Operating Systems

How to Set Your MAC Address Randomly Using Linux

In theory, every networking device has a unique media access control, or MAC, address. In practice, using a simple tool called macchanger, it’s easy to “spoof” your computer’s MAC address on Linux by setting a random value for it each time you connect to a network, which helps protect your privacy. Here’s how and why. […]

How to Set Your MAC Address Randomly Using Linux Read More »

Tails OS 1.5 Offers Out-of-the-Box Privacy Protection

Wouldn’t it be nice if there were an OS designed from the ground-up for privacy and security?  If you’re willing to give a Linux-based platform a try, there is: The Amnesic Incognito Live System — better known as Tails OS. It aims to make private computing a plug-and-play affair. Most mainstream operating systems do little

Tails OS 1.5 Offers Out-of-the-Box Privacy Protection Read More »

A Guide To Being Private Online

The services below will increase your security and reduce your surveillance by governments and advertisers. Here are my tips for maintaining on-line privacy: Use A Search Engine That Doesn’t Track You Many popular search engines like Google and Bing save your search history. Typically, your searches are saved along with some information about your computer

A Guide To Being Private Online Read More »

NinjaStik: Boot To An Anonymous OS In 60 Seconds

The NinjaStik is a bootable USB 3.0 memory stick. It allows to you boot your computer into an anonymous operating system (via custom firmware and Linux-based OS). There are a host of privacy-related tools on the stick — including a Tor Browser, a Bitcoin Wallet and Thunderbird with Enigmail installed. According to the company the

NinjaStik: Boot To An Anonymous OS In 60 Seconds Read More »

Let Your Child Explore Your Computer Without Worries — Use A Virtual Machine

A virtual machine makes it possible for your child to explore your computer freely without fears of configuration problems or lost files. If things do stop working, you can delete the virtual machine, restore from a backup, and the child is back with a working machine in just a few minutes You create a Virtual

Let Your Child Explore Your Computer Without Worries — Use A Virtual Machine Read More »

Whonix: An Operating System Where IP & DNS Leaks Are Impossible

Whonix is an operating system focused on anonymity and security. It’s based on the Tor anonymity network, Debian GNU/Linux and security by isolation. In Whonix, DNS leaks are impossible, and not even malware with root privileges can find out the user’s real IP. Whonix consists of two virtual machines on a separate, isolated virtual network.

Whonix: An Operating System Where IP & DNS Leaks Are Impossible Read More »