For encrypting/decryping sensitive data
Create a basic partition (16 kb cylinder so is not compressed), then use Veracrypt for encriptying it, then use that volume for working. Veracrypt will decrypt/encrypt on the fly data inside volume whenever you decide to mount it.
Use Keypass to...
In order to keep data you want to delete, not just deleted but destroyed.
never use recycle bin
If you have used it just delete Volume located in registry here:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume
and use a data shredder for destroying files...
hello Elixer
Is easier for me to tell you which services actually run in my machine (15) that telling you which ones are disabled, distroyed or stopped for 1440 min before new instance finds out must wait for 1440 min more to run.
No standard users wanted here
(on installation process I made...
As my system is aimed from low to no tech knowledge users as 99.99999 of users are, but at same time not just have a feeling of privacy but real privacy, I trimmed all enviroments and disabled all services that can put in risk their private data.
For example SMB that wannacry takes advantage...
Hello XavierMace
Would you kindly give me advice about which reliable external pen test can I use to test my machine penetrability in order not to insult your intelligence?
Thanks in advance
Hi, I invite every Windows OS developer that is seriously concerned about users privacy to collaborate in enhancing changes I have made to OS.
Please see above post: Network testing using Shields Up ran from the machine I used to post this thread, guarantees I am not posting nonsense.
My work...
Above is explained not even the first part of all
Once you have got administrative rights comes a bunch of tedious work like
selecting which files inside OS are needed by you and which files are needed by controllers of your data (parasitic files like all iis files) and many other steps that...
Regarding Windows in order not to receive unwanted intruders to sell your private life to others as first security measure is a must you change permissions in whole OS Partition: get rid of "TrustedInstaller" and "Authenticated Users" groups and the "Everyone" group special audit entry in every...
Vulnerbilities in all OS and software are put there in purpose by developers.
If you think about what a developer offers you (most times for "free") goes straight into your computer and starts interacting with your OS (no matter if is Mac, Windows, Linux, Android or other) that is designed to...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.