Securing your day-to-day Computing

This is (obviously) just a placeholder, but we hope the following high-level outline will give you an idea of what we intend to cover in this project:

  • a brief summary of why you should care;
  • the key attack vectors (or ways in which your machines, information and communications can be compromised);
  • significant ways in which you can address some of these vectors at the hardware, operating system, disk, application, network and browsing level;
  • digital signatures, encrypted emails, and authentication, integrity and non-repudiation;
  • how to create and manage strong passwords, and why two-factor authentication is your friend;
  • the ways in which remote servers and storage can complement local security measures;
  • links to bootable disk images that can be used to increase your anonymity and security; and
  • links to other how-tos and resources


description:
A how-to and a series of workshops on topics including disk and network-traffic encryption, privacy and anonymity, and alternatives to local storage and browsing
author:
prd
created:
2013-06-10
lastupdated:
2013-06-10
type:
howto, workshop, security advice
tag:
security, secure communications, encryption, privacy, anonymity
status:
draft
namespace:
projects