Button Ads!         



                  GrowStoreFinder.com Grow Shop Directory            1-15-2014                              GreenBookPages.com Grow Shop’s Directory Product Reviews 
         Local grow shops and hydroponic store locator with reviews                      
Find Local Hydroponics Shops and Grow Stores.   10-10-14  
Mega Text Ad’s Spaces Available! 
                                                                                   Advertise On All 3 Of Our Marijuana Websites   


                         Max Online Security, IP Hiding, Downloads, Freeware, 
                         Spyware, Personal Online Safety Tips & Security Guides

                                            Everything that you need to know about security online, & offline to keep
                               you safe. Is available to be learned right here online & For FREE! 



                                                     Return Back To The Main Section Of OnlinePot.org      


                                                                Date This Page Was Last Updated  06/09/2013                                 

  Are there are any of you out there, That have "Other Security Minded Idea’s Or Suggestions
             to add on here to our "Maximum Security Section". Please feel free to just email me and let 
             me know what your idea’s are. This will help keep everyone safer while online or off.  I always
             love receiving others further input and idea’s! Further written submissions are always gratefully
             welcomed and received here at OnlinePot.  You Can Submit Them In Your Real Name? Or with 
            NO Names! That Is Entirely Up To You? 

                                We Love New Fresh Input Submissions & Safety Security Idea’s & Tips
                Email Us Here Your Security Idea’s Or Input?  Security Website Submissions Are Always Welcome Here!
                                        You Do Not Even Have To Put Your Real Name On It!
                                                   olpwebs@yahoo.com  Or 
                                                    NEW 100% Encrypted Email Server

                                        Sincerely – OnlinePot Owner- MMJ Patient
                                     Activist- Online Patients Advocate- Online MMJ News Journalist, 

   Knowledge Is The Power To Remain Free! Free The Knowledge Of Information!





     We Were Just Gifted A Huge Dump Of Security Related Articles, PDF’s, ETC, 
    Please Be Patient While We Get Them All Uploaded, Posted, & Viewable Online!

How to remove the FBI virus (FBI Moneypak Ransomware) – Fake FBI Malware Removal Options

  List Of Carnivore, PRISM, Eschelon, Keywords That The N.S.A. Listen For! 
            The List Contains Many Of The Keywords The Government Spooks N.S.A. National
          Security Agency, MI6, CIA, Search YOUR Email, Cell Phones, Texting, Instant Messages 
          & Chat Messages For.  NEVER Say These Words On A Phone Call, Text, Email, Facebook, Or Twitter, Etc!

  Online Security Basic -Should I Use Encryption..? 
          A Great Resource Article About Online Computer Safety & Encryption 

Police State USA: Supreme Court Upholds Secret Wiretaps

FAA Releases New US Based Drone List — Is Your Town on the Map..?

  Bitcoin Virtual Currency: Unique Features Present Distinct Challenges for Deterring Illicit Activity From The F.B.I. PDF

 LPI Linux Certification In A Nutshell, 2nd Edition (2006) ZIPPED FILE

   CCNA Wireless Official Exam Certification Guide E-Book PDF

  Step-By-Step Installation Of A Secure Linux Web, DNS, And Mail Server E-Book PDF

  5 Unbelievably Creepy Surveillance Tactics
          They could be ripped right out of the plot of any sci-fi movie! Except Their Real!

  Privnote Send Secure Email Notes That Self Destruct After Reading Them 
This One Is Secure & Free & Gets 5 Stars From Us Here At OnlinePot! 

   Trying to Keep Your E-Mails Secret When the C.I.A. Chief Couldn’t

 How the Camera On Your Cellphone Can Be Captured and Used to Spy on You
  Researchers have created malware for Android smartphones that can remotely take over your phone’s camera and use it to spy on you.

  Internet Security Guide: Resources to keep you safe online Everything you need to know to be safe on the internet.
           Read more at  http://www.tecca.com/columns/teccas-guide-to-internet-security/#lVwV456Ivg3f1k1Z.99

  How To Encrypt And Protect Your SmartPhone Or Android 
          Cell Phone Encryption Protects All Your Personal Data & Files!

  TOR Mail.Net TOR Based & Secured Email Service Gets Shut DOWN!  
           And They Managed To Get It Back Up & Online! Now Its TORMail.org

  Police Are Using Cell Phone Tracking as a Routine Tool

  SECURITY ALERT!  Max Security Alert On Safe-Mail.Net Emails ARE NOT SECURE! Safe-Mail.net That IS NOT SAFE!
They Have A Secret Spy Code Embedded, That Forwards Copy’s Of Some Emails Sent Out To From Their Email Service 
 At www.Safe-Mail.net. We Have Photo Captured PROOF THAT THIS IS HAPPENING!

   Major Security Concerns Of The Canadian Based Hushmail.com Email Servers..?


JAP Anonymous Web Surfing  JAP enables anonymous web surfing with any browser through the use of integrated proxy services that hide your real IP address. The service uses a proxy mix cascade that effectively hides the identity of any one single user among the connections of all the other users – making it impossible, even for the proxy provider, to determine which IP belongs to which user. After installing JAP, you need to configure your browser to use the local proxy server (instructions provided) for web browsing. The provided control panel allows you to turn anonymity on or off, and also displays the current level of security. JAP comes pre-configured with several free service providers and also supports pay services. The free services are run by universities and other public infrastructures and are free of charge for the user; additional pay services are also offered. Freeware

       Crypt4Free 5.4.5[2010-12-23 | Freeware | 2.94 MB | NT/200x/XP/Vista | 6340 | 3.5 ]
Crypt4Free builds on our award winning Advanced Encryption Package Standard. It uses two encryption algorithms to protect your files: 
      Blowfish & DESX. And "Quick Wipe" secure files erasure algorithm to wipe sensitive files. Freeware

     Privatefirewall [ 7.27 MB | Freeware | Win 2000/03/08/XP/Vista/7]      Freeware
    This personal firewall and intrusion detection application provides comprehensive online security. 
     It constantly monitors your PC for intrusion and reports any findings, so you can take the appropriate action.

      Jap Anonymity Computer IP Address Hiding Free Software Downloads

         Freeware: Blackberry Encryption Software Applications Free Downloads

        How to Encrypt Your USB Flash Drive Using TrueCrypt                  

       Current Listing Of About 150+ Current Anonymous IP Proxies

       Department of Homeland Security’s State Of The Art Surveillance Pickup Truck
       If You See One Of These Trucks Parked Down The Street..? YOU HAVE A SERIOUS PROBLEM! 

Do you wonder what other people know about you? A good starting point is:

There are hundreds of web-based email services that appear to offer anonymity. Few really do. These include names such as Hotmail, Yahoo, Excite, Pobox, Dejanews, and too many more to list here. In each of these cases, the user is allowed to create a pseudonym that he uses for his messages. Unfortunately, through sign-up procedures, logging, and message headers, it is amazingly simple to determine your ISP, and even your true identity, when you use these services.

For the obvious reason, there is no point in wasting space dealing with those types of services. Instead, we’ll try to provide information on methods that offer at least a degree of anonymity. As the user, it is your responsibility to know that your internet anonymity is only as secure as the service’s privacy policy. You should always familiarize yourself with the usage and privacy policies of any E-mail or internet service you consider using some other options.

 We Are NO LONGER Recommending Safe Mail! Seems They Have Had a "Little Secret Spy Code Working" Going On Some Accounts. So That
 Every Email That You Sent Out, Was Also Being Secretly Being Sent a Copy Of The Out Going Emails To "ADMINS AT Safe-Mail.Net! Check The
 Photo Captured Below Here!  NOTE: The "Admins@safe-mail.net" If You Replied To That Email? A Secret Copy Of Your Email Was Also Going To Safe-Mail ADMINS! 

      Big Brother AT HIS WORST!!!

 We Have X’d Out Some Email Addys For Their Personal Privacy!   



http://www.tormail.net Completely Hidden Behind The "TOR" IP Hiding Software!  See Below For More Info On & How To Use TOR!
http://www.countermail.com   Highly Recommend This One

THE best means to insure e-mail and usenet anonymity remains the remailer network. There are some trade-offs, but used properly, there is no way a user can be identified. Using any search engine, enter the keyword ‘remailer’ to begin learning about the remailer network. If you want to use the remailer network today, get QuickSilver. This is an absolutely great ap which makes remailer use as easy as it gets.

               Major Security Concerns Of The Canadian Based Hushmail.com Email Servers??
               If You Use Hushmail.Com? Then This Is a MUST READ ASAP!   Posted On October 11th 2010

           CounterMail – leader in email security www.countermail.com 

CounterMail is a secure and easy to use online email service, it’s designed to provide maximum security and privacy without any complexity. You can
 access your account at any time, from anywhere in the world. Your email account will always be encrypted and anonymous.
CounterMail’s encryption
 works automatically and transparently, it requires no specialized computer skills or knowledge. If you are comfortable using services like Hotmail or
  Gmail, you will be comfortable using CounterMail’s secure email!

We are using a strong encryption protocol called OpenPGP, with 2048 bits encryption keys to protect your data. To the best of publicly available information, there is no known method which will allow a person or group to break OpenPGP:s encryption by cryptographic or computational means.




                                                                  Free Caller Id Spoofing

  •   *67 will not make your number show up on a caller id. The best way for a caller id spoof for free is to head to here and scroll to the bottom of
     the page. There you will find a way to get a free spoof card pin number. You have to have a Twitter account in order to get the free voice changer
     software and free call recording software.

Disguising your caller id for a great caller id spoof is great to make innocent prank calls. If you change your caller id to another number most people will pick up the phone. If you do the star 67 to block a phone number, most people will not answer the phone.

In any case head on over to our secret place and get a free caller id spoof pin number. Caller Id Spoof

  •                       Caller Id Faker

There are several ways to fake your caller id with caller id faker software. We’ll it’s not actually software. It’s done with online sites.A couple of the best sites out there to use a caller id faker so you can disguise your caller id are:  SpoofCard  & bluffmycall

These site will allow you to use their caller id faker software for free. In some cases, if you have a Twitter account, you can get a five minute free spoof
 card pin number just for tweeting. If you do tweet about it, you can get a fully functional spoof card free trial and get the free voice changing software and
 even record the call.
Caller id faker is the ability to change your caller id to any number you want. Disguising your caller id to another number is great for
 making prank calls.

Online Survival– An Awesome Tutorial To Teach You All The 
     Tricks Of The "Master Computer Guru’s" To Stay Anonymous
            Survival -The Internet Anonymity Tutorial.zip 

      Incase You Don’t Already Have The Smash Hit "Firefox Browser"
     http://www.mozilla.com/firefox Then Download It For Free Right Here!
     & You Can Have Both The Internet Explorer Browser & Firefox Browser 
     Installed On Your Computer At The Same Time With No Problems.

And you need to be using the FireFox Browser To Use The TOR Real IP Address Hiding Software Below

"TOR" Real IP Address Hiding When Online!
 "TOR" Surf Websites, Message Boards, & Check Email Accounts & Stay 100% Anonymous! 
  While Hiding Your Computers Real IP Address, With Surfing Clients Software  
  Such As The One Provided Here For Free. Every Time You Open & Use Your 
  Firefox Browser With The "TOR Enabled" You Will Be Connected Up To A Different
 TOR Server, In A Different Country & A Different IP Address Will Be Showing On ALL Server Logs
   http://tor.eff.org/overview.html.en    5+ Stars   Real IP Address Hiding Online Security

        Tor…Sets Up Real Easy With The Firefox Browser… The First Time
       I set this up on 1 of my computers it was NP, a Simple Install. So that ever time I
 opened up my FoxFire Browser & the "TOR is Enabled" & Turned Green, My
 Google page was from a totally different country Every Time, & A Totally Different
 Computer IP Address
will be showing up in anyone’s server logs, For any Server 
 websites, or email accounts you check etc, Each time you will be coming in from a
 Different Country, With a Different Computer IP Address then what your PC really is
 using   "Tor" Is A Must Be Using as 1 of your security layers. Your Computers Security
 You Should Always Be Using "Multiple Layers Of Security Programs For Your Online Protection".  

 "TOR" When Your Checking Out Or Posting On Any Message Boards,
 Or Surfing The Web To Prevent Any Computer Servers Or Email Accounts From Being Able To
 "Log-in" Your "Real Computer’s Home IP Address" I Personally Almost Never Even Use My IE
 Browser Anymore Its That Good. & Its Completely Free To  Use. Now It Does Slow Down Your
 Surfing By About 15% or 20% Speed Wise, But Most Of Us Are Using Some Form Of "High
 Speed Internet Connection" Now Days. & The Little Bit That It Slows You Down, Is More Then
 Worth The Knowledge Of The "Personal  Security Protection That It Will Give You"

"TOR" Is  5 Stars In Personal Computer Security Rating
         For Windows 32 Or Windows 64, XP, Vista, Windows 7, Or Other Operating Systems, 
Check Here For Your Proper Download Files

    "Tor Button Plugin"  Torbutton Plugin Download  Install This 2nd, Then 
     Close Out Your Firefox Browser. & The Tor Will Be Set Up In Bottom Right 
     Corner Of The Firefox Browser Red Means TOR Is OFF, & Green Means TOR
     Is On,
  It Will Say "Tor Enabled In Green" For When Its Running, & Just A 
     Simple Mouse Click On It, Will Turn It On & Off.  You will also have 2 small icons
     in your bottom right hand toolbar of the Computer screen. 1. is a Green
     Round P
that tells you that your "Privacy" is on or not, & the 2nd is a Small 
     Green Looks Like a Onion,
That  tells you if your "Tor Is Running Or Not.

                 TOR Is 5+  Stars  Real IP Address Hiding Internet Security!  & It’s 100% FREE!

       TOR Installs Real Easy, But If You Need Any Help? 
      Here’s An Instruction Page For TOR

                        VIDEO – "Big Brother, Big Business" http://opposingdigits.com/vlog/?p=1849
                                Not a bad documentary profiling some of the current technology in use today to track our 
                             every moves.  Sorry but the guy who put it together didn’t edit out the commercials

      Stay invisible Is A Daily Updated List Of Really Functioning Free Public Proxy Servers.
            StayInvisible Is a Daily Updated List of Really Functioning Free 
        Public Proxy Servers Plus IP Proxy Related Information & Tools.

                                                                                                           Related Stories

                          How to Secure and Encrypt Your Web Browsing on Public Networks (with Hamachi and Privoxy)

                           How to Install Spotify on Your iPhone in the US (Or, How to Install Any Geo-Locked App through iTunes)

                            Sidestep Automatically Reroutes Your Mac’s Traffic When Unsecured

                 Here Is How To Check It Out. Turn Off Your Proxy, & Click This Link. http://www.ip-adress.com/   It Will Give You
             "Your Real IP Address". Then Turn Your Proxy Back On & Do It Again To Check It Out. Anon Proxy Is a Good Start,
             BUT! An Encrypted Anon Proxy Is Definitely Really Required To Be Anonymous To Any Really Reasonable Level. I
             Recommend The Web Page Like Services, As They Have More Features, & It Loads The Pages Much Faster & Are
             General Much Easier To Use. "http://www.findnot.com" Is Just About The Best One Out There These Days.
             "http://www.anonymouse.org" Is Also A Good Decent Free Basic One,  

Try To Stay Safe & Secure Out There When Online Everyone!

              Snuggly The Security Bear Video

     Secret FBI GPS Tracking Ignites Legal Firestorm The FBI Got Caught! RED HANDED!  And you can pretty well bet every other 
   Law Enforcement Group  & Government Alphabet Agencies are doing the same thing in EVERY State Or Country EVERY DAY!.

           5 Steps Jailbreak and Unlock iPhone 3G/3Gs 4.0 and 3.1.3 iOs4 Completed Spirit                 

           CIA Security Officials To Spy On Chat Rooms                                 

  • The Fink project wants to bring the full world of Unix Open Source software to Darwin and Mac OS X. We modify Unix software so that it compiles and runs on Mac OS X ("port" it) and make it available for download as a coherent distribution.

    Fink uses Debian tools like dpkg and apt-get to provide powerful binary package management. You can choose whether you want to download precompiled binary packages or build everything from source. Read more…

    Fink – Home

    Fink – F.A.Q.

  • Resizing Your Photos with PowerToys..

Visit the Microsoft Site, download section at this link: Microsoft PowerToys for Windows XP

Down the right side of the page under the heading Download, Scroll down to the 11th item titled Image Resizer, ImageResizer.exe, 521KB, 2 min @ 28.8KBps

Click the exe file and the download will begin, Install the proggie to the default directory. Once completed, when you RIGHT CLICK a photo or JPG file, 
in the dropdown box, the 6th item listed will be resize image. In the next box that appears, you’ll be asked to select a size small, medium, or large. 
Click the radio button next to small or medium as these sizes will be downloadable by GP servers without problems.

Once the resizer program has done the resizing it will create a duplicate copy of your pic with the same file including the size you selected. 
RE: image file name was bigbud21714.jpg. The resized image will be located in the same folder or location your original picture but will have 
the file name: bigbud21714(medium).jpg

Why You Never Ship Any Marijuana Grow Equipment Or Seeds To Your Grow Address
A Must Read For Every Medical Grower In Every State, Real US Court Trial Documents!!!

    Police Use GPS To Track Suspects Despite Murky Law 

  • JonDonym – The Internet Anonymisation Free Service

The JonDonym/AN.ON technology is based on the principle of multiple encryption, distribution and processing. This procedure does not only protect your internet activities from being observed by third parties (against your access provider, WLAN hackers, advertising services and websites), but also against observation by the individual JonDonym providers themselves (against JonDonym service operators and their billing providers). 
 https://www.jondos.de/en         https://www.jondos.de/en/download  


  • Jailbreak 2.2 iPhone and iPod Touch

  • TrueCrypt Setup 6.1a.exe


  •  PeerGuardian 2.  Now this Free Software was designed to protect the Peer
              To Peer Music & File Sharing Folks, From RIAA & the other Folks being able
              Access & Trace Their Computers, Well the "Side Perk" to this program, Is that
             it automatically updates it selves, With all the latest RIAA, + All Government IP
             Numbers & "Blocks Them" From Being Able To Gain ANY Access Into Your
             Computer. Just set it up to automatically start every time your computer
      3 Star Personal Security Rating

PeerGuardian 2.

  • Current Version: 2.0 Beta 6b  





PeerGuardian 2 for Windows 98/ME



PeerGuardian 2 for Windows 2000/XP/2003



   PeerGuardian 2 for Windows XP/2003 x64 Edition



PeerGuardian 2 source code (for programmers)


Freeware PGP versions

* Amiga     * Atari      * BeOS    * EPOC (Psion etc.)   * MacOS    * MS-DOS    * Newton    * OS/2    * PalmOS  

 * Unix   * Windows 2000    * Windows 3.x    * Windows 95/98/NT    * Windows ME    * Windows XP 

  •                                         Here’s some cool stuff from Google that works with your cell phone


         Google Send to Phone for Firefox is an extension that enables you to send short text messages of web page content to your mobile phone.
                        For example, you might text message yourself a phone number, an address, or directions that you find on the Web.

                                     For more cool Google stuff for your phone (maps, searches, ect…) check out http://www.google.com/mobile/

      Also if you haven’t checked out my post on exploiting goog411 for making free long distance calls to businesses 
      (it’s also super useful and free) check out http://www.google.com/mobile/goog411/index.html or just call 1 800 GOOG-411 (1 800 466-4411).

These Downloads Are All Available For Free
                                                                   Download Adobe’s Free PDF File Reader
                                                                     Download Quick Time Video Player 
                                                                     Download Windows Media Player 10  
                                                                               Download Real Player
                                                                         FireFox 3.5.3 Free Download

Online Law Enforcement Marijuana Counter Intelligence

  As for USB flash drives and encryption, there are plenty options for that. 
  they even have moderately prices biometric scanners (fingerprint verification) 
  for security on some drives, the con is they only work if you have administrative
  rights on the computer you’re using.


Here’s a list of essential programs for a flash drive:

And here’s a whole website…



  •                                                Is My Husband Or Someone Else Spying On My Computer Usage?
                                                       How To Detect,  Beat & Remove a Computer Key Logger

  •           When you search on Google, your ip address, the time are stored in their database as well as the subject searched  
                                                          The Dangers Of Your Internet Surfing Habits Being Saved & Stored Forever!

  •                                                                  Information On Millimeter Wave Technology Security Scanning
                                                            Details about the latest security scanning  technology for airport security

  •                                        Hidden Data in JPEG Files That Can Reveal “Sensitive Information &YOUR Exact GPS Locations"

  •                                                              Cellular Phone/GPS “Burst” Tracking Device Jammer Plans

  •                                                 Plans For Building A Device for Detecting GPS Receivers
                                            Also Very Handy To Detect Convicted Child Molesters In Public. 

  •                                                                                            Tap Into OnStar    
    Any Vehicle with OnStar installed has a GPS receiver inside that is always on, ready to tell you exactly where you
                                       are. The problem is, the only way to access this information is to call onstar, wait for them to answer, wait for the
                                         modem to upload your location, wait for them to read it back to you… and all the while they charge you a hefty
                                        service fee.   It’s your car and it’s your GPS receiver. So why not read the data in real time, any time you want?
  •                          CAUTION! 9-24-11 Even If You do NOT even use your "OnStar" & Do not pay for their service!
                              The OnStar in YOUR car can still be remotely activated on your car. & They can then use
                               the GPS & Its Voice Microphone Functions of the OnStar Remotely Operated, & Listen In To
                               & What Is Being Said In Your Car! And As Well As Tracking your EXACT car location & GPS 
                               tracking of YOUR CAR!  If you do NOT use your OnStar? 
                             Then Rip The OnStar Brain Right Out Of Your Car!
    An Auto Mechanic can help due it for you.
  •                            GPSInformation.net – Got a Question about GPS technology? Looking for a GPS FAQ site?
  •                           Get To Know Google! Because They Know You!
                             Ethics & Law On The Electronic Frontier 6.8.05
                             Written By Steffine Delchicatsios & Temitop Sonuyi From "M.I.T."
                            Click The "To View the M.I.T. PDF File" On This
                            Goggle 33 Year Spy Cookie PDF

  •                     Google sets a 33 year long cookie. Used to track your internet surfing habits, sites you’ve 
             visited, identify your P.C, location and much more. According to Google-Watch.org  

  •                                         A Review of "The Never Get Busted Video" from L Nall 
                   Never Ever! OK Or Consent  To A Search Of Any Car or Vehicle That You Are Driving, Or Even Just 
                   a Passenger In The Car or Vehicle. Do Not Ever Consent To Any Search Of Your Car Or Property By The Police.
                   Only Words Out Of Your Mouth Should Be "HELL NO! You Can NOT Search!" & "I Want My Lawyer Please!"

  •                    Your cell phone speaker can now be remotely activated & turned into a listening bug.  
                                               By The FBI, DEA, CIA, NSA,  Etc Etc.     
    They now all have access to the technology where they can “Remotely Activate” your cell phone speaker, And listen in
     on any conversations that are going on at the time within hearing range of your cell phone speaker. So if you having a 
    “Security Sensitive Chat” with anyone..? About anything that you would not want the LEO’s knowing about it. Remember 
     to have everyone pull out their cell phone battery’s before you start the conversation!

                                                Firefox Add On sends text to your cell phone and other cool Google stuff

  •                                               Here’s some cool stuff from Google that works with your cell phone

        Google Send to Phone for Firefox is an extension that enables you to send short text messages of web page content to your mobile phone. 
        For example, you might text message yourself a phone number, an address, or directions that you find on the Web.

                         For more cool Google stuff for your phone (maps, searches, ect…) check out http://www.google.com/mobile/

    Also if you haven’t checked out my post on exploiting goog411 for making free long distance calls to businesses 
    (it’s also super useful and free) check out.  www.google.com/mobile/goog411/index.html or just call 1 800 GOOG-411 (1 800 466-4411).

                                                                   Free Downloads Courtesy Of  Cotse.net                  

  •                                                                              Proxy Check
                                                                                Port Search
                                                                           File Extension Search
                                                                              Base Converter
                                                                             On-Line Testing
    Subnet Calculator

                                            Is the Right to Privacy the Missing Amendment in the U.S. Constitution?