Seven Must Have Internet Privacy and Online Security Tools- India

Nitish ChandanCyber SecurityLeave a Comment

Seven must have Internet Privacy and Online Security Tools

Information security and Internet privacy today has become one of the greatest concerns among most of the people. Why? Mostly because(As far as India is concerned), there is no central law about Internet privacy. There was the most recent ‘right to be forgotten’ initiative in Europe but sadly that didn’t make any winds blow in India. Given the past posts and facts that India is such a huge internet market yet the levels of information security awareness and Internet privacy among people is very less.

For this very reason, We have compiled a list of six must have internet privacy and online security tools that you must use to stay safe only, to protect your data and yourself.

1. Tor Browser: (Download)

Known as the onion router, it is one of the best undefeated internet browsers (Well, nothing is bulletproof really). What happens when you communicate over a network is that packets bearing anything you send are transmitted. This browser uses relays to hide your identity from packets as much as possible. This does not mean you can use this for committing a crime because the reach of law enforcement is beyond those preying on you and this bit of edge is always a necessity.

Tor Browser

Tor Browser

 

 

 

 

 

 

 

 

 

 

 

 

2. For Emails: (Download)

Either you could use PGP/GPG Encrypted email service or you could just take care that your passwords are strong and you have all security settings for your email done proper.

Encrypted Email Service

Encrypted Email Service

 

 

 

 

 

 

 

 

 

 

 

 

 

3. Last Pass:(Download)

This little tool here can do a lot of help to all those who are concerned about security but cannot remember too many passwords. Anyway, passwords is a key area of both Internet privacy and your online security and one which everyone talks about but still people don’t do much about it. The idea of this application is to create a vault for you(which is encrypted) and once you login to your vault, all the passwords become visible as plain text. As soon as you logout, everything self encrypts again.

Last Pass

Last Pass

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

4. Ad Block: (Download for chrome)

While we guess most of you have it by now, you would have done it to avoid annoying ads and to bypass ones on YouTube. But more importantly this tool is important for you because you need to avoid the adware as well that are floating on the internet just as much and you can fall victim to them easily.

Ad

Ad block for chrome

 

 

 

 

 

 

 

 

 

 

 

 

5. HTTPS Everywhere: (Download)

This tool is important given the current scenario in India, phishing crimes are on the rise even today. This plugin is available for most of the browsers and what it does is fairly simple. It forces the browser to load the secure version of any webpage over the normal version. This helps ensure that passwords are sent over an encrypted medium.

https:// everywhere

https:// everywhere

 

 

 

 

 

 

 

 

 

 

 

 

 

 

6. KeyScrambler: (Download)

This is one of those tools that secures each keystroke that you make i.e. encrypts it. In the free version it is only available for web browsers but guess that is enough to begin with. Keyloggers today are becoming obsolete unless an elite hacker is targeting you, so protecting keystrokes on the system is not as important as it is to protect keystrokes online.

KeyScrambler

KeyScrambler

.

 

 

 

 

7. Eraser: (Download)

Download this simple and straight utility to erase any file completely from your computer. It wdeletes a file and then rewrites the memory location with carefully selected patterns. As per its documentation available on the website:

  • It Erases residue from deleted files
  • Erases MFT and MFT-resident files (for NTFS volumes) and Directory Indices (for FAT)
  • Powerful and flexible scheduler

All you need to do is right click on the file in place of delete use Eraser. If you are however a techie, you can always use command line utilities like sdelete. 

Leave a Reply

Your email address will not be published. Required fields are marked *