Does a socks proxy encrypt data traffic? I am not sure.
Are there any people on the forum that have experience with the things f3x mentions? I mean using BartPE or for example the Ubuntu Browser...
Very interesting the Seagate product, though I am always a bit sceptical about hardware embedded security. I just remember the post about the FBI...
"First, it's not easy to hack data." - I agree, but that is no reason to think that it will not happen. I ask the question with good reason.
Quote: "everything new is 'deleted' not 'erased'." This is exactly what I mean. Deleted data are the traces I am talking about. I can simply...
Mrk, Good points ! Thanks for the feedback. The firewall was the solution and prevented the NAT or BRIDGE routing from my guest OS to host OS....
Alphalutra1, Nice setup. I heared about this before. If my OS would be win32, I can still use Putty to setup the SSH tunnel and route my...
Mrk, "Tor uses proxy servers - do you trust these servers?" - Answer: No. "SSH .. use a connection you trust .. active connection on both ends...
Mrk, Let's just assume I am a smart guy and would not do anything stupid. ;) Then still there are many ways to leak data from your activity....
Mrk, I understand that during the session the files will be "saved to disk" like normal, but after resetting I would like no traces. So I...
I already posted some of these options in my previous 3 posts, but I like this to be a seperate thread so we can discuss this: My current idea...
With my third post I would like to hear some advice on the differences between a VPN connection and SSH tunneling. As I try to protect the data...
Second post about security for my laptop. In previous post I asked about "leaving no traces" on my laptop. If you use vmware or qemu with a...
As I have sensitive info on my laptop I do not want to leave traces of online activity and also not from certain applications I use. I already...
Separate names with a comma.