="550" height="220" /></a></p>
<p>Why you&#8217;d want to do this:</p>
<ul>
<li>To stop search engines logging and storing your searches</li>
<li>To stop web sites and other corporations from collecting and selling your personal information</li>
</ul>
<p>Many popular search engines like Google and Bing, save your search history. Typically, your searches are saved along with some information about your computer (e.g. your <a href="https://duckduckgo.com/IP_Address">IP address</a>, <a href="https://duckduckgo.com/User_agent">User agent</a> and often a unique identifier stored in a <a href="https://duckduckgo.com/HTTP_cookie">browser cookie</a>), and if you are logged in, your account information (e.g. name and email address).</p>
<p>With this information, your searches can be tied together. This means someone can see everything you&#8217;ve been searching, not just one isolated search. You can usually find out a lot about a person from their search history.</p>
<p>They also put cookies on your browser to uniquely identify you. For example, when you search for something private, you are sharing that private search not only with your search engine, but also with all the sites that you clicked on (for that search). See <a href="https://donttrack.us/">this page</a> for more info.</p>
<p>If you want to avoid this tracking, you can make use of search engine that take privacy seriously, like <a href="https://www.startpage.com">StartPage</a> or <a href="https://www.duckduckgo.com">DuckDuckGo</a>.</p>
<p>I like <a href="https://www.startpage.com">StartPage</a> by <a href="https://www.ixquick.com">Ixquick</a> because they incorporate search results from Google. Startpage removes all identifying information from your query and submits it anonymously to Google. They get the results and return them to you privately. <a href="https://www.startpage.com">StartPage</a> also includes a free web proxy, which can open sites anonymously for you.</p>
<p>Ixquick&#8217;s Privacy Policy is routinely being confirmed by two independent organizations &#8212; <a href="https://www.european-privacy-seal.eu/awarded-seals/de-080001p/" target="_blank">Europrise</a> and <a href="https://www.certifiedsecure.com/certificates/6a19001f6fb552665f5db54fe61fac07/">Certified Secure</a>.</p>
<p><a href="https://www.duckduckgo.com">DuckDuckGo</a> is another good search engine with a focus on privacy. Like StartPage, DuckDuckGo and does not record user information &#8212; see their <a href="https://duckduckgo.com/privacy.html">privacy policy</a> for the details.</p>
<h3>Configure Your Web Browser For Privacy</h3>
<p><a href="https://reactual.com/wp-content/uploads/2012/05/12_04_10_DoNotFollow_Firefox4.jpg" data-rel="lightbox-image-0" data-rl_title="" data-rl_caption=""><img loading="lazy" decoding="async" title="" src="https://reactual.com/wp-content/uploads/2012/05/12_04_10_DoNotFollow_Firefox4.jpg" alt="" width="488" height="338" /></a></p>
<p>You can easily adjust your web browser to enhance your privacy. You can turn off <a href="https://en.wikipedia.org/wiki/Third-party_cookie#Privacy_and_third-party_cookies">third-party cookies</a> &#8212; these are cookies that are sent to advertising firms. Turning off these cookies just means you&#8217;ll be tracked less &#8212; it won&#8217;t affect your browsing ability. I prefer to turn off cookies completely, and use the <a href="https://dietrich.cx/Development/CookieWhitelistWithButtons">Cookie Whitelist</a> add-on to only accept cookies from specific sites that I log into.</p>
<p>You can install a extension like <a href="https://adblockplus.org">Adblock Plus</a> (Firefox, Chrome) to block ads, thereby reducing the amount of information collected by advertisers.</p>
<p>You can turn off Java and Flash in your browser (both can be a security risk &#8212; see an explanation <a href="https://noscript.net/faq#qa1_10">here</a>).</p>
<p>You can install an extension like <a href="https://noscript.net/">No Script</a> (Firefox only), which stops web pages loading and running Javascript, Java and Flash. Using <a href="https://noscript.net/">No Script</a> can be tedious but it protects against attacks like <a title="Wikipedia definition for XSS" href="https://en.wikipedia.org/wiki/Cross_site_scripting" target="_blank" rel="nofollow external">Cross-Site Scripting (XSS)</a> and <a href="https://en.wikipedia.org/wiki/Clickjacking">Clickjacking</a> (a trick that causes you to click and run a malicious program).</p>
<h3></h3>
<h3>Use A Password Manager</h3>
<p><a href="https://agilebits.com/onepassword"><img loading="lazy" decoding="async" title="1password" src="https://reactual.com/wp-content/uploads/2012/05/1password.jpg" alt="" width="570" height="358" /></a></p>
<p>It makes sense to use password manager like <a href="https://lastpass.com/">LastPass</a>, <a href="https://keepass.info/">KeePass</a> or <a href="https://agilebits.com/onepassword">1Password</a>. Password managers allow you create strong, unique passwords for each website you log into. Also, Password Managers can automatically log into websites for you, which prevents <a href="https://en.wikipedia.org/wiki/Keystroke_logging">key-logging</a> (attempts to capture your keystrokes and hence your passwords). <a href="https://lastpass.com/">LastPass</a> and <a href="https://keepass.info/">KeePass</a> are free and are both good programs. <a href="https://agilebits.com/onepassword">1Password</a> is the most polished and is frequently updated, but costs $50.</p>
<p>Continued&#8230; Read <a href="https://reactual.com/privacy-services/internet-security-tools-part-2.html">Part 2</a> of this article series.</p>
<p>The post <a href="https://reactual.com/software/security-goals.html">An Introduction To Online Privacy Tools: Part 1</a> appeared first on <a href="https://reactual.com">Reactual</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://reactual.com/software/security-goals.html/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Page Caching using Disk: Enhanced 

Served from: reactual.com @ 2026-04-13 01:34:59 by W3 Total Cache
-->