________________________

[This project has been discontinued due to license compliance issues. Thanks everyone who assisted with your ideas and feedback.]

About

  • What is this? - this was a project dedicated to building an up-to-date collection of great, free portable software for easy installation and use.
  • What's in it? - list of included freeware
Releases
  • v. 1.3 beta - note that this release is over a year old and contains very out-of-date software. I haven't worked out how to solve licensing issues. Download

NEWS

Monday, July 27, 2009

Other Kitchen Sink security tips

Following my recent encryption post:


Prevent Viruses
  • Virus check your files frequently using ClamAV. Keep in mind the false positives that usually come up.
  • Discard any changes made to your flash drive using the "Mirror" function in Toucan. Make sure the "source" is the trusted location and "destination" is the USB drive
  • Enable write-protect on your USB drive. Not all drives do this but if you use SD cards, there's a tiny slider on the side of the card. Many programs on Kitchen Sink require that they have read access, so for those programs just copy the files locally.


Prevent theft / data loss
  • Keep your USB drive on you at all times. Being attached to a key chain, lanyard, or built into some other device you use frequently like a watch. Extremely small drives can fit in your wallet.
  • Choose an inconspicuous flash drive such as a frayed USB cable or lipstick. This idea made famous by the coffee container in the less-than-great Al Pacino movie The Recruit.
  • Back up your files daily using included Toucan (simple) or DSyncronize (advanced). DSyncronize will even do "realtime," or continuous, backups.
  • Wipe sensitive files with CyberShredder or Eraser.
  • Clean up leftover cache files using CCleaner before you close Kitchen Sink might help prevent any recovery of personal data.
  • Take notes securely using only Crypditor. Be sure to save frequently as this program doesn't have an autosave function.

Paranoid
  • Use multiple security tools together. For example: Firefox Secure with Tor for anonymity, PeerGuaridan with HTML blocking turned on as a mild firewall, and AAST to prevent shoulder surfing.


  • Only use public terminals to be more anonymous, although this is not more secure overall.
  • Track down and kill individual data files - See development for the "Cleanup - Privacy" ( Section II.C. ) for files that can be removed to improve privacy. (I plan to create a batch file to do this.)

No comments: