On top of using “private browsing” or “incognito” mode, check out Tor to keep your presence anonymous over the Internet pipelines. You can definitely use an anonymizer site, but the interface of Tor is way better.
Tor offers an installer bundle or a “just-copy-and-execute” bundle. I’ve been using it along with the Firefox add-on for a while and have been happy with it.
Note: Your connection is a little slower, but it’s worth the peace of mind you get. Also, it’s very useful if you’re downloading from sites like hotfile.com. =o)
I’ve noticed the update failing more often for about a month … googling it mentioned that it was due to Avira’s server being overwhelmed. So I was patient, updated manually each time, but it just became too tedious — tried this command, too, after reading it from a moderator in a thread in the Avira forum that didn’t work either:
“C:\Program Files\Avira\AntiVir Desktop\update.exe” /DM=”0″ /NOMESSAGEBOX /receivetimeout=120
Finally, I found this command that worked, so sharing it for other’s benefit:
“C:\Program Files\Avira\AntiVir Desktop\update.exe” /DM=”0″ “/NOMESSAGEBOX”
Hope that helps.
I’ve known about grc.com for a long time, but just today visited the site again after a while. Steve Gibson is like Tiger Woods when it comes to security. So, if you’re into this kind of stuff like me, need tools, or just want to become more knowledgeable in that area, give this site a go.
Here’s an interesting article on the Seattle Times website about a small plug-in device that Microsoft “quietly distributed to a handful of law-enforcement agencies.” Dubbed the COFFEE (Computer Online Forensic Evidence Extractor), it contains “150 commands that can dramatically cut the time it takes to gather digital evidence, which is becoming more important in real-world crime, as well as cybercrime. It can decrypt passwords and analyze a computer’s Internet activity, as well as data stored in the computer.”
I need one of this…just because. =0)
I read an article wherein researchers from Princeton University cooled down memory to -58 degrees F which allowed them to examine the encrypted contents of the memory for as long as 10 minutes. Microsoft, however, says its unlikely.
To be clear, encrypted data here is data that gets encrypted by apps like Vista’s BitLocker or Mac OS X’s FileVault. In any case, it’s an interesting read.
Check out this video for more details: