Max Online Security, IP Hiding, Downloads, Freeware, Spyware, Personal Online Safety Tips & Security Guides
Everything that you need to know about security online, & offline to keep you safe. Is available to be learned right here online & For FREE!
Date This Page Was Last Updated 06/09/2013
Are there are any of you out there, That have "Other Security Minded Idea’s Or Suggestions" to add on here to our "Maximum Security Section". Please feel free to just email me and let me know what your idea’s are. This will help keep everyone safer while online or off. I always love receiving others further input and idea’s! Further written submissions are always gratefully welcomed and received here at OnlinePot. You Can Submit Them In Your Real Name? Or with NO Names! That Is Entirely Up To You?
We Love New Fresh Input Submissions & Safety Security Idea’s & Tips Email Us Here Your Security Idea’s Or Input? Security Website Submissions Are Always Welcome Here! You Do Not Even Have To Put Your Real Name On It! olpwebs@yahoo.com Or MedicalMMJMan@countermail.com NEW 100% Encrypted Email Server Sincerely – OnlinePot Owner- MMJ Patient Activist- Online Patients Advocate- Online MMJ News Journalist, Knowledge Is The Power To Remain Free! Free The Knowledge Of Information!
We Were Just Gifted A Huge Dump Of Security Related Articles, PDF’s, ETC, Please Be Patient While We Get Them All Uploaded, Posted, & Viewable Online!
List Of Carnivore, PRISM, Eschelon, Keywords That The N.S.A. Listen For! The List Contains Many Of The Keywords The Government Spooks N.S.A. National Security Agency, MI6, CIA, Search YOUR Email, Cell Phones, Texting, Instant Messages & Chat Messages For. NEVER Say These Words On A Phone Call, Text, Email, Facebook, Or Twitter, Etc!
Bitcoin Virtual Currency: Unique Features Present Distinct Challenges for Deterring Illicit Activity From The F.B.I. PDF
LPI Linux Certification In A Nutshell, 2nd Edition (2006) ZIPPED FILE
CCNA Wireless Official Exam Certification Guide E-Book PDF
Step-By-Step Installation Of A Secure Linux Web, DNS, And Mail Server E-Book PDF
How the Camera On Your Cellphone Can Be Captured and Used to Spy on You Researchers have created malware for Android smartphones that can remotely take over your phone’s camera and use it to spy on you.
SECURITY ALERT! Max Security Alert On Safe-Mail.Net Emails ARE NOT SECURE! Safe-Mail.net That IS NOT SAFE! They Have A Secret Spy Code Embedded, That Forwards Copy’s Of Some Emails Sent Out To From Their Email Service At www.Safe-Mail.net. We Have Photo Captured PROOF THAT THIS IS HAPPENING!
JAP Anonymous Web Surfing JAP enables anonymous web surfing with any browser through the use of integrated proxy services that hide your real IP address. The service uses a proxy mix cascade that effectively hides the identity of any one single user among the connections of all the other users – making it impossible, even for the proxy provider, to determine which IP belongs to which user. After installing JAP, you need to configure your browser to use the local proxy server (instructions provided) for web browsing. The provided control panel allows you to turn anonymity on or off, and also displays the current level of security. JAP comes pre-configured with several free service providers and also supports pay services. The free services are run by universities and other public infrastructures and are free of charge for the user; additional pay services are also offered. Freeware
Crypt4Free 5.4.5 – [2010-12-23 | Freeware | 2.94 MB | NT/200x/XP/Vista | 6340 | 3.5 ] Crypt4Free builds on our award winning Advanced Encryption Package Standard. It uses two encryption algorithms to protect your files: Blowfish & DESX. And "Quick Wipe" secure files erasure algorithm to wipe sensitive files. Freeware
Privatefirewall 7.0.22.8 [ 7.27 MB | Freeware | Win 2000/03/08/XP/Vista/7] Freeware This personal firewall and intrusion detection application provides comprehensive online security. It constantly monitors your PC for intrusion and reports any findings, so you can take the appropriate action.
Do you wonder what other people know about you? A good starting point is:
There are hundreds of web-based email services that appear to offer anonymity. Few really do. These include names such as Hotmail, Yahoo, Excite, Pobox, Dejanews, and too many more to list here. In each of these cases, the user is allowed to create a pseudonym that he uses for his messages. Unfortunately, through sign-up procedures, logging, and message headers, it is amazingly simple to determine your ISP, and even your true identity, when you use these services.
For the obvious reason, there is no point in wasting space dealing with those types of services. Instead, we’ll try to provide information on methods that offer at least a degree of anonymity. As the user, it is your responsibility to know that your internet anonymity is only as secure as the service’s privacy policy. You should always familiarize yourself with the usage and privacy policies of any E-mail or internet service you consider using some other options.
We Are NO LONGER Recommending Safe Mail! Seems They Have Had a "Little Secret Spy Code Working" Going On Some Accounts. So That Every Email That You Sent Out, Was Also Being Secretly Being Sent a Copy Of The Out Going Emails To "ADMINS AT Safe-Mail.Net! Check The Photo Captured Below Here! NOTE: The "Admins@safe-mail.net" If You Replied To That Email? A Secret Copy Of Your Email Was Also Going To Safe-Mail ADMINS!
Big Brother AT HIS WORST!!!
We Have X’d Out Some Email Addys For Their Personal Privacy!
"BUSTED SAFE-MAIL REAL SECRET" ON 2/24/2012 BYE! BYE! Safe-Mail!
THE best means to insure e-mail and usenet anonymity remains the remailer network. There are some trade-offs, but used properly, there is no way a user can be identified. Using any search engine, enter the keyword ‘remailer’ to begin learning about the remailer network. If you want to use the remailer network today, get QuickSilver. This is an absolutely great ap which makes remailer use as easy as it gets.
CounterMail – leader in email security www.countermail.com
CounterMail is a secure and easy to use online email service, it’s designed to provide maximum security and privacy without any complexity. You can access your account at any time, from anywhere in the world. Your email account will always be encrypted and anonymous. CounterMail’s encryption works automatically and transparently, it requires no specialized computer skills or knowledge. If you are comfortable using services like Hotmail or Gmail, you will be comfortable using CounterMail’s secure email!
We are using a strong encryption protocol called OpenPGP, with 2048 bits encryption keys to protect your data. To the best of publicly available information, there is no known method which will allow a person or group to break OpenPGP:s encryption by cryptographic or computational means.
Free Caller Id Spoofing
Disguising your caller id for a great caller id spoof is great to make innocent prank calls. If you change your caller id to another number most people will pick up the phone. If you do the star 67 to block a phone number, most people will not answer the phone.
In any case head on over to our secret place and get a free caller id spoof pin number. Caller Id Spoof
There are several ways to fake your caller id with caller id faker software. We’ll it’s not actually software. It’s done with online sites.A couple of the best sites out there to use a caller id faker so you can disguise your caller id are: SpoofCard & bluffmycall
These site will allow you to use their caller id faker software for free. In some cases, if you have a Twitter account, you can get a five minute free spoof card pin number just for tweeting. If you do tweet about it, you can get a fully functional spoof card free trial and get the free voice changing software and even record the call. Caller id faker is the ability to change your caller id to any number you want. Disguising your caller id to another number is great for making prank calls.
Online Survival– An Awesome Tutorial To Teach You All The Tricks Of The "Master Computer Guru’s" To Stay Anonymous Survival -The Internet Anonymity Tutorial.zip
Incase You Don’t Already Have The Smash Hit "Firefox Browser" http://www.mozilla.com/firefox Then Download It For Free Right Here! & You Can Have Both The Internet Explorer Browser & Firefox Browser Installed On Your Computer At The Same Time With No Problems.
And you need to be using the FireFox Browser To Use The TOR Real IP Address Hiding Software Below
"TOR" Real IP Address Hiding When Online! "TOR" Surf Websites, Message Boards, & Check Email Accounts & Stay 100% Anonymous! While Hiding Your Computers Real IP Address, With Surfing Clients Software Such As The One Provided Here For Free. Every Time You Open & Use Your Firefox Browser With The "TOR Enabled" You Will Be Connected Up To A Different TOR Server, In A Different Country & A Different IP Address Will Be Showing On ALL Server Logs http://tor.eff.org/overview.html.en 5+ Stars Real IP Address Hiding Online Security Tor…Sets Up Real Easy With The Firefox Browser… The First Time I set this up on 1 of my computers it was NP, a Simple Install. So that ever time I opened up my FoxFire Browser & the "TOR is Enabled" & Turned Green, My Google page was from a totally different country Every Time, & A Totally Different Computer IP Address will be showing up in anyone’s server logs, For any Server websites, or email accounts you check etc, Each time you will be coming in from a Different Country, With a Different Computer IP Address then what your PC really is using "Tor" Is A Must Be Using as 1 of your security layers. Your Computers Security You Should Always Be Using "Multiple Layers Of Security Programs For Your Online Protection".
"TOR" When Your Checking Out Or Posting On Any Message Boards, Or Surfing The Web To Prevent Any Computer Servers Or Email Accounts From Being Able To "Log-in" Your "Real Computer’s Home IP Address" I Personally Almost Never Even Use My IE Browser Anymore Its That Good. & Its Completely Free To Use. Now It Does Slow Down Your Surfing By About 15% or 20% Speed Wise, But Most Of Us Are Using Some Form Of "High Speed Internet Connection" Now Days. & The Little Bit That It Slows You Down, Is More Then Worth The Knowledge Of The "Personal Security Protection That It Will Give You"
"TOR" Is 5 Stars In Personal Computer Security Rating For Windows 32 Or Windows 64, XP, Vista, Windows 7, Or Other Operating Systems, Check Here For Your Proper Download Files http://tor.eff.org/
"Tor Button Plugin" Torbutton Plugin Download Install This 2nd, Then Close Out Your Firefox Browser. & The Tor Will Be Set Up In Bottom Right Corner Of The Firefox Browser Red Means TOR Is OFF, & Green Means TOR Is On, It Will Say "Tor Enabled In Green" For When Its Running, & Just A Simple Mouse Click On It, Will Turn It On & Off. You will also have 2 small icons in your bottom right hand toolbar of the Computer screen. 1. is a Green Round P that tells you that your "Privacy" is on or not, & the 2nd is a Small Green Looks Like a Onion, That tells you if your "Tor Is Running Or Not.
TOR Is 5+ Stars Real IP Address Hiding Internet Security! & It’s 100% FREE!
TOR Installs Real Easy, But If You Need Any Help? http://tor.eff.org/docs/tor-doc-win32.html.en Here’s An Instruction Page For TOR
VIDEO – "Big Brother, Big Business" http://opposingdigits.com/vlog/?p=1849 Not a bad documentary profiling some of the current technology in use today to track our every moves. Sorry but the guy who put it together didn’t edit out the commercials
Stay invisible Is A Daily Updated List Of Really Functioning Free Public Proxy Servers. StayInvisible Is a Daily Updated List of Really Functioning Free Public Proxy Servers Plus IP Proxy Related Information & Tools.
Related Stories
Here Is How To Check It Out. Turn Off Your Proxy, & Click This Link. http://www.ip-adress.com/ It Will Give You "Your Real IP Address". Then Turn Your Proxy Back On & Do It Again To Check It Out. Anon Proxy Is a Good Start, BUT! An Encrypted Anon Proxy Is Definitely Really Required To Be Anonymous To Any Really Reasonable Level. I Recommend The Web Page Like Services, As They Have More Features, & It Loads The Pages Much Faster & Are General Much Easier To Use. "http://www.findnot.com" Is Just About The Best One Out There These Days. "http://www.anonymouse.org" Is Also A Good Decent Free Basic One, Try To Stay Safe & Secure Out There When Online Everyone!
Secret FBI GPS Tracking Ignites Legal Firestorm The FBI Got Caught! RED HANDED! And you can pretty well bet every other Law Enforcement Group & Government Alphabet Agencies are doing the same thing in EVERY State Or Country EVERY DAY!.
-
-
-
-
-
Free Software That Has PDF file export built in
-
-
-
-
-
The Fink project wants to bring the full world of Unix Open Source software to Darwin and Mac OS X. We modify Unix software so that it compiles and runs on Mac OS X ("port" it) and make it available for download as a coherent distribution.
Fink uses Debian tools like dpkg and apt-get to provide powerful binary package management. You can choose whether you want to download precompiled binary packages or build everything from source. Read more…
Fink – Home
Fink – F.A.Q.
-
Resizing Your Photos with PowerToys..
Visit the Microsoft Site, download section at this link: Microsoft PowerToys for Windows XP Down the right side of the page under the heading Download, Scroll down to the 11th item titled Image Resizer, ImageResizer.exe, 521KB, 2 min @ 28.8KBps
Click the exe file and the download will begin, Install the proggie to the default directory. Once completed, when you RIGHT CLICK a photo or JPG file, in the dropdown box, the 6th item listed will be resize image. In the next box that appears, you’ll be asked to select a size small, medium, or large. Click the radio button next to small or medium as these sizes will be downloadable by GP servers without problems.
Once the resizer program has done the resizing it will create a duplicate copy of your pic with the same file including the size you selected. RE: image file name was bigbud21714.jpg. The resized image will be located in the same folder or location your original picture but will have the file name: bigbud21714(medium).jpg
-
JonDonym – The Internet Anonymisation Free Service
The JonDonym/AN.ON technology is based on the principle of multiple encryption, distribution and processing. This procedure does not only protect your internet activities from being observed by third parties (against your access provider, WLAN hackers, advertising services and websites), but also against observation by the individual JonDonym providers themselves (against JonDonym service operators and their billing providers). https://www.jondos.de/en https://www.jondos.de/en/download
-
Jailbreak 2.2 iPhone and iPod Touch
-
TrueCrypt Setup 6.1a.exe
-
-
PeerGuardian 2. Now this Free Software was designed to protect the Peer To Peer Music & File Sharing Folks, From RIAA & the other Folks being able Access & Trace Their Computers, Well the "Side Perk" to this program, Is that it automatically updates it selves, With all the latest RIAA, + All Government IP Numbers & "Blocks Them" From Being Able To Gain ANY Access Into Your Computer. Just set it up to automatically start every time your computer does. 3 Star Personal Security Rating
PeerGuardian 2. Downloads
File
|
Description
|
Size
|
pg2-9x.exe
|
PeerGuardian 2 for Windows 98/ME
|
0.82MiB
|
pg2-nt.exe
|
PeerGuardian 2 for Windows 2000/XP/2003
|
0.84MiB
|
pg2-x64.exe
|
PeerGuardian 2 for Windows XP/2003 x64 Edition
|
1.07MiB
|
pg2-src.zip
|
PeerGuardian 2 source code (for programmers)
|
1.33MiB
|
Freeware PGP versions
-
Amiga Atari BeOS EPOC (Psion etc.) MacOS MS-DOS Newton OS/2 PalmOS
-
Unix Windows 2000 Windows 3.x Windows 95/98/NT Windows ME Windows XP
-
Here’s some cool stuff from Google that works with your cell phone
http://www.google.com/tools/firefox/sendtophone/
Google Send to Phone for Firefox is an extension that enables you to send short text messages of web page content to your mobile phone. For example, you might text message yourself a phone number, an address, or directions that you find on the Web.
For more cool Google stuff for your phone (maps, searches, ect…) check out http://www.google.com/mobile/
Also if you haven’t checked out my post on exploiting goog411 for making free long distance calls to businesses (it’s also super useful and free) check out http://www.google.com/mobile/goog411/index.html or just call 1 800 GOOG-411 (1 800 466-4411).
These Downloads Are All Available For Free Download Adobe’s Free PDF File Reader Download Quick Time Video Player Download Windows Media Player 10 Download Real Player FireFox 3.5.3 Free Download
Online Law Enforcement Marijuana Counter Intelligence
As for USB flash drives and encryption, there are plenty options for that. they even have moderately prices biometric scanners (fingerprint verification) for security on some drives, the con is they only work if you have administrative rights on the computer you’re using. http://www.newegg.com/ProductSort/SubCategory.asp?SubCategory=522
Here’s a list of essential programs for a flash drive: http://www.techtastic.ca/articles/portable.html
And here’s a whole website…
http://portableapps.com/
-
Is My Husband Or Someone Else Spying On My Computer Usage? How To Detect, Beat & Remove a Computer Key Logger
-
When you search on Google, your ip address, the time are stored in their database as well as the subject searched The Dangers Of Your Internet Surfing Habits Being Saved & Stored Forever!
-
Information On Millimeter Wave Technology Security Scanning Details about the latest security scanning technology for airport security
-
Hidden Data in JPEG Files That Can Reveal “Sensitive Information &YOUR Exact GPS Locations"
-
Cellular Phone/GPS “Burst” Tracking Device Jammer Plans
-
Plans For Building A Device for Detecting GPS Receivers Also Very Handy To Detect Convicted Child Molesters In Public.
- Tap Into OnStar
Any Vehicle with OnStar installed has a GPS receiver inside that is always on, ready to tell you exactly where you are. The problem is, the only way to access this information is to call onstar, wait for them to answer, wait for the modem to upload your location, wait for them to read it back to you… and all the while they charge you a hefty service fee. It’s your car and it’s your GPS receiver. So why not read the data in real time, any time you want?
- CAUTION! 9-24-11 Even If You do NOT even use your "OnStar" & Do not pay for their service!
The OnStar in YOUR car can still be remotely activated on your car. & They can then use the GPS & Its Voice Microphone Functions of the OnStar Remotely Operated, & Listen In To & What Is Being Said In Your Car! And As Well As Tracking your EXACT car location & GPS tracking of YOUR CAR! If you do NOT use your OnStar? Then Rip The OnStar Brain Right Out Of Your Car! An Auto Mechanic can help due it for you.
-
- GPSInformation.net – Got a Question about GPS technology? Looking for a GPS FAQ site?
-
Get To Know Google! Because They Know You! Ethics & Law On The Electronic Frontier 6.8.05 Written By Steffine Delchicatsios & Temitop Sonuyi From "M.I.T." Click The "To View the M.I.T. PDF File" On This Goggle 33 Year Spy Cookie PDF
-
Google sets a 33 year long cookie. Used to track your internet surfing habits, sites you’ve visited, identify your P.C, location and much more. According to Google-Watch.org
-
A Review of "The Never Get Busted Video" from L Nall Never Ever! OK Or Consent To A Search Of Any Car or Vehicle That You Are Driving, Or Even Just a Passenger In The Car or Vehicle. Do Not Ever Consent To Any Search Of Your Car Or Property By The Police. Only Words Out Of Your Mouth Should Be "HELL NO! You Can NOT Search!" & "I Want My Lawyer Please!"
-
-
Your cell phone speaker can now be remotely activated & turned into a listening bug. By The FBI, DEA, CIA, NSA, Etc Etc. They now all have access to the technology where they can “Remotely Activate” your cell phone speaker, And listen in on any conversations that are going on at the time within hearing range of your cell phone speaker. So if you having a “Security Sensitive Chat” with anyone..? About anything that you would not want the LEO’s knowing about it. Remember to have everyone pull out their cell phone battery’s before you start the conversation!
Firefox Add On sends text to your cell phone and other cool Google stuff
-
Here’s some cool stuff from Google that works with your cell phone http://www.google.com/tools/firefox/sendtophone/ Google Send to Phone for Firefox is an extension that enables you to send short text messages of web page content to your mobile phone. For example, you might text message yourself a phone number, an address, or directions that you find on the Web.
For more cool Google stuff for your phone (maps, searches, ect…) check out http://www.google.com/mobile/
Also if you haven’t checked out my post on exploiting goog411 for making free long distance calls to businesses (it’s also super useful and free) check out. www.google.com/mobile/goog411/index.html or just call 1 800 GOOG-411 (1 800 466-4411).
Free Downloads Courtesy Of Cotse.net
- Up To Date Listing Of About 150+ Current Anonymous IP Proxies
-
Java, Active X, and your Privacy Learn how Java and ActiveX technologies can threaten your privacy. Java, Active X, and Your Privacy
-
Genuine Proxy is a free, fast and anonymous web proxy that is great to bypass school and work filters. Browse the web without been blocked from any website! Our proxy retrieves web pages and processes them through our server so you don’t have to worry about being traced. Genuine Proxy
-
The FBI appears to have begun using a novel form of electronic surveillance in criminal investigations: remotely activating a mobile phone’s microphone and using it to eavesdrop on nearby conversations…… it has been in use for about past 3.5 years….. (why one should always pull battery from cell phone when in any sensitive location or situations) http://news.com.com/FBI+taps+cell+p…l?tag=nefd.lede
-
-
How To Fund & Use An E-Gold Account Securely & Anonymously
-
-
How To Securely Contact Others Via Emails Or 128 Bit SecureIM ICQ Chat
-
-
Concealment Tips Written By A Government Trained Ex Drug & Dog Handler
-
-
“Privacy- The Menace of Satellite Surveillance “ An Excellent Article On The Capabilities Of Spy Satellites
-
-
I also have a Great Email Service With AnonEmail it is possible to send emails without your email address or any information about your identity. So you can communicate more freely without worry that it will cause consequences to your person. http://anonymouse.org/anonemail.html
-
This (DOS) program is called simple "List" it will list every file in any program or software out there today. Including Microsoft’s operating systems "Secret Hidden" files. list.zip (DOS).zip
-
This is a French non-profit, free site that allows you to create a disposable email address whose length of life is up to you. You simply enter your real email address, and hit the Create button. All emails sent to the new Jetable.org address will be forwarded to your actual email address. Your temp address will be deactivated after the lifespan you selected comes to its end. You can set it to expire in an hour, a day, or whatever. http://www.jetable.org/en/index
-
-
Electronic Frontier Foundation: Defending The Freedom In The Digital World Surveillance Privacy & Wiretapping Archive http://www.eff.org/cgi/search-proxy.py?q=privacy+surveillance+&sa=Search+EFF
-
-
Send a Robotic voice call to anyone through this website Just type in the phone number including area code and then a message. In the license key field put a zero "0" and hit enter. The robot voice will say your message to the call recipient.
-
-
Plans On How To Make Your Own Infrared Viewer
-
The government isn’t asking for search engine users’ identifying data — at least not yet. But for those worried about what companies or federal investigators might do with such records in the future, here’s a primer on how search logs work, and how to avoid being writ up large within them. Wired News: How to Foil Search Engine Snoops
-
-
Free Registry Cleaner App Download Here Tried & Tested, Clean Out All The Old Stuff That Slows Down Your Computer’s Start Up.
-
Firefox, Privoxy, and Tor Help P2P Sharing, Peer Sharing, Downloading Bittorrent Masking: How to Avoid Getting Tracked as You Download. Firefox, Privoxy, and Tor help
-
-
How To Safely Contact People Via Emails & ICQ 128 Bit SecureIM Trillian Chat Software Email Securely & ICQ Chat Securely
-
Cash and Money Laundering – A Primer
-
Computer Security, Keeping Your Money
Safe, Offshore Banking & Other Great Stuff
-
-
BUGS, TAPS AND INFILTRATORS: WHAT 2 DO ABOUT POLITICAL SPYING
-
GBPPR Cellular Phone & GPS Jammers- Can you hear me now? No Good!
-
Internet, Computer Security, Anonymous Proxy’s Servers Lists Etc,
-
-
Removal Tools and Instructions for Weather Bug and Other Computer Trojans & Spyware
-
Update on Bugging Devices Your Security Is Utmost In Today’s Patriot Act World “
-
Radio Scanners – Equipment and Software Control- Intro To Scanning
-
100 Ways To Disappear And Live Free
-
-
RADIO FREQUENCY OR FREQUENCIES OF All GOVERNMENT AGENCY’S
-
Privacy and Security on your PC, A Must Read, A 5 Star Computer Security Article
-
Computer security at a glance in today’s big brother world
-
Security Alert! Yahoo Is Watching YOU!
-
How to Spot a NARC 2 reports
-
http://www.rcfp.org/taping/index.html A Practical Guide to Taping Phone Calls and In-Person Conversations in the 50 States and D.C. NY Tour Turns Evil Eye on Surveillance Cameras
-
Hackers Secrets Revealed .pdf A Great PDF file that explains in a easy to understand step by step guide to help you prevent Hacker Attacks. A Must Read!
-
How to prevent people from spying on you
-
All you need to know about IP Spoofing
-
All you need to know about IP Spoofing #2
-
Warning! The Post Office could report YOU as a drug dealer or a terrorist for just buying a International money order
-
There are still a huge number of government and other web sites that use Double-Click to spy on visitors
-
Trojan virus in computer game Dope Wars!! Caution!
-
Trojan Spy Software in Weather Bug Computer Weather Program
|