WARNING: If a hardware or software key logger is installed on your computer, storing private data on your hard drive leaves them vulnerable to viewing or theft, even if encrypted, and the following options will be unable to keep them sufficiently secure and private.
I strongly recommend always using one of these secure encryption key fillers and one of these secure web form fillers to prevent key loggers from stealing your encryption keys, passwords and Web form data.
I also strongly recommend moving your private documents, browsing history, e-mail and chat conversations to an encrypted removable medium, securely erasing the private data on your hard drive and switching to portable software.
Because of Windows' activity tracking and logging, and the overwhelming onslaught of spyware being targeted at Windows, Internet Explorer and Outlook / Outlook Express, if you have sensitive data you need to keep private, it's a lot safer to choose one of the following options.
And if you choose the safest or next safest option, using alternative browser and e-mail programs, antivirus and antispyware software and security updates isn't necessary. skip
Use a Windows, Mac OS or GNU/Linux Live CD, DVD or USB on a read-only CD-R, DVD-R or USB drive with write protection switched on (recommended by banks for online banking) with mobile software and private data on an encrypted removable medium.
Use a virtual alternative operating system in a secured alternative operating system, save your data in encrypted form on an ext2 partition or removable medium from the time you start using your new computer, hard drive or removable medium, and use erasing / wiping / shredding software to securely erase sensitive data.
Uninstall Windows and install GNU/Linux or get a Mac (based on FreeBSD) or better yet, OpenBSD (recommended for experienced Unix users only), save your data in encrypted form on an ext2 partition or removable medium from the time you start using your new computer, hard drive or removable medium, and use erasing / wiping / shredding software to securely erase sensitive data.
Secure Erasing Guide
Get notified when this page changes.
Please read my disclaimer before visiting the following top sites.
Brent's Place at brentsplace.info
©2000-2006 All rights reserved.