Browse the web anonymously

On top of using “private browsing” or “incognito” mode, check out Tor to keep your presence anonymous over the Internet pipelines.  You can definitely use an anonymizer site, but the interface of Tor is way better.

Tor offers an installer bundle or a “just-copy-and-execute” bundle.  I’ve been using it along with the Firefox add-on for a while and have been happy with it.

Note: Your connection is a little slower, but it’s worth the peace of mind you get.  Also, it’s very useful if you’re downloading from sites like hotfile.com. =o)

Vidalia/Tor Screenshots

image

image

image

Avira AntiVir Personal update failing solution

I’ve noticed the update failing more often for about a month … googling it mentioned that it was due to Avira’s server being overwhelmed.  So I was patient, updated manually each time, but it just became too tedious — tried this command, too, after reading it from a moderator in a thread in the Avira forum that didn’t work either:

“C:\Program Files\Avira\AntiVir Desktop\update.exe” /DM=”0″ /NOMESSAGEBOX /receivetimeout=120

Finally, I found this command that worked, so sharing it for other’s benefit:

“C:\Program Files\Avira\AntiVir Desktop\update.exe” /DM=”0″ “/NOMESSAGEBOX”

Hope that helps.

Microsoft’s forensic USB thumb drive

image Here’s an interesting article on the Seattle Times website about a small plug-in device that Microsoft “quietly distributed to a handful of law-enforcement agencies.”  Dubbed the COFFEE (Computer Online Forensic Evidence Extractor), it contains “150 commands that can dramatically cut the time it takes to gather digital evidence, which is becoming more important in real-world crime, as well as cybercrime. It can decrypt passwords and analyze a computer’s Internet activity, as well as data stored in the computer.”

I need one of this…just because.  =0)

Cold Boot encryption memory hack

I read an article wherein researchers from Princeton University cooled down memory to -58 degrees F which allowed them to examine the encrypted contents of the memory for as long as 10 minutes.  Microsoft, however, says its unlikely

To be clear, encrypted data here is data that gets encrypted by apps like Vista’s BitLocker or Mac OS X’s FileVault.  In any case, it’s an interesting read. 

Check out this video for more details: