Malwareaware

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Wednesday, 22 May 2013

How to keep spies from monitoring you through your computer or your phone.

Posted on 14:58 by Unknown
Those of you in The United States of America have most likely heard about that whole IRS scandal and the accompanying scandals of wiretapping of the Assicated Press. As for those not in the United States... I don't know what you have heard... So even if you do not know what I am talking about, this advice can still apply to you.

The title is self explanatory, but I would like to say that what you do with the information contained in this post is up to you. The software I will talk about is legal, but should not be used for anything illegal.

1. The Tor Browser: Tor stands for The Onion Router, and it means what it says. By using this browser, your IP address shows that you are somewhere where you are not. And, the tor browser also places your traffic through several routers in order to make sure that no one router node knows enough to find out where you actually are. This can fend off most attempts to spy on you while you are on the web.

2. VPN: You know that public Wi-Fi that your local cafe offers that is free to use? Well spies and cybercriminals alike are taking advantage by hacking into the Wi-Fi and watching your traffic. And from there, they can get enough information to commit identity theft if they want to. Don't like that? Well then you should use a VPN or a Virtual Private Network. This tool sends your traffic through a private network where the public Wi-Fi does not really get involved. Thus, making it impossible for someone that has hacked into the network to know what you are doing.

3. Google Voice: You can use this service from Google to route a phone call so that it appears that the caller is calling one telephone number that is not yours. But the connection gets connected to the number you provide. And because you can dump the fake number whenever you want, you can use it until the spy figures out why he is not getting any data from his tools.

4. Burner: A burner phone is a phone that contains no identifying info about you or where you are, it is cheap so that you can dispose of it when you need to. And... There actually is an app for that. Burner is an app that you can use that gives you a phone number that calls from your phone will appear as coming from. For example, if your cell phone number is 111-111-1111 and the app gives you the number 222-222-2222, anyone you call will see 222-222-2222 on their caller ID instead of 111-111-1111. This is not free, but it only costs 2 dollars for 20 minutes of talk time.

That is it for this post, thanks for stopping by and reading. As always, I invite readers to comment below with any questions or comments.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • How to remove System Doctor 2014
    There is a new rogue AV making the rounds on the web called System Doctor 2014. For those that have just started reading my blog or for thos...
  • What are Bitcoin Miners?
    For my first post about Bitcoins, and for what I wish to be my last about the subject, we are going to be talking about what Bitcoin miners ...
  • How to keep spies from monitoring you through your computer or your phone.
    Those of you in The United States of America have most likely heard about that whole IRS scandal and the accompanying scandals of wiretappin...
  • Spotlight on Malware: The Gruel Worm.
    It's been around since Windows 2000, but there still is not a way to remove this worm without formatting the hard drive. I speak of the ...
  • I am going to be a billionaire!
    For those of you that have been reading my blog for some time, you know I like to mess with scammers, fake tech support and the like. But th...
  • Use VBScript to pull a joke on your friends.
    Do you want to play a trick on your friends, family, or coworkers? Well this one's for you. You can make a fake piece of malware on your...
  • Spotlight on Malware: MyDoom
    The MyDoom Windows worm, also known as Novarg, and Shimgapi will be the subject of our focus for this post. The MyDoom worm was first discov...
  • CryptoLocker as of 11/3/2013
    If you have read my other posts on this, you know. But for those of you who do not, there is a piece of ransomware that has been making the ...
  • The Big Game: Who's on our side?
    I recently helped a friend of mine remove malware from their computer when she be one mused on how lonely my job must be. "It must be s...
  • Java: No more coffee for you.
    Odds are that every blogger that has a tight focus on computer security has authored a blog post about Java. So why am I wasting your time? ...

Categories

  • Android
  • History Of
  • iOS
  • Java
  • Macs
  • Passwords
  • Removal Guides
  • Spotlight On Malware
  • The CryptoLocker Saga
  • What Does It Mean?
  • What's in a name?
  • Windows

Blog Archive

  • ▼  2013 (151)
    • ►  November (10)
    • ►  October (5)
    • ►  September (15)
    • ►  August (22)
    • ►  July (26)
    • ►  June (17)
    • ▼  May (25)
      • Update on the new blog.
      • What's In a name: Rogue Antivirus
      • A break from blogging.
      • Apparently, my computer loves me. (Surprise ending)
      • How to keep spies from monitoring you through your...
      • Malware In Space: Not A Science Fiction Drama Gone...
      • Greyware and the Babylon Toolbar.
      • Decrypt Protect Ransomware and how to fully remove...
      • Plug In to Plugins.
      • How a fake tech support scam works.
      • Mac Malware is now getting past Gatekeeper.
      • Spotlight On Malware: Bring On The Flame!
      • Attack Of The Clones: What is a clone rogue?
      • The Big Game: Who's on our side?
      • KeyScrambler: A preventive measure against keylogg...
      • Spotlight on Malware: MyDoom
      • Spotlight on Malware: The Gruel Worm.
      • How (Not) to Make Your Computer Run Faster With th...
      • A brief look at Windows 8.
      • A few jokes about computers.
      • Malware: It could happen to iOS too.
      • Android Malware: The robot can be infected.
      • "Stupid Malware! You made me drop my sandwich!"
      • How to remove Internet Security (Rogue)
      • Glipho
    • ►  April (15)
    • ►  March (7)
    • ►  February (6)
    • ►  January (3)
Powered by Blogger.

About Me

Unknown
View my complete profile