├── README.md ├── hands-on-guides ├── apg │ ├── 01-apg-intro.txt │ ├── 02-apg-wyg.txt │ ├── 03-apg-premise.txt │ ├── 04-apg-installation.txt │ ├── 05-apg-basic.txt │ └── 06-apg-required_reading.txt ├── avast │ ├── 01-avast-intro.txt │ ├── 02-avast-wyg.txt │ ├── 03-avast-premise.txt │ ├── 04-avast-installation.txt │ ├── 05-avast-setup.txt │ ├── 06-avast-update.txt │ ├── 07-avast-basic.txt │ ├── 08-avast-faq.txt │ ├── 09-avast-questions.txt │ └── 10-avast-required_reading.txt ├── ccleaner │ ├── 01-ccleaner-intro.txt │ ├── 02-ccleaner-wyg.txt │ ├── 03-ccleaner-premise.txt │ ├── 04-ccleaner-installation.txt │ ├── 05-ccleaner-setup.txt │ ├── 06-ccleaner-basic.txt │ ├── 07-ccleaner-advanced.txt │ ├── 08-ccleaner-portable.txt │ ├── 09-ccleaner-faq.txt │ ├── 10-ccleaner-questions.txt │ └── 11-ccleaner-required_reading.txt ├── chatsecure │ ├── 01-chatsecure-intro.txt │ ├── 02-chatsecure-wyg.txt │ ├── 03-chatsecure-premise.txt │ ├── 04-chatsecure-installation.txt │ ├── 05-chatsecure-setup.txt │ ├── 06-chatsecure-basic.txt │ └── 07-chatsecure-required_reading.txt ├── cobian │ ├── 01-cobian-intro.txt │ ├── 02-cobian-wyg.txt │ ├── 03-cobian-installation.txt │ ├── 04-cobian-basic.txt │ ├── 05-cobian-faq.txt │ ├── 06-cobian-questions.txt │ └── 07-cobian-required_reading.txt ├── comodo │ ├── 01-comodo-intro.txt │ ├── 02-comodo-wyg.txt │ ├── 03-comodo-premise.txt │ ├── 04-comodo-installation.txt │ ├── 05-comodo-basic.txt │ ├── 06-comodo-advanced.txt │ ├── 07-comodo-faq.txt │ ├── 08-comodo-questions.txt │ └── 09-comodo-required_reading.txt ├── crabgrass │ ├── 01-crabgrass-intro.txt │ ├── 02-crabgrass-wyg.txt │ ├── 03-crabgrass-installation.txt │ ├── 04-crabgrass-basic.txt │ ├── 05-crabgrass-setup.txt │ └── 06-crabgrass-required_reading.txt ├── cryptonite │ ├── 01-cryptonite-intro.txt │ ├── 02-cryptonite-wyg.txt │ ├── 03-cryptonite-premise.txt │ ├── 04-cryptonite-installation.txt │ ├── 05-cryptonite-basic.txt │ └── 06-cryptonite-required_reading.txt ├── eraser │ ├── 01-eraser-intro.txt │ ├── 02-eraser-wyg.txt │ ├── 03-eraser-premise.txt │ ├── 04-eraser-installation.txt │ ├── 05-eraser-setup.txt │ ├── 06-eraser-basic.txt │ ├── 07-eraser-portable.txt │ ├── 08-eraser-faq.txt │ ├── 09-eraser-questions.txt │ └── 10-eraser-required_reading.txt ├── facebook-security │ ├── 01-facebook-security-intro.txt │ ├── 02-facebook-security-wyg.txt │ ├── 03-facebook-security-premise.txt │ ├── 04-facebook-security-setup.txt │ └── 05-facebook-security-required_reading.txt ├── firefox │ ├── 01-firefox-intro.txt │ ├── 02-firefox-wyg.txt │ ├── 03-firefox-premise.txt │ ├── 04-firefox-installation.txt │ ├── 05-firefox-setup.txt │ ├── 06-firefox-basic.txt │ ├── 08-firefox-addons.txt │ ├── 09-firefox-portable.txt │ ├── 10-firefox-faq.txt │ └── 11-firefox-questions.txt ├── flickr-security │ ├── 01-flickr-security-intro.txt │ ├── 02-flickr-security-wyg.txt │ ├── 03-flickr-security-premise.txt │ ├── 04-flickr-security-setup.txt │ └── 05-flickr-security-required_reading.txt ├── gpg4usb │ ├── 01-gpg4usb-intro.txt │ ├── 02-gpg4usb-wyg.txt │ ├── 03-gpg4usb-premise.txt │ ├── 04-gpg4usb-installation.txt │ ├── 05-gpg4usb-setup.txt │ ├── 07-gpg4usb-faq.txt │ ├── 08-gpg4usb-questions.txt │ └── 09-gpg4usb-required_reading.txt ├── jitsi │ ├── 01-jitsi-intro.txt │ ├── 02-jitsi-wyg.txt │ ├── 03-jitsi-installation.txt │ ├── 04-jitsi-setup.txt │ ├── 05-jitsi-problems.txt │ ├── 06-jitsi-basic.txt │ └── 07-jitsi-advanced.txt ├── k9 │ ├── 01-k9-intro.txt │ ├── 02-k9-wyg.txt │ ├── 03-k9-premise.txt │ ├── 04-k9-installation.txt │ ├── 05-k9-setup.txt │ ├── 06-k9-basic.txt │ └── 07-k9-required_reading.txt ├── keepassdroid │ ├── 01-keepassdroid-intro.txt │ ├── 02-keepassdroid-wyg.txt │ ├── 03-keepassdroid-premise.txt │ ├── 04-keepassdroid-installation.txt │ ├── 05-keepassdroid-setup.txt │ ├── 06-keepassdroid-basic.txt │ └── 07-keepassdroid-required_reading.txt ├── keepassx │ ├── 01-keepassx-intro.txt │ ├── 02-keepassx-wyg.txt │ ├── 03-keepassx-installation.txt │ ├── 04-keepassx-setup.txt │ ├── 05-keepassx-basic.txt │ ├── 06-keepassx-faq.txt │ ├── 07-keepassx-questions.txt │ └── 08-keepassx-required_reading.txt ├── metanull │ ├── 01-metanull-intro.txt │ ├── 02-metanull-wyg.txt │ ├── 03-metanull-premise.txt │ ├── 04-metanull-installation.txt │ ├── 05-metanull-basic.txt │ └── 06-metanull-required_reading.txt ├── obscuracam │ ├── 01-obscuracam-intro.txt │ ├── 02-obscuracam-wyg.txt │ ├── 03-obscuracam-premise.txt │ ├── 04-obscuracam-installation.txt │ ├── 05-obscuracam-basic.txt │ └── 06-obscuracam-required_reading.txt ├── orbot │ ├── 01-orbot-intro.txt │ ├── 02-orbot-wyg.txt │ ├── 03-orbot-premise.txt │ ├── 04-orbot-installation.txt │ ├── 05-orbot-setup.txt │ ├── 06-orbot-basic.txt │ └── 07-orbot-required_reading.txt ├── orweb │ ├── 01-orweb-intro.txt │ ├── 02-orweb-wyg.txt │ ├── 03-orweb-premise.txt │ ├── 04-orweb-installation.txt │ ├── 05-orweb-basic.txt │ └── 06-orweb-required_reading.txt ├── pidgin │ ├── 01-pidgin-intro.txt │ ├── 02-pidgin-wyg.txt │ ├── 03-pidgin-premise.txt │ ├── 04-pidgin-installation.txt │ ├── 05-pidgin-setup.txt │ ├── 06-pidgin-basic.txt │ ├── 07-pidgin-problems.txt │ ├── 08-pidgin-portable.txt │ ├── 09-pidgin-faq.txt │ ├── 10-pidgin-questions.txt │ └── 11-pidgin-required_reading.txt ├── recuva │ ├── 01-recuva-intro.txt │ ├── 02-recuva-wyg.txt │ ├── 03-recuva-premise.txt │ ├── 04-recuva-installation.txt │ ├── 05-recuva-basic.txt │ ├── 06-recuva-portable.txt │ ├── 07-recuva-faq.txt │ └── 08-recuva-questions.txt ├── riseup │ ├── 01-riseup-intro.txt │ ├── 02-riseup-wyg.txt │ ├── 03-riseup-premise.txt │ ├── 04-riseup-installation.txt │ ├── 05-riseup-setup.txt │ ├── 06-riseup-basic.txt │ ├── 07-riseup-faq.txt │ ├── 08-riseup-questions.txt │ └── 09-riseup-required_reading.txt ├── template-hog │ ├── 01-siab-intro.txt │ ├── 02-siab-wyg.txt │ ├── 03-siab-premise.txt │ ├── 04-siab-installation.txt │ ├── 05-siab-setup.txt │ ├── 06-siab-update.txt │ ├── 07-siab-basic.txt │ ├── 08-siab-problems.txt │ ├── 09-siab-portable.txt │ ├── 10-siab-advanced.txt │ ├── 11-siab-addons.txt │ ├── 12-siab-faq.txt │ ├── 13-siab-questions.txt │ └── 14-siab-required_reading.txt ├── textsecure │ ├── 01-textsecure-intro.txt │ ├── 02-textsecure-wyg.txt │ ├── 03-textsecure-premise.txt │ ├── 04-textsecure-installation.txt │ ├── 05-textsecure-setup.txt │ ├── 06-textsecure-basic.txt │ └── 07-textsecure-required_reading.txt ├── thunderbird-enigmail │ ├── 01-thunderbird-intro.txt │ ├── 02-thunderbird-wyg.txt │ ├── 03-thunderbird-premise.txt │ ├── 04-thunderbird-installation.txt │ ├── 05-thunderbird-setup.txt │ ├── 06-thunderbird-basic.txt │ ├── 07-thunderbird-portable.txt │ ├── 08-thunderbird-addons.txt │ ├── 09-thunderbird-faq.txt │ └── 10-thunderbird-required_reading.txt ├── torbrowser │ ├── 01-torbrowser-intro.txt │ ├── 02-torbrowser-wyg.txt │ ├── 03-torbrowser-premise.txt │ ├── 04-torbrowser-installation.txt │ ├── 05-torbrowser-setup.txt │ ├── 06-torbrowser-basic.txt │ ├── 07-torbrowser-faq.txt │ └── 08-torbrowser-required_reading.txt ├── truecrypt │ ├── 01-truecrypt-intro.txt │ ├── 02-truecrypt-wyg.txt │ ├── 03-truecrypt-premise.txt │ ├── 04-truecrypt-installation.txt │ ├── 05-truecrypt-basic.txt │ ├── 06-truecrypt-advanced.txt │ ├── 07-truecrypt-portable.txt │ ├── 08-truecrypt-faq.txt │ ├── 09-truecrypt-questions.txt │ └── 10-truecrypt-required_reading.txt ├── twitter-security │ ├── 01-twitter-security-intro.txt │ ├── 02-twitter-security-wyg.txt │ ├── 03-twitter-security-premise.txt │ ├── 04-twitter-security-setup.txt │ ├── 05-twitter-security-basic.txt │ └── 06-twitter-security-required_reading.txt └── youtube-security │ ├── 01-youtube-security-intro.txt │ ├── 02-youtube-security-wyg.txt │ ├── 03-youtube-security-premise.txt │ ├── 04-youtube-security-setup.txt │ └── 05-youtube-security-required_reading.txt ├── howtos ├── malware │ ├── 01-malware-scenario.txt │ ├── 02-malware-wyg.txt │ ├── 03-malware-description.txt │ ├── 04-malware-bestpractices.txt │ ├── 05-malware-prevention.txt │ ├── 06-malware-tools.txt │ ├── 07-malware-tips.txt │ └── 08-malware-furthersteps.txt ├── passwords │ ├── 01-passwords-scenario.txt │ ├── 02-passwords-wyg.txt │ ├── 03-passwords-description.txt │ ├── 04-passwords-bestpractices.txt │ ├── 05-passwords-tips.txt │ ├── 06-passwords-tools.txt │ └── 07-passwords-furthersteps.txt ├── physical │ ├── 01-physical-scenario.txt │ ├── 02-physical-wyg.txt │ ├── 03-physical-description.txt │ ├── 04-physical-bestpractices.txt │ ├── 05-physical-prevention.txt │ ├── 06-physical-tools.txt │ ├── 07-physical-mobile.txt │ └── 08-physical-furthersteps.txt ├── secure-communication │ ├── 01-secure-communication-scenario.txt │ ├── 02-secure-communication-wyg.txt │ ├── 03-secure-communication-description.txt │ ├── 04-secure-communication-bestpractices.txt │ ├── 05-secure-communication-tools.txt │ ├── 06-secure-communication-tips.txt │ ├── 07-secure-communication-risks.txt │ ├── 08-secure-communication-advanced.txt │ └── 09-secure-communication-furthersteps.txt ├── secure-file-storage │ ├── 01-secure-file-storage-scenario.txt │ ├── 02-secure-file-storage-wyg.txt │ ├── 03-secure-file-storage-description.txt │ ├── 04-secure-file-storage-tips.txt │ ├── 05-secure-file-storage-risks.txt │ └── 06-secure-file-storage-furthersteps.txt └── template-issues │ ├── 01-siab-scenario.txt │ ├── 02-siab-wyg.txt │ ├── 03-siab-description.txt │ ├── 04-siab-bestpractices.txt │ ├── 05-siab-prevention.txt │ ├── 06-siab-tools.txt │ ├── 07-siab-tips.txt │ ├── 08-siab-risks.txt │ ├── 09-siab-advanced.txt │ ├── 10-siab-mobile.txt │ ├── 11-siab-faq.txt │ └── 12-siab-furthersteps.txt ├── linkmap.txt └── tornado └── siabmagic.py /hands-on-guides/apg/01-apg-intro.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Android Privacy Guard (APG) 3 | Platform: Google Android 4 | Need: File and Email Encryption 5 | Website: http://www.thialfihar.org/projects/apg/ 6 | Download: https://play.google.com/store/apps/details?id=org.thialfihar.android.apg 7 | Version: 1.08 8 | License: Free/Open Source Software 9 | System_requirements: Android 1.5 or higher 10 | Admin: false 11 | Alternatives: 12 | Comment: 13 | Group: Synthesis 14 | Title: Introduction 15 | Language: EN 16 | 17 | 18 | **Android Privacy Guard** (APG) is a free and open source application for Android devices, created by [Thialfiar](http://www.thialfihar.org/), that lets you encrypt and decrypt single files or emails. It aims provide **OpenPGP** encryption for Android devices, although not all features of OpenPGP are implemented yet. Its public/private key scheme lets you encrypt, decrypt and sign files and messages. You can also use it without any public/private key pair to encrypt single files with asymmetric encryption, securing the files with a password or passphrase. For email encryption we recommend to use it in combination with **K9**, an Android email client, for which there is also a [Hands on Guide](https://securityinabox.org/en/k9_apg_main)[K9 Main]. 19 | -------------------------------------------------------------------------------- /hands-on-guides/apg/02-apg-wyg.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Android Privacy Guard (APG) 3 | Platform: Google Android 4 | Need: File and email encryption 5 | Website: http://www.thialfihar.org/projects/apg/ 6 | Download: https://play.google.com/store/apps/details?id=org.thialfihar.android.apg 7 | Version: 1.08 8 | License: Free/Open Source Software 9 | System_requirements: Android 1.5 or higher 10 | Admin: false 11 | Alternatives: 12 | Comment: This file should only be used in connection with the whole hands-on guide 13 | Group: Synthesis 14 | Title: What you will get from this guide 15 | Language: EN 16 | 17 | 18 | * The ability to use encryption for single files and for email communication 19 | -------------------------------------------------------------------------------- /hands-on-guides/apg/03-apg-premise.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Android Privacy Guard (APG) 3 | Platform: Google Android 4 | Need: File and email encryption 5 | Website: http://www.thialfihar.org/projects/apg/ 6 | Download: https://play.google.com/store/apps/details?id=org.thialfihar.android.apg 7 | Version: 1.08 8 | License: Free/Open Source Software 9 | System_requirements: Android 1.5 or higher 10 | Admin: false 11 | Alternatives: 12 | Comment: 13 | Group: Basic Usage 14 | Title: Important premise 15 | Language: EN 16 | 17 | 18 | # Introduction to APG 19 | 20 | - **APG** integrates with the k9 Email client for android and makes email encryption a smooth affair. But first, you need to know how email encryption works. This is explained in Chapter [**7.4.Advanced Email Security**](https://securityinabox.org/chapter_7_4)[Advanced Email]. 21 | - **APG** can also be used to encrypt and decrypt files locally on your device with either a passphrase or public/private keypair. 22 | -------------------------------------------------------------------------------- /hands-on-guides/apg/04-apg-installation.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Android Privacy Guard (APG) 3 | Platform: Google Android 4 | Need: File and email encryption 5 | Website: http://www.thialfihar.org/projects/apg/ 6 | Download: https://play.google.com/store/apps/details?id=org.thialfihar.android.apg 7 | Version: 1.08 8 | License: Free/Open Source Software 9 | System_requirements: Android 1.5 or higher 10 | Admin: false 11 | Alternatives: 12 | Comment: 13 | Group: Basic Usage 14 | Title: Installation 15 | Language: EN 16 | 17 | 18 | # Install APG 19 | 20 | ## Step 1 21 | 22 | **Download** the app from the [Google Play](https://play.google.com/store/apps/details?id=org.thialfihar.android.apg). Alternatively, you can download the app from the [project's homepage](http://www.thialfihar.org/projects/apg/). 23 | 24 | ## Step 2 25 | 26 | **Install** the app by tapping the **Install** button. 27 | 28 | ## Step 3 29 | 30 | **Confirm** the permissions required by the app and tap **Accept & download**. 31 | 32 | ## Step 4 33 | 34 | **Tap** *Open* to run the app for the first time. 35 | 36 | There are no further initial steps needed for file encryption with a password. If you want to use **AGP in combination with the k9 email client**, please go to the [**K9+APG Hands on Guide**](https://securityinabox.org/en/k9_apg_main)[K9 Main]. 37 | -------------------------------------------------------------------------------- /hands-on-guides/apg/06-apg-required_reading.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Android Privacy Guard (APG) 3 | Platform: Google Android 4 | Need: File and Email Encryption 5 | Website: http://www.thialfihar.org/projects/apg/ 6 | Download: https://play.google.com/store/apps/details?id=org.thialfihar.android.apg 7 | Version: 1.08 8 | License: Free/Open Source Software 9 | System_requirements: Android 1.5 or higher 10 | Admin: false 11 | Alternatives: 12 | Comment: 13 | Group: Required Reading 14 | Title: Required Reading 15 | Language: EN 16 | 17 | 18 | * How-to Chapter [How to create and maintain secure passwords](https://securityinabox.org/chapter-3)[Secure Passwords] 19 | * How-to Chapter [How to keep your Internet communication private](https://securityinabox.org/chapter-7)[Private Communication] 20 | * How-to Chapter [How to use mobile phones as securely as possible](https://securityinabox.org/chapter-10)[Mobile Phones] 21 | * How-to Chapter [How to use smartphones as securely as possible](https://securityinabox.org/en/chapter-11)[Smartphones] 22 | -------------------------------------------------------------------------------- /hands-on-guides/avast/01-avast-intro.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: avast! 3 | Platform: Microsoft Windows 4 | Need: Anti-malware 5 | Website: http://www.avast.com/ 6 | Download: http://www.avast.com/index#upgrade 7 | Version: 10.0 8 | License: Free Proprietary Software 9 | System_requirements: Microsoft Windows 10 | Admin: false 11 | Alternatives: [Avira AntiVir Personal Edition](http://www.free-av.com/) for Microsoft Windows; [AVG Anti-Virus Free](http://free.avg.com/) for Microsoft Windows; Bitdefender [Antivirus Free Edition](http://www.bitdefender.com/solutions/free.html) 12 | Comment: read 03-avast-premise before installing and using this tool 13 | Group: Synthesis 14 | Title: Introduction 15 | Language: EN 16 | 17 | 18 | **avast!** is a full-featured anti-malware program that detects and removes malware from your computer or removable storage device. Although **avast!** is free for non-commercial use a personal computer, your free copy *must* be registered after installation. If you do not register *avast!* within 30 days, both the software itself and the list of malware that it can recognize will quickly become out of date. 19 | -------------------------------------------------------------------------------- /hands-on-guides/avast/02-avast-wyg.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: avast! 3 | Platform: Microsoft Windows 4 | Need: Anti-malware 5 | Website: http://www.avast.com/ 6 | Download: http://www.avast.com/index#upgrade 7 | Version: 10.0 8 | License: Free Proprietary Software 9 | System_requirements: Microsoft Windows 10 | Admin: false 11 | Alternatives: [Avira AntiVir Personal Edition](http://www.free-av.com/) for Microsoft Windows; [AVG Anti-Virus Free](http://free.avg.com/) for Microsoft Windows; Bitdefender [Antivirus Free Edition](http://www.bitdefender.com/solutions/free.html) 12 | Comment: This file should only be used in connection with the whole hands-on guide; read 03-avast-premise before installing and using this tool 13 | Group: Synthesis 14 | Title: What you will get from this guide 15 | Language: EN 16 | 17 | 18 | * The ability to scan for and remove malware from your computer 19 | * The ability to protect your computer from new malware infections 20 | * The ability to update both *avast!* itself and the list of malware that it can detect and remove 21 | 22 | -------------------------------------------------------------------------------- /hands-on-guides/avast/03-avast-premise.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: avast! 3 | Platform: Microsoft Windows 4 | Need: Anti-malware 5 | Website: http://www.avast.com/ 6 | Download: http://www.avast.com/index#upgrade 7 | Version: 10.0 8 | License: Free Proprietary Software 9 | System_requirements: Microsoft Windows 10 | Admin: false 11 | Alternatives: [Avira AntiVir Personal Edition](http://www.free-av.com/) for Microsoft Windows; [AVG Anti-Virus Free](http://free.avg.com/) for Microsoft Windows; Bitdefender [Antivirus Free Edition](http://www.bitdefender.com/solutions/free.html) 12 | Comment: 13 | Comment: 14 | Group: Basic Usage 15 | Title: Important premise 16 | Language: EN 17 | 18 | 19 | # Things you should know about avast! before you start 20 | 21 | Computer viruses are malicious programs that can destroy files, slow your computer down and use your address book to locate and infect other computers. **avast!** can protect your system against viruses that might infect your computer through downloads from the Internet, email attachments, or transfers from removable media (CDs, DVDs, floppy disks, USB memory sticks, etc). 22 | 23 | - Make sure that you do not have two anti-virus programs installed and running at the same time. If you are currently using a different program and you want to switch to **avast!**, you must first uninstall the other anti-virus program before installing **avast!**. 24 | 25 | - New anti-malware and viruses are being developed all the time. The **avast!** database must be kept up-to-date to effectively protect your computer. 26 | 27 | - Among the more insidious viruses are those which can actually prevent the installation of **avast!**, and/or viruses that **avast!** can fail to detect and delete. In these kinds of situations, fairly advanced methods are required, and some of those are discussed toward the end of this guide. 28 | -------------------------------------------------------------------------------- /hands-on-guides/avast/08-avast-faq.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: avast! 3 | Platform: Microsoft Windows 4 | Need: anti-virus 5 | Website: http://www.avast.com/ 6 | Download: http://files.avast.com/iavs9x/avast_free_antivirus_setup.exe 7 | Version: 10.0 8 | License: Free Proprietary Software 9 | System_requirements: Microsoft Windows 10 | Admin: false 11 | Alternatives: [Avira Free Antivirus](https://www.avira.com/en/avira-free-antivirus) for Microsoft Windows; [AVG Anti-Virus Free](http://free.avg.com/) for Microsoft Windows; Bitdefender [Antivirus Free Edition](http://www.bitdefender.com/solutions/free.html) 12 | Comment: read 03-avast-premise before installing and using this tool 13 | Group: FAQ 14 | Title: FAQ 15 | Language: EN 16 | 17 | 18 | **Q**: *If I have to use a computer in an Internet café that doesn't have a virus cleaner installed on it, how can I be sure that my documents will not be infected?* 19 | 20 | **A**: *Using public computers is always risky as you have no way of knowing what kinds of malicious software may be lurking on them. Avoid using public computers for private or sensitive work unless you have absolutely no other alternative.* 21 | 22 | **Q**: *I have several computers on a network - but a slow Internet connection. How can I download the virus definition updates and share them with all of my computers?* 23 | 24 | **A**: *You can [**download the latest definition updates**](http://www.avast.com/download-update) (*VPS - Virus Protection Software*) from avast! website. Make sure you download updates for your program version. After downloading the update file start it on each computer needing updates* 25 | 26 | **Q**: *What happens to the files in the Virus Chest if I uninstall **avast!?*** 27 | 28 | **A**: *All files in the Virus Chest will be deleted if you uninstall the program* 29 | -------------------------------------------------------------------------------- /hands-on-guides/avast/09-avast-questions.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: avast! 3 | Platform: Microsoft Windows 4 | Need: anti-virus 5 | Website: http://www.avast.com/ 6 | Download: http://files.avast.com/iavs9x/avast_free_antivirus_setup.exe 7 | Version: 10.0 8 | License: Free Proprietary Software 9 | System_requirements: Microsoft Windows 10 | Admin: false 11 | Alternatives: [Avira Free Antivirus](https://www.avira.com/en/avira-free-antivirus) for Microsoft Windows; [AVG Anti-Virus Free](http://free.avg.com/) for Microsoft Windows; Bitdefender [Antivirus Free Edition](http://www.bitdefender.com/solutions/free.html) 12 | Comment: read 03-avast-premise before installing and using this tool 13 | Group: Training 14 | Title: Questions 15 | Language: EN 16 | 17 | 18 | - How can you scan a specific folder for viruses in **avast!**? 19 | - For how many days will an unregistered copy of **avast!** work? 20 | - Is it possible to move a document that is not infected by a virus to the *Virus Chest*? 21 | - What is the difference between deleting a virus and moving it to the *Virus Chest*? 22 | - What is the difference between a boot-time scan and a full-system scan? 23 | 24 | -------------------------------------------------------------------------------- /hands-on-guides/avast/10-avast-required_reading.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: avast! 3 | Platform: Microsoft Windows 4 | Need: anti-virus 5 | Website: http://www.avast.com/ 6 | Download: http://files.avast.com/iavs9x/avast_free_antivirus_setup.exe 7 | Version: 10.0 8 | License: Free Proprietary Software 9 | System_requirements: Microsoft Windows 10 | Admin: false 11 | Alternatives: [Avira Free Antivirus](https://www.avira.com/en/avira-free-antivirus) for Microsoft Windows; [AVG Anti-Virus Free](http://free.avg.com/) for Microsoft Windows; Bitdefender [Antivirus Free Edition](http://www.bitdefender.com/solutions/free.html) 12 | Comment: read 03-avast-premise before installing and using this tool 13 | Group: Required Reading 14 | Title: Required Reading 15 | Language: EN 16 | 17 | 18 | * How-to Chapter [Protecting your Computer from Viruses, Malware and Hackers](https://securityinabox.org/chapter-1)[Malware] 19 | -------------------------------------------------------------------------------- /hands-on-guides/ccleaner/01-ccleaner-intro.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: CCleaner 3 | Platform: Microsoft Windows 4 | Need: Data erasure 5 | Website: https://www.piriform.com/ccleaner 6 | Download: https://www.piriform.com/ccleaner/builds 7 | Version: 4.16 8 | License: Free Proprietary Software 9 | System_requirements: Microsoft Windows 10 | Admin: false 11 | Alternatives: [BleachBit](http://bleachbit.sourceforge.net/) for GNU Linux and Microsoft Windows; Titanium’s Software [OnyX and Maintenance](http://www.titanium.free.fr/) for Mac OS 12 | Comment: read 03-ccleaner-premise before installing and using this tool 13 | Group: Synthesis 14 | Title: Introduction 15 | Language: EN 16 | 17 | 18 | **CCleaner** is an easy-to-use and efficient program, essential to protecting your digital privacy and security. By permanently deleting (or *wiping*) your browser history, cookies, other temporary files created during your work session, as well as free disk space, **CCleaner** limits the ways in which hostile or malicious parties can monitor your work habits and preferences or infect your system. 19 | -------------------------------------------------------------------------------- /hands-on-guides/ccleaner/02-ccleaner-wyg.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: CCleaner 3 | Platform: Microsoft Windows 4 | Need: Data erasure 5 | Website: https://www.piriform.com/ccleaner 6 | Download: https://www.piriform.com/ccleaner/builds 7 | Version: 4.16 8 | License: Free Proprietary Software 9 | System_requirements: Microsoft Windows 10 | Admin: false 11 | Alternatives: [BleachBit](http://bleachbit.sourceforge.net/) for GNU Linux and Microsoft Windows; Titanium’s Software [OnyX and Maintenance](http://www.titanium.free.fr/) for Mac OS 12 | Comment: This file should only be used in connection with the whole hands-on guide; read 03-ccleaner-premise before installing and using this tool 13 | Group: Synthesis 14 | Title: What you will get from this guide 15 | Language: EN 16 | 17 | 18 | * The ability to permanently delete traces of your activities and temporary files stored on your computer. 19 | * The ability to wipe the free space on disks connected to your computer 20 | * The ability to clean up the **Windows Registry** 21 | * The ability to control what programs are run when your computer starts 22 | -------------------------------------------------------------------------------- /hands-on-guides/ccleaner/09-ccleaner-faq.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: CCleaner 3 | Platform: Microsoft Windows 4 | Need: Data erasure 5 | Website: https://www.piriform.com/ccleaner 6 | Download: https://www.piriform.com/ccleaner/builds 7 | Version: 4.16 8 | License: Free Proprietary Software 9 | System_requirements: Microsoft Windows 10 | Admin: false 11 | Alternatives: [BleachBit](http://bleachbit.sourceforge.net/) for GNU Linux and Microsoft Windows; Titanium’s Software [OnyX and Maintenance](http://www.titanium.free.fr/) for Mac OS 12 | Comment: read 03-ccleaner-premise before installing and using this tool 13 | Group: FAQ 14 | Title: FAQ 15 | Language: EN 16 | 17 | 18 | ***Q***: If I uninstall CCleaner, will material deleted previously remain that way?*** 19 | 20 | ***A***: Yes. If you have configured and run **CCleaner** *properly, deleted files will stay deleted - permanently. 21 | 22 | ***Q***: If I copy CCleaner to a USB memory stick, can I use it on a computer in an Internet café to erase traces of my work there? Is there any reason I cannot use it this way? 23 | 24 | ***A***: Yes! There is a [portable version of **CCleaner**](https://securityinabox.org/ccleaner_portable)[CCleaner Portable]. If the Internet café you are working at lets you run programs from a USB memory stick, then yes, you can use the portable version of **CCleaner** to erase traces of your having worked there. However, do keep in mind that you could be monitored at the Internet café. Also, you may run the risk of infection by connecting your USB memory stick to the computer at the Internet café. 25 | 26 | ***Q***: If I only use one pass of CCleaner, will it be possible for somebody to recover my data? What about if I use 7 passes? 27 | 28 | ***A***: The more passes used for wiping data, the less chance anyone has of recovering that data. However, increasing the number of passes used in wiping data also increases the length of the wiping process. 29 | 30 | ***Q***: Is cleaning the Windows Registry sufficient for removing all obvious signs of my having temporarily installed and used certain programs on my computer? 31 | 32 | ***A***: Ideally, you should delete all the files related to this program, use **CCleaner** to delete temporary files, clean the **Windows Registry** and wipe a free space on the disk to remove all traces of software and the tasks you performed with it. 33 | -------------------------------------------------------------------------------- /hands-on-guides/ccleaner/10-ccleaner-questions.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: CCleaner 3 | Platform: Microsoft Windows 4 | Need: Data erasure 5 | Website: https://www.piriform.com/ccleaner 6 | Download: https://www.piriform.com/ccleaner/builds 7 | Version: 4.16 8 | License: Free Proprietary Software 9 | System_requirements: Microsoft Windows 10 | Admin: false 11 | Alternatives: [BleachBit](http://bleachbit.sourceforge.net/) for GNU Linux and Microsoft Windows; Titanium’s Software [OnyX and Maintenance](http://www.titanium.free.fr/) for Mac OS 12 | Comment: read 03-ccleaner-premise before installing and using this tool 13 | Group: Training 14 | Title: Review questions 15 | Language: EN 16 | 17 | 18 | - What kind of information does **CCleaner** remove from your computer? 19 | - How does it do this? 20 | - What difference does the number of passes you choose make when you securely overwrite your data? 21 | - What is the **Windows Registry**, and why are you recommended to clean it? 22 | - What should you do before you clean the **Windows Registry**? 23 | -------------------------------------------------------------------------------- /hands-on-guides/ccleaner/11-ccleaner-required_reading.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: CCleaner 3 | Platform: Microsoft Windows 4 | Need: Data erasure 5 | Website: https://www.piriform.com/ccleaner 6 | Download: https://www.piriform.com/ccleaner/builds 7 | Version: 4.16 8 | License: Free Proprietary Software 9 | System_requirements: Microsoft Windows 10 | Admin: false 11 | Alternatives: [BleachBit](http://bleachbit.sourceforge.net/) for GNU Linux and Microsoft Windows; Titanium’s Software [OnyX and Maintenance](http://www.titanium.free.fr/) for Mac OS 12 | Comment: read 03-ccleaner-premise before installing and using this tool 13 | Group: Required Reading 14 | Title: Required Reading 15 | Language: EN 16 | 17 | 18 | * How-to Chapter [How to Destroy Sensitive Information](https://securityinabox.org/chapter-6)[Sensitive Information] 19 | -------------------------------------------------------------------------------- /hands-on-guides/chatsecure/01-chatsecure-intro.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: ChatSecure 3 | Platform: Google Android 4 | Need: Secure and anonymous chat 5 | Website: https://guardianproject.info/apps/chatsecure 6 | Download: https://play.google.com/store/apps/details?id=info.guardianproject.otr.app.im 7 | Version: Gibberbot 0.0.9-RC4 8 | License: Free/Open Source Software 9 | System_requirements: Android 1.6 or higher 10 | Admin: false 11 | Alternatives: 12 | Comment: read 03-chatsecure-premise before installing and using this tool 13 | Group: Synthesis 14 | Title: Introduction 15 | Language: EN 16 | 17 | 18 | **Gibberbot** is a free and open source application for Android devices, created by the [Guardian Project](https://guardianproject.info/), that lets you organize and manage your different Instant Messaging (IM) accounts using a single interface. It uses [**Off-the-Record (OTR)**](https://securityinabox.org/glossary#OTR)[Glossary #OTR] software which ensures authenticated and secure communications between clients including **Gibberbot**, **ChatSecure**, **Jitsi**, and [**Pidgin**](https://securityinabox.org/glossary#Pidgin)[Glossary #Pidgin]. **Gibberbot** can also add a layer of anonymity and protect your communications from many forms of Internet surveillance by connecting through [**Orbot**](https://securityinabox.org/glossary#orbot)[Glossary #Orbot], which allows your smartphone's internet traffic to be routed through the [**Tor network**](https://securityinabox.org/glossary#Tor)[Glossary #Tor]. 19 | -------------------------------------------------------------------------------- /hands-on-guides/chatsecure/02-chatsecure-wyg.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: ChatSecure 3 | Platform: Google Android 4 | Need: Secure and anonymous chat 5 | Website: https://guardianproject.info/apps/chatsecure 6 | Download: https://play.google.com/store/apps/details?id=info.guardianproject.otr.app.im 7 | Version: Gibberbot 0.0.9-RC4 8 | License: Free/Open Source Software 9 | System_requirements: Android 1.6 or higher 10 | Admin: false 11 | Alternatives: 12 | Comment: This file should only be used in connection with the whole hands-on guide; read 03-chatsecure-premise before installing and using this tool 13 | Group: Synthesis 14 | Title: What you will get from this guide 15 | Language: EN 16 | 17 | 18 | * The ability to **chat securely and anonymously** on your Android device 19 | -------------------------------------------------------------------------------- /hands-on-guides/chatsecure/03-chatsecure-premise.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: ChatSecure 3 | Platform: Google Android 4 | Need: Secure and anonymous chat 5 | Website: https://guardianproject.info/apps/chatsecure 6 | Download: https://play.google.com/store/apps/details?id=info.guardianproject.otr.app.im 7 | Version: Gibberbot 0.0.9-RC4 8 | License: Free/Open Source Software 9 | System_requirements: Android 1.6 or higher 10 | Admin: false 11 | Alternatives: 12 | Comment: read 03-chatsecure-premise before installing and using this tool 13 | Group: Basic Usage 14 | Title: Important premise 15 | Language: EN 16 | 17 | 18 | # Introduction to ChatSecure 19 | 20 | - **Gibberbot** works with Google, Facebook, any Jabber or XMPP servers. 21 | - Instant Messaging service accounts have to be created beforehand. If you would like to create an **IM** account, we strongly recommend **Google Talk**. Please refer to section [**4.0 How to Create a Google Talk Account**](https://securityinabox.org/en/pidgin_furtherinfo)[Pidgin Google Talk] for more information and instructions. 22 | - Special precautions should be taken to maintain anonymity when creating and using IM services. 23 | -------------------------------------------------------------------------------- /hands-on-guides/chatsecure/04-chatsecure-installation.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: ChatSecure 3 | Platform: Google Android 4 | Need: Secure and anonymous chat 5 | Website: https://guardianproject.info/apps/chatsecure 6 | Download: https://play.google.com/store/apps/details?id=info.guardianproject.otr.app.im 7 | Version: Gibberbot 0.0.9-RC4 8 | License: Free/Open Source Software 9 | System_requirements: Android 1.6 or higher 10 | Admin: false 11 | Alternatives: 12 | Comment: read 03-chatsecure-premise before installing and using this tool 13 | Group: Basic Usage 14 | Title: Installation 15 | Language: EN 16 | 17 | 18 | # Install ChatSecure 19 | 20 | ## Step 1 21 | 22 | **Download** the app from the [Google play store](https://play.google.com/store/apps/details?id=info.guardianproject.otr.app.im) 23 | 24 | 25 | ![Gibberbot in the Google Play store](https://securityinabox.org/sbox/screen/gibberbot-en/02.png)[Chatsecure img 01] 26 | 27 | *Figure 1: Gibberbot in the Google Play store* 28 | 29 | ## Step 2 30 | 31 | **Confirm** the permissions required by the app and install the app by tapping the *Install* button 32 | 33 | 34 | ![Permissions and Installation](https://securityinabox.org/sbox/screen/gibberbot-en/03.png)[Chatsecure img 02] ![Permissions and Installation](https://securityinabox.org/sbox/screen/gibberbot-en/04.png)[Chatsecure img 03] 35 | 36 | *Figures 2 and 3: Permissions and Installation* 37 | 38 | ## Step 3 39 | 40 | **Tap** *Open* to run the app for the first time. 41 | -------------------------------------------------------------------------------- /hands-on-guides/chatsecure/05-chatsecure-setup.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: ChatSecure 3 | Platform: Google Android 4 | Need: Secure and anonymous chat 5 | Website: https://guardianproject.info/apps/chatsecure 6 | Download: https://play.google.com/store/apps/details?id=info.guardianproject.otr.app.im 7 | Version: Gibberbot 0.0.9-RC4 8 | License: Free/Open Source Software 9 | System_requirements: Android 1.6 or higher 10 | Admin: false 11 | Alternatives: 12 | Comment: read 03-chatsecure-premise before installing and using this tool 13 | Group: Basic Usage 14 | Title: Configuration 15 | Language: EN 16 | 17 | 18 | # Configure ChatSecure 19 | 20 | ## Step 1 21 | 22 | A drop down selection of languages will appear. **Scroll** and **tap** the language you desire for **Gibberbot**. 23 | 24 | ![Language options](https://securityinabox.org/sbox/screen/gibberbot-en/05.png)[Chatsecure img 04] 25 | 26 | *Figure 4: Language options* 27 | 28 | ## Step 2 29 | 30 | **Tap** *Get Started* and *Next* 3 times to go through the general information about **Gibberbot** 31 | 32 | ![Information about Gibberbot](https://securityinabox.org/sbox/screen/gibberbot-en/06.png)[Chatsecure img 05] ![Information about Gibberbot](https://securityinabox.org/sbox/screen/gibberbot-en/07.png)[Chatsecure img 06] 33 | 34 | ![Information about Gibberbot](https://securityinabox.org/sbox/screen/gibberbot-en/08.png)[Chatsecure img 07] ![](https://securityinabox.org/sbox/screen/gibberbot-en/09.png)[Chatsecure img 08] 35 | 36 | *Figures 5, 6, 7, and 8: Information about Gibberbot* 37 | 38 | ## Step 3 39 | 40 | An account configuration page is shown: 41 | 42 | 43 | ![Account configuration page](https://securityinabox.org/sbox/screen/gibberbot-en/10.png)[Chatsecure img 09] 44 | 45 | *Figure 9: Account configuration page* 46 | 47 | ## Step 4 48 | 49 | **Add** *IM* *user* and *server* data (for example "Joe@gmail.com"), and then **add** your associated password. 50 | 51 | ![Add account details](https://securityinabox.org/sbox/screen/gibberbot-en/11.png)[Chatsecure img 10] 52 | 53 | *Figure 10: Add account details* 54 | 55 | **Note:** Do **not** check *Remember password*, in case you lose your device. 56 | 57 | ## Step 5 58 | 59 | If you have installed and switched on [**Orbot**](https://securityinabox.org/Orbot_main)[Orbot Main], **check** *Connect using Orbot* for anonymity 60 | 61 | ![Connect via Tor](https://securityinabox.org/sbox/screen/gibberbot-en/12.png)[Chatsecure img 11] 62 | 63 | *Figure 11: Connect via Tor option* 64 | 65 | ## Step 6 66 | 67 | **Tap** the *Sign in* button. Once this is done, you are ready to use **Gibberbot** 68 | -------------------------------------------------------------------------------- /hands-on-guides/chatsecure/07-chatsecure-required_reading.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: ChatSecure 3 | Platform: Google Android 4 | Need: Secure and anonymous chat 5 | Website: https://guardianproject.info/apps/chatsecure 6 | Download: https://play.google.com/store/apps/details?id=info.guardianproject.otr.app.im 7 | Version: Gibberbot 0.0.9-RC4 8 | License: Free/Open Source Software 9 | System_requirements: Android 1.6 or higher 10 | Admin: false 11 | Alternatives: 12 | Comment: read 03-chatsecure-premise before installing and using this tool 13 | Group: Required Reading 14 | Title: Required Reading 15 | Language: EN 16 | 17 | 18 | * How-to Chapter [How to remain anonymous and bypass censorship on the Internet](https://securityinabox.org/chapter-8)[Anonymous Browsing] 19 | * How-to Chapter [How to use mobile phones as securely as possible](https://securityinabox.org/chapter-10)[Mobile Phones] 20 | * How-to Chapter [How to use mobile computing devices securely](https://securityinabox.org/en/chapter-11)[Smartphones] 21 | -------------------------------------------------------------------------------- /hands-on-guides/cobian/01-cobian-intro.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Cobian Backup 3 | Platform: Microsoft Windows 4 | Need: Backup 5 | Website: http://www.cobiansoft.com/cobianbackup.htm 6 | Download: http://files.cobiansoft.com/programz/cbSetup10.exe 7 | Version: 10 8 | License: Free Proprietary Software 9 | System_requirements: Microsoft Windows 10 | Admin: false 11 | Alternatives: [Freebyte Backup](http://www.freebyte.com/fbbackup/) for Microsoft Windows; [Unison File Synchronizer](http://www.cis.upenn.edu/~bcpierce/unison/) for Microsoft Windows, Mac OS, and GNU/Linux; [Allway Sync](http://allwaysync.com/) for Microsoft Windows; [FreeFileSync](http://freefilesync.sourceforge.net/) for GNU/Linux and Microsoft Windows; [Time Machine](https://secure.wikimedia.org/wikipedia/en/wiki/Time_Machine_%28Mac_OS%29) included with Mac OS (version 10.5 and up) 12 | Comment: 13 | Group: Synthesis 14 | Title: Introduction 15 | Language: EN 16 | 17 | 18 | **Cobian Backup** is used for creating archives of your digital files. They can be stored on your computer, office network, removable devices or Internet servers. 19 | 20 | **Cobian Backup** is used to archive, (or to make a backup copy) of your files and directories. Backups can be stored in other directories or drives on your computer, other computers on the office network, or on removable devices (CDs, DVDs and USB memory sticks). **Cobian Backup** lets you archive your directories and files on a regular basis. It works silently in the background on your system (that is, in the system tray), checking your schedule and executing the backup process when necessary. **Cobian Backup** can also compress and encrypt files as it generates the backup file. 21 | -------------------------------------------------------------------------------- /hands-on-guides/cobian/02-cobian-wyg.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Cobian Backup 3 | Platform: Microsoft Windows 4 | Need: Backup 5 | Website: http://www.cobiansoft.com/cobianbackup.htm 6 | Download: http://files.cobiansoft.com/programz/cbSetup10.exe 7 | Version: 10 8 | License: Free Proprietary Software 9 | System_requirements: Microsoft Windows 10 | Admin: false 11 | Alternatives: [Freebyte Backup](http://www.freebyte.com/fbbackup/) for Microsoft Windows; [Unison File Synchronizer](http://www.cis.upenn.edu/~bcpierce/unison/) for Microsoft Windows, Mac OS, and GNU/Linux; [Allway Sync](http://allwaysync.com/) for Microsoft Windows; [FreeFileSync](http://freefilesync.sourceforge.net/) for GNU/Linux and Microsoft Windows; [Time Machine](https://secure.wikimedia.org/wikipedia/en/wiki/Time_Machine_%28Mac_OS%29) included with Mac OS (version 10.5 and up) 12 | Comment: This file should only be used in connection with the whole hands-on guide 13 | Group: Synthesis 14 | Title: What you will get from this guide 15 | Language: EN 16 | 17 | 18 | * The ability to back up all documents, files and folders 19 | * The ability to compress and decompress your backup files 20 | * The ability to encrypt and decrypt your archived files 21 | -------------------------------------------------------------------------------- /hands-on-guides/cobian/06-cobian-questions.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Cobian Backup 3 | Platform: Microsoft Windows 4 | Need: Backup 5 | Website: http://www.cobiansoft.com/cobianbackup.htm 6 | Download: http://files.cobiansoft.com/programz/cbSetup10.exe 7 | Version: 10 8 | License: Free Proprietary Software 9 | System_requirements: Microsoft Windows 10 | Admin: false 11 | Alternatives: [Freebyte Backup](http://www.freebyte.com/fbbackup/) for Microsoft Windows; [Unison File Synchronizer](http://www.cis.upenn.edu/~bcpierce/unison/) for Microsoft Windows, Mac OS, and GNU/Linux; [Allway Sync](http://allwaysync.com/) for Microsoft Windows; [FreeFileSync](http://freefilesync.sourceforge.net/) for GNU/Linux and Microsoft Windows; [Time Machine](https://secure.wikimedia.org/wikipedia/en/wiki/Time_Machine_%28Mac_OS%29) included with Mac OS (version 10.5 and up) 12 | Comment: 13 | Group: Training 14 | Title: Review questions 15 | Language: EN 16 | 17 | 18 | - What is the difference between an incremental and a differential backup? 19 | - What is the best way to secure your backup? 20 | - How can you fit a 1GB backup onto a CD disk? 21 | - How can you restore just one file from a backup? 22 | - Is it possible to create an automated task for your computer to update the weekly backup every Friday afternoon? How do you do it? 23 | -------------------------------------------------------------------------------- /hands-on-guides/cobian/07-cobian-required_reading.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Cobian Backup 3 | Platform: Microsoft Windows 4 | Need: Backup 5 | Website: http://www.cobiansoft.com/cobianbackup.htm 6 | Download: http://files.cobiansoft.com/programz/cbSetup10.exe 7 | Version: 10 8 | License: Free Proprietary Software 9 | System_requirements: Microsoft Windows 10 | Admin: false 11 | Alternatives: [Freebyte Backup](http://www.freebyte.com/fbbackup/) for Microsoft Windows; [Unison File Synchronizer](http://www.cis.upenn.edu/~bcpierce/unison/) for Microsoft Windows, Mac OS, and GNU/Linux; [Allway Sync](http://allwaysync.com/) for Microsoft Windows; [FreeFileSync](http://freefilesync.sourceforge.net/) for GNU/Linux and Microsoft Windows; [Time Machine](https://secure.wikimedia.org/wikipedia/en/wiki/Time_Machine_%28Mac_OS%29) included with Mac OS (version 10.5 and up) 12 | Comment: 13 | Group: Required Reading 14 | Title: Required Reading 15 | Language: EN 16 | 17 | 18 | * How-to Chapter [How to Recover from Information Loss](https://securityinabox.org/chapter-5)[Information Loss] 19 | -------------------------------------------------------------------------------- /hands-on-guides/comodo/01-comodo-intro.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Comodo 3 | Platform: Microsoft Windows 4 | Need: Firewall 5 | Website: https://personalfirewall.comodo.com/ 6 | Download: https://download.comodo.com/cis/download/installs/2000/partners/cfw_installer_5732_83.exe 7 | Version: 5.7.32 8 | License: Free Proprietary Software 9 | System_requirements: Microsoft Windows 10 | Admin: true 11 | Alternatives: GNU/Linux built-in firewall -- [netfilter/iptables](http://www.netfilter.org/) with [GUFW](http://blog.bodhizazen.net/linux/firewall-ubuntu-gufw/) (Graphical Uncomplicated Firewall); Mac OS internal firewall, with interface add-ons [NoobProof](http://www.hanynet.com/noobproof/) and [IPSecuritas](http://www.lobotomo.com/products/IPSecuritas/); [ZoneAlarm Free Firewall](http://www.zonealarm.com/security/en-us/zonealarm-pc-security-free-firewall.htm) for Microsoft Windows; [Outpost Firewall Free](http://free.agnitum.com/) for Microsoft Windows 12 | Comment: read 03-comodo-premise before installing and using this tool 13 | Group: Synthesis 14 | Title: Introduction 15 | Language: EN 16 | 17 | 18 | **COMODO Firewall** is a full featured and renowned firewall, free for personal use. It helps to protect your computer from unauthorised connections to and from the Internet. This chapter is designed to address the needs of both the **Beginner** and **Advanced** user. 19 | -------------------------------------------------------------------------------- /hands-on-guides/comodo/02-comodo-wyg.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Comodo 3 | Platform: Microsoft Windows 4 | Need: Firewall 5 | Website: https://personalfirewall.comodo.com/ 6 | Download: https://download.comodo.com/cis/download/installs/2000/partners/cfw_installer_5732_83.exe 7 | Version: 5.7.32 8 | License: Free Proprietary Software 9 | System_requirements: Microsoft Windows 10 | Admin: true 11 | Alternatives: GNU/Linux built-in firewall -- [netfilter/iptables](http://www.netfilter.org/) with [GUFW](http://blog.bodhizazen.net/linux/firewall-ubuntu-gufw/) (Graphical Uncomplicated Firewall); Mac OS internal firewall, with interface add-ons [NoobProof](http://www.hanynet.com/noobproof/) and [IPSecuritas](http://www.lobotomo.com/products/IPSecuritas/); [ZoneAlarm Free Firewall](http://www.zonealarm.com/security/en-us/zonealarm-pc-security-free-firewall.htm) for Microsoft Windows; [Outpost Firewall Free](http://free.agnitum.com/) for Microsoft Windows 12 | Comment: This file should only be used in connection with the whole hands-on guide; read 03-comodo-premise before installing and using this tool 13 | Group: Synthesis 14 | Title: What you will get from this guide 15 | Language: EN 16 | 17 | 18 | * The ability to effectively and efficiently protect your computer and network security from hostile parties, Internet hackers, malware, viruses and other software or system threats 19 | * The ability to manage all requests made by programs residing on your computer when accessing the Internet, through an easily configurable software interface 20 | -------------------------------------------------------------------------------- /hands-on-guides/comodo/03-comodo-premise.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Comodo 3 | Platform: Microsoft Windows 4 | Need: Firewall 5 | Website: https://personalfirewall.comodo.com/ 6 | Download: https://download.comodo.com/cis/download/installs/2000/partners/cfw_installer_5732_83.exe 7 | Version: 5.7.32 8 | License: Free Proprietary Software 9 | System_requirements: Microsoft Windows 10 | Admin: true 11 | Alternatives: GNU/Linux built-in firewall -- [netfilter/iptables](http://www.netfilter.org/) with [GUFW](http://blog.bodhizazen.net/linux/firewall-ubuntu-gufw/) (Graphical Uncomplicated Firewall); Mac OS internal firewall, with interface add-ons [NoobProof](http://www.hanynet.com/noobproof/) and [IPSecuritas](http://www.lobotomo.com/products/IPSecuritas/); [ZoneAlarm Free Firewall](http://www.zonealarm.com/security/en-us/zonealarm-pc-security-free-firewall.htm) for Microsoft Windows; [Outpost Firewall Free](http://free.agnitum.com/) for Microsoft Windows 12 | Comment: 13 | Group: Basic Usage 14 | Title: Important premise 15 | Language: EN 16 | 17 | 18 | # Things you should know about Comodo before you start 19 | 20 | A firewall acts like a doorman or guard for your computer. It has a set of rules about what information should be let in and what information should be let out of your computer. A firewall is the first program that receives and analyses incoming information from the Internet and the last program that scans outgoing information to the Internet. 21 | 22 | It prevents hackers or other intruders from accessing personal information stored on your computer, and prevents malware programs from sending information to the Internet without your authorisation. **COMODO Firewall** is a well-known and respected firewall software. It is free software, which means you can use it without purchasing a license. 23 | 24 | Running a custom firewall program may initially require considerable time and effort to ensure that all the settings are correct and suited to the way you use your computer. After an initial learning period, the firewall will work seamlessly, requiring minimal intervention on your part. 25 | 26 | **Warning**!: Never access the Internet without a firewall installed and running on your computer! Even if your Internet modem or router has its own firewall, it is strongly recommended that you have one installed on your computer as well. 27 | -------------------------------------------------------------------------------- /hands-on-guides/comodo/08-comodo-questions.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Comodo 3 | Platform: Microsoft Windows 4 | Need: Firewall 5 | Website: https://personalfirewall.comodo.com/ 6 | Download: https://download.comodo.com/cis/download/installs/2000/partners/cfw_installer_5732_83.exe 7 | Version: 5.7.32 8 | License: Free Proprietary Software 9 | System_requirements: Microsoft Windows 10 | Admin: true 11 | Alternatives: GNU/Linux built-in firewall -- [netfilter/iptables](http://www.netfilter.org/) with [GUFW](http://blog.bodhizazen.net/linux/firewall-ubuntu-gufw/) (Graphical Uncomplicated Firewall); Mac OS internal firewall, with interface add-ons [NoobProof](http://www.hanynet.com/noobproof/) and [IPSecuritas](http://www.lobotomo.com/products/IPSecuritas/); [ZoneAlarm Free Firewall](http://www.zonealarm.com/security/en-us/zonealarm-pc-security-free-firewall.htm) for Microsoft Windows; [Outpost Firewall Free](http://free.agnitum.com/) for Microsoft Windows 12 | Comment: read 03-comodo-premise before installing and using this tool 13 | Group: Training 14 | Title: Review questions 15 | Language: EN 16 | 17 | 18 | - Can you use more than one firewall at once? 19 | - How would you check if a program you're unfamiliar with is safe enough to allow onto your computer? 20 | - How does a firewall work? 21 | - What is the difference between a firewall and a host intrusion prevention system? 22 | - Why do you need to install a firewall? 23 | -------------------------------------------------------------------------------- /hands-on-guides/comodo/09-comodo-required_reading.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Comodo 3 | Platform: Microsoft Windows 4 | Need: Firewall 5 | Website: https://personalfirewall.comodo.com/ 6 | Download: https://download.comodo.com/cis/download/installs/2000/partners/cfw_installer_5732_83.exe 7 | Version: 5.7.32 8 | License: Free Proprietary Software 9 | System_requirements: Microsoft Windows 10 | Admin: true 11 | Alternatives: GNU/Linux built-in firewall -- [netfilter/iptables](http://www.netfilter.org/) with [GUFW](http://blog.bodhizazen.net/linux/firewall-ubuntu-gufw/) (Graphical Uncomplicated Firewall); Mac OS internal firewall, with interface add-ons [NoobProof](http://www.hanynet.com/noobproof/) and [IPSecuritas](http://www.lobotomo.com/products/IPSecuritas/); [ZoneAlarm Free Firewall](http://www.zonealarm.com/security/en-us/zonealarm-pc-security-free-firewall.htm) for Microsoft Windows; [Outpost Firewall Free](http://free.agnitum.com/) for Microsoft Windows 12 | Comment: read 03-comodo-premise before installing and using this tool 13 | Group: Required Reading 14 | Title: Required Reading 15 | Language: EN 16 | 17 | 18 | * Required_reading: [How to Protect your Computer from Viruses, Malware and Hackers](https://securityinabox.org/chapter-1)[Malware] 19 | -------------------------------------------------------------------------------- /hands-on-guides/crabgrass/01-crabgrass-intro.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Crabgrass 3 | Platform: Social Networks 4 | Need: Secure online collaboration platform 5 | Website: https://we.riseup.net/ 6 | Download: 7 | Version: Crabgrass version 0.5.3.2 8 | License: [GNU Affero General Public License (AGPL)](http://www.gnu.org/licenses/agpl-3.0.html) 9 | System_requirements: An Internet connection; Any web browser 10 | Admin: false 11 | Alternatives: 12 | Comment: 13 | Group: Synthesis 14 | Title: Introduction 15 | Language: EN 16 | 17 | 18 | Crabgrass is a secure web-based organising tool specifically designed for activists 19 | -------------------------------------------------------------------------------- /hands-on-guides/crabgrass/02-crabgrass-wyg.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Crabgrass 3 | Platform: Social Networks 4 | Need: Secure online collaboration platform 5 | Website: https://we.riseup.net/ 6 | Download: 7 | Version: Crabgrass version 0.5.3.2 8 | License: [GNU Affero General Public License (AGPL)](http://www.gnu.org/licenses/agpl-3.0.html) 9 | System_requirements: An Internet connection; Any web browser 10 | Admin: false 11 | Alternatives: 12 | Comment: This file should only be used in connection with the whole hands-on guide 13 | Group: Synthesis 14 | Title: What you will get from this guide 15 | Language: EN 16 | 17 | 18 | * A social networking tool tailored specifically to meet the needs of bottom up grassroots organising 19 | * The ability to collaborate online as a group and share files, track tasks and projects, make decisions and build repositories of shared knowledge 20 | * The ability of multiple groups to work together on projects in a democratic manner 21 | * The option to publish or hide certain pages 22 | -------------------------------------------------------------------------------- /hands-on-guides/crabgrass/06-crabgrass-required_reading.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Crabgrass 3 | Platform: Social Networks 4 | Need: Secure online collaboration platform 5 | Website: https://we.riseup.net/ 6 | Download: 7 | Version: Crabgrass version 0.5.3.2 8 | License: [GNU Affero General Public License (AGPL)](http://www.gnu.org/licenses/agpl-3.0.html) 9 | System_requirements: An Internet connection; Any web browser 10 | Admin: false 11 | Alternatives: 12 | Comment: 13 | Group: Required Reading 14 | Title: Required Reading 15 | Language: EN 16 | 17 | 18 | * How-to Chapter [Keeping your Internet Communication Private](https://securityinabox.org/chapter-7)[Private Communication] 19 | * How-to Chapter [How to protect yourself and your data when using social networking sites](https://securityinabox.org/chapter-9)[Social Networks] 20 | -------------------------------------------------------------------------------- /hands-on-guides/cryptonite/01-cryptonite-intro.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Cryptonite 3 | Platform: Google Android 4 | Need: File Encryption 5 | Website: https://code.google.com/p/cryptonite/ 6 | Download: https://play.google.com/store/apps/details?id=csh.cryptonite&hl=en 7 | Version: 0.7.6 8 | License: Free/Open Source Software 9 | System_requirements: Android 2.2 or higher 10 | Admin: false 11 | Alternatives: 12 | Comment: read 03-cryptonite-premise before installing and using this tool 13 | Group: Synthesis 14 | Title: Introduction 15 | Language: EN 16 | 17 | 18 | **Cryptonite** is a free and open source application for Android devices, created by the [Christoph Schmidthieber](https://code.google.com/p/cryptonite/). It is based on EncFS and TrueCrypt. You can browse, export and open EncFS-encrypted directories and files on your phone, and it supports it on your Dropbox, too. On rooted phones that support FUSE (e.g. CyanogenMod) you can also mount EncFS and TrueCrypt volumes. TrueCrypt is only available as a command-line version at this time. It can be used to store encrypted files. 19 | -------------------------------------------------------------------------------- /hands-on-guides/cryptonite/02-cryptonite-wyg.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Cryptonite 3 | Platform: Google Android 4 | Need: File Encryption 5 | Website: https://code.google.com/p/cryptonite/ 6 | Download: https://play.google.com/store/apps/details?id=csh.cryptonite&hl=en 7 | Version: 0.7.6 8 | License: Free/Open Source Software 9 | System_requirements: Android 2.2 or higher 10 | Admin: false 11 | Alternatives: 12 | Comment: This file should only be used in connection with the whole hands-on guide; read 03-cryptonite-premise before installing and using this tool 13 | Group: Synthesis 14 | Title: What you will get from this guide 15 | Language: EN 16 | 17 | 18 | * The ability to **encrypt** and **decrypt** files locally on your device or on Dropbox or similar services. 19 | -------------------------------------------------------------------------------- /hands-on-guides/cryptonite/03-cryptonite-premise.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Cryptonite 3 | Platform: Google Android 4 | Need: File Encryption 5 | Website: https://code.google.com/p/cryptonite/ 6 | Download: https://play.google.com/store/apps/details?id=csh.cryptonite&hl=en 7 | Version: 0.7.6 8 | License: Free/Open Source Software 9 | System_requirements: Android 2.2 or higher 10 | Admin: false 11 | Alternatives: 12 | Comment: 13 | Group: Basic Usage 14 | Title: Important premise 15 | Language: EN 16 | 17 | 18 | # Introduction to Cryptonite 19 | 20 | - **Cryptonite** is still under development and future versions might have more features. 21 | - It is not advisable to use its *export* function to Dropbox, since Dropbox is not a privacy aware service. 22 | - All TrueCrypt features are only available if you run Cyanogenmod firmware. Without it, you also can not mount and unmount encrypted folders, but only specific files. 23 | -------------------------------------------------------------------------------- /hands-on-guides/cryptonite/04-cryptonite-installation.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Cryptonite 3 | Platform: Google Android 4 | Need: File Encryption 5 | Website: https://code.google.com/p/cryptonite/ 6 | Download: https://play.google.com/store/apps/details?id=csh.cryptonite&hl=en 7 | Version: 0.7.6 8 | License: Free/Open Source Software 9 | System_requirements: Android 2.2 or higher 10 | Admin: false 11 | Alternatives: 12 | Comment: read 03-cryptonite-premise before installing and using this tool 13 | Group: Basic Usage 14 | Title: Installation 15 | Language: EN 16 | 17 | 18 | # Install Cryptonite 19 | 20 | ## Step 1 21 | 22 | **Download** the app from the [Google play store](https://play.google.com/store/apps/details?id=csh.cryptonite) 23 | 24 | ![Cryptonite in the Google Play store](https://securityinabox.org/sbox/screen/cryptonite-en/01.png)[Cryptonite img 01] 25 | 26 | *Figure 1: Cryptonite in the Google Play store* 27 | 28 | ## Step 2 29 | 30 | **Read** carefully the permissions required by the app and install it by tapping the **Install** button. 31 | 32 | 33 | ![Permissions required](https://securityinabox.org/sbox/screen/cryptonite-en/02.png)[Cryptonite img 02] ![Installation](https://securityinabox.org/sbox/screen/cryptonite-en/03.png)[Cryptonite img 03] 34 | 35 | *Figure 2 and 3: Permissions required and installation* 36 | 37 | ## Step 3 38 | 39 | **Tap** *Open* to run the app for the first time. 40 | 41 | ![App installed](https://securityinabox.org/sbox/screen/cryptonite-en/04.png)[Cryptonite img 04] 42 | 43 | *Figure 4: App installed* 44 | 45 | ## Step 4 46 | 47 | A message will appear as shown below, **read** it carefully and **click** on *I understand*. 48 | 49 | ![Warning concerning development status](https://securityinabox.org/sbox/screen/cryptonite-en/05.png)[Cryptonite img 05] 50 | 51 | *Figure 5: Warning concerning development status* 52 | 53 | ## Step 5 54 | 55 | In the *Preferences* tab, make sure *Use external storage* is *not* activated. 56 | 57 | ![Preferences](https://securityinabox.org/sbox/screen/cryptonite-en/27.png)[Cryptonite img 06] ![Preferences](https://securityinabox.org/sbox/screen/cryptonite-en/28.png)[Cryptonite img 07] 58 | 59 | *Figure 6 and 7: Preferences* 60 | -------------------------------------------------------------------------------- /hands-on-guides/cryptonite/06-cryptonite-required_reading.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Cryptonite 3 | Platform: Google Android 4 | Need: File Encryption 5 | Website: https://code.google.com/p/cryptonite/ 6 | Download: https://play.google.com/store/apps/details?id=csh.cryptonite&hl=en 7 | Version: 0.7.6 8 | License: Free/Open Source Software 9 | System_requirements: Android 2.2 or higher 10 | Admin: false 11 | Alternatives: 12 | Comment: read 03-cryptonite-premise before installing and using this tool 13 | Group: Required Reading 14 | Title: Required Reading 15 | Language: EN 16 | 17 | 18 | * How-to Chapter [How to remain anonymous and bypass censorship on the Internet](https://securityinabox.org/chapter-8)[Anonymous Browsing] 19 | * How-to Chapter [How to use mobile phones as securely as possible](https://siabnext.ttc.io/how-to-guide/mobile-phones)[Mobile Phones] 20 | * How-to Chapter [How to use mobile computing devices securely](https://siabnext.ttc.io/how-to-guide/smartphones)[Smartphones] 21 | -------------------------------------------------------------------------------- /hands-on-guides/eraser/01-eraser-intro.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Eraser 3 | Platform: Microsoft Windows 4 | Need: Secure file deletion 5 | Website: http://eraser.heidi.ie/ 6 | Download: https://securityinabox.org/sbox/programs/EraserSetup32.exe 7 | Version: 5.86a; Although you may find newer versions of Eraser on the developers' website, they are not included here, as they require the installation of the .Net Framework on your Microsoft Windows. Downloading the .Net Framework may take a very long for users with low bandwith 8 | License: Free/Open Source Software 9 | System_requirements: Microsoft Windows 10 | Admin: false 11 | Alternatives: [secure-delete](http://www.ghacks.net/2010/08/26/securely-delete-files-with-secure-delete/) (command line tools) for GNU Linux; secure-delete [integrated with a graphical file manager](http://techthrob.com/2010/07/07/adding-a-secure-delete-option-to-nautilus-file-manager-in-linux/) for GNU Linux; Finder menu Secure Empty Trash... on Mac OS; Disk Utility to securely erase entire disk or a free space on internal or external disks on Mac OS; [CCleaner](https://securityinabox.org/ccleaner_main)[CCleaner Main] for Microsoft Windows; [Freeraser](http://www.freeraser.com/) for Microsoft Windows; [DBAN - Darik's Boot And Nuke](http://www.dban.org/) for bulk or emergency data destruction 12 | Comment: read 03-eraser-premise before installing and using this tool 13 | Group: Synthesis 14 | Title: Introduction 15 | Language: EN 16 | 17 | 18 | **Eraser** is used to permanently delete sensitive data. It can also clean a digital storage device of all recoverable data. 19 | -------------------------------------------------------------------------------- /hands-on-guides/eraser/02-eraser-wyg.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Eraser 3 | Platform: Microsoft Windows 4 | Need: Secure file deletion 5 | Website: http://eraser.heidi.ie/ 6 | Download: https://securityinabox.org/sbox/programs/EraserSetup32.exe 7 | Version: 5.86a; Although you may find newer versions of Eraser on the developers' website, they are not included here, as they require the installation of the .Net Framework on your Microsoft Windows. Downloading the .Net Framework may take a very long for users with low bandwith 8 | License: Free/Open Source Software 9 | System_requirements: Microsoft Windows 10 | Admin: false 11 | Alternatives: [secure-delete](http://www.ghacks.net/2010/08/26/securely-delete-files-with-secure-delete/) (command line tools) for GNU Linux; secure-delete [integrated with a graphical file manager](http://techthrob.com/2010/07/07/adding-a-secure-delete-option-to-nautilus-file-manager-in-linux/) for GNU Linux; Finder menu Secure Empty Trash... on Mac OS; Disk Utility to securely erase entire disk or a free space on internal or external disks on Mac OS; [CCleaner](https://securityinabox.org/ccleaner_main)[CCleaner Main] for Microsoft Windows; [Freeraser](http://www.freeraser.com/) for Microsoft Windows; [DBAN - Darik's Boot And Nuke](http://www.dban.org/) for bulk or emergency data destruction 12 | Comment: This file should only be used in connection with the whole hands-on guide; read 03-eraser-premise before installing and using this tool 13 | Group: Synthesis 14 | Title: What you will get from this guide 15 | Language: EN 16 | 17 | 18 | * The ability to permanently delete unwanted files from your computer 19 | * The ability to delete all recoverable files that are currently invisible on your computer 20 | -------------------------------------------------------------------------------- /hands-on-guides/eraser/09-eraser-questions.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Eraser 3 | Platform: Microsoft Windows 4 | Need: Secure file deletion 5 | Website: http://eraser.heidi.ie/ 6 | Download: https://securityinabox.org/sbox/programs/EraserSetup32.exe 7 | Version: 5.86a; Although you may find newer versions of Eraser on the developers' website, they are not included here, as they require the installation of the .Net Framework on your Microsoft Windows. Downloading the .Net Framework may take a very long for users with low bandwith 8 | License: Free/Open Source Software 9 | System_requirements: Microsoft Windows 10 | Admin: false 11 | Alternatives: [secure-delete](http://www.ghacks.net/2010/08/26/securely-delete-files-with-secure-delete/) (command line tools) for GNU Linux; secure-delete [integrated with a graphical file manager](http://techthrob.com/2010/07/07/adding-a-secure-delete-option-to-nautilus-file-manager-in-linux/) for GNU Linux; Finder menu Secure Empty Trash... on Mac OS; Disk Utility to securely erase entire disk or a free space on internal or external disks on Mac OS; [CCleaner](https://securityinabox.org/ccleaner_main)[CCleaner Main] for Microsoft Windows; [Freeraser](http://www.freeraser.com/) for Microsoft Windows; [DBAN - Darik's Boot And Nuke](http://www.dban.org/) for bulk or emergency data destruction 12 | Comment: read 03-eraser-premise before installing and using this tool 13 | Group: Training 14 | Title: Review questions 15 | Language: EN 16 | 17 | 18 | - What kind of information does **Eraser** delete from your computer? 19 | - What do we mean when we talk about 'deleting unused space'? 20 | - How does **Eraser** wipe your data? 21 | - What is the minimum number of passes that we recommend you set **Eraser** to make? 22 | - How do you set minimum number of passes in **Eraser**? 23 | - How do you schedule **Eraser** to operate at a specific time? 24 | - How do you delete sub folders within a folder? 25 | - How do you delete several files at once? 26 | -------------------------------------------------------------------------------- /hands-on-guides/eraser/10-eraser-required_reading.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Eraser 3 | Platform: Microsoft Windows 4 | Need: Secure file deletion 5 | Website: http://eraser.heidi.ie/ 6 | Download: https://securityinabox.org/sbox/programs/EraserSetup32.exe 7 | Version: 5.86a; Although you may find newer versions of Eraser on the developers' website, they are not included here, as they require the installation of the .Net Framework on your Microsoft Windows. Downloading the .Net Framework may take a very long for users with low bandwith 8 | License: Free/Open Source Software 9 | System_requirements: Microsoft Windows 10 | Admin: false 11 | Alternatives: [secure-delete](http://www.ghacks.net/2010/08/26/securely-delete-files-with-secure-delete/) (command line tools) for GNU Linux; secure-delete [integrated with a graphical file manager](http://techthrob.com/2010/07/07/adding-a-secure-delete-option-to-nautilus-file-manager-in-linux/) for GNU Linux; Finder menu Secure Empty Trash... on Mac OS; Disk Utility to securely erase entire disk or a free space on internal or external disks on Mac OS; [CCleaner](https://securityinabox.org/ccleaner_main)[CCleaner Main] for Microsoft Windows; [Freeraser](http://www.freeraser.com/) for Microsoft Windows; [DBAN - Darik's Boot And Nuke](http://www.dban.org/) for bulk or emergency data destruction 12 | Comment: read 03-eraser-premise before installing and using this tool 13 | Group: Required Reading 14 | Title: Required Reading 15 | Language: EN 16 | 17 | 18 | * Required_reading: How-to Chapter [How to destroy sensitive information](https://securityinabox.org/chapter-6)[Sensitive Information] 19 | -------------------------------------------------------------------------------- /hands-on-guides/facebook-security/01-facebook-security-intro.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Facebook 3 | Platform: Social Networks 4 | Need: Social networking 5 | Website: https://www.facebook.com/ 6 | Download: 7 | Version: N/A 8 | License: Proprietary Software 9 | System_requirements: Web browser; Internet connection 10 | Admin: 11 | Alternatives: [Diaspora](http://joindiaspora.com/); [Crabgrass](https://securityinabox.org/en/context/01/crabgrass-online-collaboration)[Crabgrass Main]; [Friendica](http://friendica.com/); [Pidder](https://pidder.com/); [SecureShare](http://secushare.org/) 12 | Comment: read 03-facebook-security-premise before using this tool 13 | Group: Synthesis 14 | Title: Introduction 15 | Language: EN 16 | 17 | 18 | **Facebook** is a popular social networking website whose almost universal accessibility means knowledge and control of its privacy settings are extremely important. 19 | -------------------------------------------------------------------------------- /hands-on-guides/facebook-security/02-facebook-security-wyg.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Facebook 3 | Platform: Social Networks 4 | Need: Social networking 5 | Website: https://www.facebook.com/ 6 | Download: 7 | Version: N/A 8 | License: Proprietary Software 9 | System_requirements: Web browser; Internet connection 10 | Admin: 11 | Alternatives: [Diaspora](http://joindiaspora.com/); [Crabgrass](https://securityinabox.org/en/context/01/crabgrass-online-collaboration)[Crabgrass Main]; [Friendica](http://friendica.com/); [Pidder](https://pidder.com/); [SecureShare](http://secushare.org/) 12 | Comment: This file should only be used in connection with the whole hands-on guide; read 03-facebook-security-premise before using this tool 13 | Group: Synthesis 14 | Title: What you will get from this guide 15 | Language: EN 16 | 17 | 18 | * The ability to **reduce** the amount of your personal information made public when you use **Facebook**. 19 | * The ability to **control** who can access your profile, status updates, photos, and other data on **Facebook**, and when they can access it. 20 | * The ability to **reduce** the amount of your personal information made available to third parties including **Facebook**'s advertising partners and associated websites. 21 | -------------------------------------------------------------------------------- /hands-on-guides/facebook-security/05-facebook-security-required_reading.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Facebook 3 | Platform: Social Networks 4 | Need: Social networking 5 | Website: https://www.facebook.com/ 6 | Download: 7 | Version: N/A 8 | License: Proprietary Software 9 | System_requirements: Web browser; Internet connection 10 | Admin: 11 | Alternatives: [Diaspora](http://joindiaspora.com/); [Crabgrass](https://securityinabox.org/en/context/01/crabgrass-online-collaboration)[Crabgrass Main]; [Friendica](http://friendica.com/); [Pidder](https://pidder.com/); [SecureShare](http://secushare.org/) 12 | Comment: read 03-facebook-security-premise before using this tool 13 | Group: Required Reading 14 | Title: Required Reading 15 | Language: EN 16 | 17 | 18 | * How-to Chapter [How to protect yourself and your data when using social networking sites](https://securityinabox.org/chapter-9)[Social Networks] 19 | * Facebook's [Terms of Use](https://www.facebook.com/legal/terms) and [Data Use Policy](https://www.facebook.com/about/privacy/) 20 | 21 | -------------------------------------------------------------------------------- /hands-on-guides/firefox/01-firefox-intro.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Firefox and Security Add-Ons 3 | Platform: Microsoft Windows 4 | Need: Secure Web Browsing 5 | Website: https://www.mozilla.org/en-US/firefox/new/ 6 | Download: https://www.mozilla.org/en-US/firefox/new/ 7 | Version: 24.0 8 | License: Free/Open Source Software 9 | System_requirements: Microsoft Windows 10 | Admin: false 11 | Alternatives: [Google Chrome](http://www.google.com/chrome/) for GNU Linux, Mac OS and Microsoft Windows (less recommended); [Opera](http://www.opera.com/) for GNU Linux, Mac OS and Microsoft Windows (less recommended) 12 | Comment: read 03-firefox-premise before installing and using this tool 13 | Required_reading: 14 | Group: Synthesis 15 | Title: Introduction 16 | Language: EN 17 | 18 | 19 | **Mozilla Firefox** is a free and increasingly popular web browser. **Mozilla Firefox** is enhanced by the availability of numerous add-ons for it, including some that are designed to protect your privacy and security when you browse the web. 20 | -------------------------------------------------------------------------------- /hands-on-guides/firefox/02-firefox-wyg.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Firefox and Security Add-Ons 3 | Platform: Microsoft Windows 4 | Need: Secure Web Browsing 5 | Website: https://www.mozilla.org/en-US/firefox/new/ 6 | Download: https://www.mozilla.org/en-US/firefox/new/ 7 | Version: 24.0 8 | License: Free/Open Source Software 9 | System_requirements: Microsoft Windows 10 | Admin: false 11 | Alternatives: [Google Chrome](http://www.google.com/chrome/) for GNU Linux, Mac OS and Microsoft Windows (less recommended); [Opera](http://www.opera.com/) for GNU Linux, Mac OS and Microsoft Windows (less recommended) 12 | Comment: This file should only be used in connection with the whole hands-on guide; read 03-firefox-premise before installing and using this tool 13 | Required_reading: 14 | Group: Synthesis 15 | Title: What you will get from this guide 16 | Language: EN 17 | 18 | 19 | * A stable and secure Internet browser whose features can be enhanced by numerous add-ons 20 | * The ability to protect yourself from potentially dangerous programs and malicious web sites 21 | * The ability to wipe any traces of your browsing sessions from the computer 22 | -------------------------------------------------------------------------------- /hands-on-guides/firefox/03-firefox-premise.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Firefox and Security Add-Ons 3 | Platform: Microsoft Windows 4 | Need: Secure Web Browsing 5 | Website: https://www.mozilla.org/en-US/firefox/new/ 6 | Download: https://www.mozilla.org/en-US/firefox/new/ 7 | Version: 24.0 8 | License: Free/Open Source Software 9 | System_requirements: Microsoft Windows 10 | Admin: false 11 | Alternatives: [Google Chrome](http://www.google.com/chrome/) for GNU Linux, Mac OS and Microsoft Windows (less recommended); [Opera](http://www.opera.com/) for GNU Linux, Mac OS and Microsoft Windows (less recommended) 12 | Comment: 13 | Required_reading: 14 | Group: Basic Usage 15 | Title: Important premise 16 | Language: EN 17 | 18 | 19 | This chapter assumes that you already know how to use a web browser; it will not explain how to use the **Mozilla Firefox** browser functions. Its purpose is to explain some additional functions that will make using it more secure. 20 | 21 | - **Mozilla Firefox Add-ons** (also referred to as 'extensions'), are small programs which add new features or extend existing functionality of **Firefox**. 22 | 23 | - **Mozilla Firefox Plugins** are small pieces of software, usually designed by a third party, to enable the use of their software within **Firefox** browser. 24 | 25 | In this chapter, you will learn how to download, install and use the following **Mozilla Add-ons** to increase the privacy, safety and security of your **Firefox** web browser, and of your Internet experience as a whole. 26 | 27 | The **NoScript** add-on is documented separately in section [**4.0 About NoScript**](https://securityinabox.org/firefox_noscript)[Firefox Noscript]. Other add-on are documented in [**More Useful Firefox Add-Ons**](https://securityinabox.org/firefox_others)[Firefox Others] 28 | 29 | **Important**: The overwhelming majority of malware and spyware infections originate from web pages. It is very important that you always consider whether it is safe to open given web address, especially if you received it by email. Before you decide to open a page, we recommend that you scan the web address using the following page scanners: 30 | 31 | - [**www.virustotal.com**](http://www.virustotal.com/) 32 | - [**www.onlinelinkscan.com**](http://onlinelinkscan.com/) 33 | - [**www.phishtank.com**](http://www.phishtank.com/index.php) 34 | 35 | You can also check the reputation of a web site using the scanners listed below: 36 | 37 | - [**http://safeweb.norton.com**](http://safeweb.norton.com/) 38 | - [**www.urlvoid.com**](http://www.urlvoid.com/) 39 | -------------------------------------------------------------------------------- /hands-on-guides/firefox/04-firefox-installation.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Firefox and Security Add-Ons 3 | Platform: Microsoft Windows 4 | Need: Secure Web Browsing 5 | Website: https://www.mozilla.org/en-US/firefox/new/ 6 | Download: https://www.mozilla.org/en-US/firefox/new/ 7 | Version: 24.0 8 | License: Free/Open Source Software 9 | System_requirements: Microsoft Windows 10 | Admin: false 11 | Alternatives: [Google Chrome](http://www.google.com/chrome/) for GNU Linux, Mac OS and Microsoft Windows (less recommended); [Opera](http://www.opera.com/) for GNU Linux, Mac OS and Microsoft Windows (less recommended) 12 | Comment: read 03-firefox-premise before installing and using this tool 13 | Required_reading: 14 | Group: Basic Usage 15 | Title: Installation 16 | Language: EN 17 | 18 | 19 | **Firefox** has many easy-to-use settings for protecting your privacy and security whenever you access the Internet. How frequently you may have to configure these settings depends on your particular situation: 20 | 21 | * If you are using your personal computer, and do not allow others to use it for browsing purposes, you need only configure these settings once. 22 | * If you are in a public location or at work, you may have to repeatedly re-configure these settings for your own use. 23 | 24 | **Note**: You may also use a portable version of **Firefox** on a USB memory stick with you. This lets you configure **Firefox** according to your requirements, and you can use this version on any public computer. For more information about **Firefox** portable, please refer to [**Mozilla Firefox, Portable Edition**](https://securityinabox.org/en/firefox_portable)[Firefox Portable]. 25 | 26 | # Install Firefox 27 | 28 | Installing **Firefox** is a simple and straightforward process. To begin installing **Firefox**, perform the following steps: 29 | 30 | ## Step 1 31 | 32 | **Double click** ![installation file](https://securityinabox.org/sbox/screen/firefox-en-1/01.png)[Firefox img 01]; the *Open File - Security Warning* dialog box may appear. If it does, **click** ![Run](https://securityinabox.org/sbox/screen/firefox-en-1/02.png)[Firefox img 02] to activate the *Extracting* progress status bar. 33 | 34 | *A few moments later, the The Welcome to the Firefox Setup Wizard window will appear.* 35 | 36 | ## Step 2 37 | 38 | **Follow** the steps in the guided installation process, and simply accept the default options and settings. 39 | 40 | **Note**: Do not change the default options and settings unless you know what you are doing and why you are doing so. 41 | -------------------------------------------------------------------------------- /hands-on-guides/firefox/10-firefox-faq.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Firefox and Security Add-Ons 3 | Platform: Microsoft Windows 4 | Need: Secure Web Browsing 5 | Website: https://www.mozilla.org/en-US/firefox/new/ 6 | Download: https://www.mozilla.org/en-US/firefox/new/ 7 | Version: 24.0 8 | License: Free/Open Source Software 9 | System_requirements: Microsoft Windows 10 | Admin: false 11 | Alternatives: [Google Chrome](http://www.google.com/chrome/) for GNU Linux, Mac OS and Microsoft Windows (less recommended); [Opera](http://www.opera.com/) for GNU Linux, Mac OS and Microsoft Windows (less recommended) 12 | Comment: read 03-firefox-premise before installing and using this tool 13 | Required_reading: 14 | Group: FAQ 15 | Title: FAQ 16 | Language: EN 17 | 18 | 19 | ***Q***: Why would I want so many different add-ons to defend myself against malicious websites? If **NoScript** protects me from potentially dangerous scripts, for example, why do I also need other add-ons which function in a similar way? 20 | 21 | ***A***: It is often a good idea to use more than one tool to address the same general security issue. (Anti-virus programs are an important exception to this rule, since they tend to conflict with one another.) These **Firefox** add-ons use very different techniques to protect your browser from a variety of threats. **NoScript**, for example, blocks all scripts from unknown websites, but users tend to 'whitelist' the websites they visit frequently, which allows them to load potentially-malicious scripts. **NoScript** users also tend to allow unknown sites to load scripts, on a temporary basis, if those scripts are necessary for the page to function properly. 22 | -------------------------------------------------------------------------------- /hands-on-guides/firefox/11-firefox-questions.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Firefox and Security Add-Ons 3 | Platform: Microsoft Windows 4 | Need: Secure Web Browsing 5 | Website: https://www.mozilla.org/en-US/firefox/new/ 6 | Download: https://www.mozilla.org/en-US/firefox/new/ 7 | Version: 24.0 8 | License: Free/Open Source Software 9 | System_requirements: Microsoft Windows 10 | Admin: false 11 | Alternatives: [Google Chrome](http://www.google.com/chrome/) for GNU Linux, Mac OS and Microsoft Windows (less recommended); [Opera](http://www.opera.com/) for GNU Linux, Mac OS and Microsoft Windows (less recommended) 12 | Comment: read 03-firefox-premise before installing and using this tool 13 | Required_reading: 14 | Group: Training 15 | Title: Review questions 16 | Language: EN 17 | 18 | 19 | - How do you erase your temporary Internet history, cookies and cache from your browser? 20 | - What kinds of attacks can **NoScript** protect your system from? 21 | -------------------------------------------------------------------------------- /hands-on-guides/flickr-security/01-flickr-security-intro.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Flickr 3 | Platform: Social Networks 4 | Need: Image hosting and sharing 5 | Website: https://www.facebook.com/ 6 | Download: 7 | Version: N/A 8 | License: Proprietary Software 9 | System_requirements: Web browser; Internet connection 10 | Admin: 11 | Alternatives: [Diaspora](http://joindiaspora.com/); [Crabgrass](https://securityinabox.org/en/context/01/crabgrass-online-collaboration)[Crabgrass Main]; [Friendica](http://friendica.com/); [Pidder](https://pidder.com/); [SecureShare](http://secushare.org/) 12 | Comment: read 03-flickr-security-premise before using this tool 13 | Group: Synthesis 14 | Title: Introduction 15 | Language: EN 16 | 17 | 18 | **Flickr** is a popular image hosting and sharing website owned by **Yahoo!**. 19 | -------------------------------------------------------------------------------- /hands-on-guides/flickr-security/02-flickr-security-wyg.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Flickr 3 | Platform: Social Networks 4 | Need: Image hosting and sharing 5 | Website: https://www.facebook.com/ 6 | Download: 7 | Version: N/A 8 | License: Proprietary Software 9 | System_requirements: Web browser; Internet connection 10 | Admin: 11 | Alternatives: [Diaspora](http://joindiaspora.com/); [Crabgrass](https://securityinabox.org/en/context/01/crabgrass-online-collaboration)[Crabgrass Main]; [Friendica](http://friendica.com/); [Pidder](https://pidder.com/); [SecureShare](http://secushare.org/) 12 | Comment: This file should only be used in connection with the whole hands-on guide; read 03-flickr-security-premise before using this tool 13 | Group: Synthesis 14 | Title: What you will get from this guide 15 | Language: EN 16 | 17 | 18 | * Tips on how to protect your privacy and that of other individuals while using Flickr to share pictures. 19 | -------------------------------------------------------------------------------- /hands-on-guides/flickr-security/05-flickr-security-required_reading.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Flickr 3 | Platform: Social Networks 4 | Need: Image hosting and sharing 5 | Website: https://www.facebook.com/ 6 | Download: 7 | Version: N/A 8 | License: Proprietary Software 9 | System_requirements: Web browser; Internet connection 10 | Admin: 11 | Alternatives: [Diaspora](http://joindiaspora.com/); [Crabgrass](https://securityinabox.org/en/context/01/crabgrass-online-collaboration)[Crabgrass Main]; [Friendica](http://friendica.com/); [Pidder](https://pidder.com/); [SecureShare](http://secushare.org/) 12 | Comment: read 03-flickr-security-premise before using this tool 13 | Group: Required Reading 14 | Title: Required Reading 15 | Language: EN 16 | 17 | 18 | * How-to Chapter [How to protect yourself and your data when using social networking sites](https://securityinabox.org/chapter-10)[Social Networks] 19 | * Flickr's [Terms of Service](https://secure.flickr.com/help/terms/) and [Privacy Policy](https://secure.flickr.com/help/privacy-policy/) 20 | 21 | -------------------------------------------------------------------------------- /hands-on-guides/gpg4usb/01-gpg4usb-intro.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: gpg4usb 3 | Platform: Microsoft Windows 4 | Need: Text and files encryption 5 | Website: http://www.gpg4usb.org/ 6 | Download: http://www.gpg4usb.org/download.html 7 | Version: 0.3.3 8 | License: Free/Open Source Software 9 | System_requirements: Microsoft Windows 10 | Admin: false 11 | Alternatives: [Thunderbird](https://securityinabox.org/thunderbird_main)[Thunderbird Main] for Microsoft Windows, GNU/Linux and MacOS X 12 | Comment: read 03-gpg4usb-premise before installing and using this tool 13 | Group: Synthesis 14 | Title: Introduction 15 | Language: EN 16 | 17 | 18 | **gpg4usb** is a free, open source, portable program for encrypting text (email) messages and files. It uses the same Public Key Encryption algorithm as **GPG** and **PGP** programs. 19 | -------------------------------------------------------------------------------- /hands-on-guides/gpg4usb/02-gpg4usb-wyg.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: gpg4usb 3 | Platform: Microsoft Windows 4 | Need: Text and files encryption 5 | Website: http://www.gpg4usb.org/ 6 | Download: http://www.gpg4usb.org/download.html 7 | Version: 0.3.3 8 | License: Free/Open Source Software 9 | System_requirements: Microsoft Windows 10 | Admin: false 11 | Alternatives: [Thunderbird](https://securityinabox.org/thunderbird_main)[Thunderbird Main] for Microsoft Windows, GNU/Linux and MacOS X 12 | Comment: This file should only be used in connection with the whole hands-on guide; read 03-gpg4usb-premise before installing and using this tool 13 | Group: Synthesis 14 | Title: What you will get from this guide 15 | Language: EN 16 | 17 | 18 | * The ability to encrypt files and text messages from wherever you are (for instance, an Internet café or at work) 19 | * The ability to encrypt the messages *off-line* or when Internet access is unavailable, and then send them from a computer connected to the Internet later. 20 | -------------------------------------------------------------------------------- /hands-on-guides/gpg4usb/04-gpg4usb-installation.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: gpg4usb 3 | Platform: Microsoft Windows 4 | Need: Text and files encryption 5 | Website: http://www.gpg4usb.org/ 6 | Download: http://www.gpg4usb.org/download.html 7 | Version: 0.3.3 8 | License: Free/Open Source Software 9 | System_requirements: Microsoft Windows 10 | Admin: false 11 | Alternatives: [Thunderbird](https://securityinabox.org/thunderbird_main)[Thunderbird Main] for Microsoft Windows, GNU/Linux and MacOS X 12 | Comment: read 03-gpg4usb-premise before installing and using this tool 13 | Group: Basic Usage 14 | Title: Installation 15 | Language: EN 16 | 17 | 18 | # Install gpg4usb 19 | 20 | **gpg4usb** is a portable tool that does not require installation on your computer. The software is disturbed as a zip and should be extracted directly to a USB drive or to a folder on your computer; to begin perform the following steps: 21 | 22 | ## Step 1 23 | 24 | **Locate** the **gpg4usb** zipped archive file, and then **extract** all the files to a removable USB drive or a folder on your computer: 25 | 26 | ![gpg4usb program destination location](https://securityinabox.org/sbox/screen/gpg4usb-en-1/01.png)[gpg4usb img 01] 27 | 28 | *Figure 1: The gpg4usb program destination location* 29 | -------------------------------------------------------------------------------- /hands-on-guides/gpg4usb/07-gpg4usb-faq.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: gpg4usb 3 | Platform: Microsoft Windows 4 | Need: Text and files encryption 5 | Website: http://www.gpg4usb.org/ 6 | Download: http://www.gpg4usb.org/download.html 7 | Version: 0.3.3 8 | License: Free/Open Source Software 9 | System_requirements: Microsoft Windows 10 | Admin: false 11 | Alternatives: [Thunderbird](https://securityinabox.org/thunderbird_main)[Thunderbird Main] for Microsoft Windows, GNU/Linux and MacOS X 12 | Comment: read 03-gpg4usb-premise before installing and using this tool 13 | Group: FAQ 14 | Title: FAQ 15 | Language: EN 16 | 17 | 18 | ***Q***: Does **gpg4usb** have to be used from USB memory stick? 19 | 20 | ***A***: No. It can be extracted to and run from your computer hard disk. 21 | 22 | ***Q***: How many accounts may I generate key pairs for? 23 | 24 | ***A***: As many as you need. 25 | 26 | ***Q***: I like the fact that simple cut-and-paste operations are used here. 27 | 28 | ***A***: Indeed. However, don't forget that your email subject header remain unencrypted. Therefore, be careful and don't enter a subject title which is descriptive or may give you away potentially! 29 | -------------------------------------------------------------------------------- /hands-on-guides/gpg4usb/08-gpg4usb-questions.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: gpg4usb 3 | Platform: Microsoft Windows 4 | Need: Text and files encryption 5 | Website: http://www.gpg4usb.org/ 6 | Download: http://www.gpg4usb.org/download.html 7 | Version: 0.3.3 8 | License: Free/Open Source Software 9 | System_requirements: Microsoft Windows 10 | Admin: false 11 | Alternatives: [Thunderbird](https://securityinabox.org/thunderbird_main)[Thunderbird Main] for Microsoft Windows, GNU/Linux and MacOS X 12 | Comment: read 03-gpg4usb-premise before installing and using this tool 13 | Group: Training 14 | Title: Review questions 15 | Language: EN 16 | 17 | 18 | - What is the difference between signing and verifying a public key? 19 | - What is a fingerprint and how is it used? 20 | -------------------------------------------------------------------------------- /hands-on-guides/gpg4usb/09-gpg4usb-required_reading.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: gpg4usb 3 | Platform: Microsoft Windows 4 | Need: Text and files encryption 5 | Website: http://www.gpg4usb.org/ 6 | Download: http://www.gpg4usb.org/download.html 7 | Version: 0.3.3 8 | License: Free/Open Source Software 9 | System_requirements: Microsoft Windows 10 | Admin: false 11 | Alternatives: [Thunderbird](https://securityinabox.org/thunderbird_main)[Thunderbird Main] for Microsoft Windows, GNU/Linux and MacOS X 12 | Comment: read 03-gpg4usb-premise before installing and using this tool 13 | Group: Required Reading 14 | Title: Required Reading 15 | Language: EN 16 | 17 | 18 | * How-to Chapter [Keeping your Internet Communication Private](https://securityinabox.org/chapter-7)[Private Communication] 19 | * [Digital Security and Privacy for Human Rights Defenders](https://www.frontlinedefenders.org/esecman), chapter 2.4 Cryptology - Public Key Encryption (page 38) 20 | 21 | -------------------------------------------------------------------------------- /hands-on-guides/jitsi/01-jitsi-intro.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Jitsi 3 | Platform: Microsoft Windows 4 | Need: Secure communication 5 | Website: https://jitsi.org 6 | Download: https://jitsi.org/Main/Download 7 | Version: 2.4 8 | License: Free/Open Source Software 9 | System_requirements: Windows 2000, Windows XP, Windows Vista, Windows 7, Windows 8 10 | Admin: false 11 | Alternatives: [Pidgin for Windows](https://securityinabox.org/pidgin_main)[Pidgin Main] 12 | Comment: 13 | Required_reading: 14 | Group: Synthesis 15 | Title: Introduction 16 | Language: EN 17 | 18 | 19 | **Jitsi** is cross-platform, **free and open-source** software that supports **Instant Messaging (IM)**, voice and video chat over the Internet. It supports many of the most popular and widely used **IM** and telephony protocols, **Jabber/XMPP** (used by **Facebook** and **Google Talk**), **AIM**, **ICQ**, **MSN**, **Yahoo! Messenger** and the **SIP** Voice-over-IP (**VoIP**) protocol. It offers additional independent encryption for **IM** through the **OTR** (**Off-the-Record**) protocol and for voice and video sessions through **ZRTP** and **SRTP**. **Jitsi** runs on **Microsoft Windows**, **Mac OS** and **Linux**. An **Android** version is under development. 20 | 21 | -------------------------------------------------------------------------------- /hands-on-guides/jitsi/02-jitsi-wyg.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Jitsi 3 | Platform: Microsoft Windows 4 | Need: Secure communication 5 | Website: https://jitsi.org 6 | Download: https://jitsi.org/Main/Download 7 | Version: 2.4 8 | License: Free/Open Source Software 9 | System_requirements: Windows 2000, Windows XP, Windows Vista, Windows 7, Windows 8 10 | Admin: false 11 | Alternatives: [Pidgin for Windows](https://securityinabox.org/pidgin_main)[Pidgin Main] 12 | Comment: This file should only be used in connection with the whole hands-on guide 13 | Required_reading: 14 | Group: Synthesis 15 | Title: What you will get from this guide 16 | Language: EN 17 | 18 | 19 | * The ability to have a private and secure integrated communications system, that includes video chat sessions 20 | * The ability to encrypt your communication independently of your account providers 21 | * The ability to register and use different accounts (e.g. **Facebook**, **Google Talk**, **Yahoo Messenger**) simultaneously 22 | 23 | -------------------------------------------------------------------------------- /hands-on-guides/jitsi/03-jitsi-installation.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Jitsi 3 | Platform: Microsoft Windows 4 | Need: Secure communication 5 | Website: https://jitsi.org 6 | Download: https://jitsi.org/Main/Download 7 | Version: 2.4 8 | License: Free/Open Source Software 9 | System_requirements: Windows 2000, Windows XP, Windows Vista, Windows 7, Windows 8 10 | Admin: false 11 | Alternatives: [Pidgin for Windows](https://securityinabox.org/pidgin_main)[Pidgin Main] 12 | Comment: 13 | Required_reading: 14 | Group: Basic Usage 15 | Title: Installation 16 | Language: EN 17 | 18 | 19 | # Install and launch Jitsi 20 | 21 | ### Step 1 22 | 23 | ![Windows Security Alert](https://siabnext.ttc.io/sites/siabnext.ttc.io/files/media/jitsi-accounts.001.en-win_0.png)[Jitsi img 01] 24 | 25 | * If Windows Firewall blocks Jitsi's access to the network, you can safely Cancel or close the window. Jitsi will still work fine, unless you need to use it in Registrarless SIP mode. (If you do, then check both the "Private networks..." and the "Public networks..." boxes and click Allow access) 26 | 27 | 1. Click Cancel 28 | 29 | ### Step 2 30 | 31 | ![Protocols](https://siabnext.ttc.io/sites/siabnext.ttc.io/files/media/jitsi-accounts.002.en-win.png)[Jitsi img 02] 32 | 33 | * Jitsi will display the Sign in screen. At this point, you can simply click Cancel, to close the current window, then skip to the next section. Or, if you already have an IM account that you want to use with Jitsi, you can sign in by following the Steps below 34 | 35 | 1. Type in your username for the IM account you want to use. (For this example, we will use a Google Talk account, but you can use any of the services shown here. 36 | 37 | 2. Type in your passphrase for the IM account you want to use. 38 | 39 | 3. Click *Sign in* 40 | 41 | ### Step 3 42 | 43 | ![Main Application Window](https://siabnext.ttc.io/sites/siabnext.ttc.io/files/media/jitsi-accounts.004.en-win.png)[Jitsi img 03] 44 | 45 | * Jitsi will sign you in and display the main application window. 46 | 47 | * If you want to follow along with the next section, and add an account to Jitsi the normal way, you will first have to sign out. To do so, follow the Steps below 48 | 49 | 1. Click *File* 50 | 51 | 2. Click *Sign out* 52 | 53 | 3. Ctrl-? is the shortcut key combination for *File > Sign out* 54 | 55 | -------------------------------------------------------------------------------- /hands-on-guides/k9/01-k9-intro.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: K9 with APG 3 | Platform: Google Android 4 | Need: Email encryption on Android devices 5 | Website: https://code.google.com/p/k9mail 6 | Download: https://play.google.com/store/apps/details?id=com.fsck.k9 7 | Version: 4.011 8 | License: Free/Open Source Software 9 | System_requirements:Android 1.5 or higher; APG must be installed before installing K-9 10 | Admin: false 11 | Alternatives: 12 | Comment: read 03-k9-premise before installing and using this tool 13 | Group: Synthesis 14 | Title: Introduction 15 | Language: EN 16 | 17 | 18 | **K-9** is a free and open source email client for Android devices, that integrates seamlessly with **Android Privacy Guard**. 19 | 20 | **Android Privacy Guard** (APG) is a free and open source application for Android devices, created by [Thialfihar](http://www.thialfihar.org/), that lets you encrypt and decrypt single files or emails. It aims to be an OpenPGP implementation for Android, although not all features of OpenPGP are implemented yet. Its Public/Private key scheme lets you encrypt, decrypt and sign files and messages. You can also use it to encrypt single files with symmetric encryption, securing the files with a password. 21 | 22 | The use of these two tools allows for easy encrypting and decrypting of OpenPGP email messages. 23 | -------------------------------------------------------------------------------- /hands-on-guides/k9/02-k9-wyg.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: K9 with APG 3 | Platform: Google Android 4 | Need: Email encryption on Android devices 5 | Website: https://code.google.com/p/k9mail 6 | Download: https://play.google.com/store/apps/details?id=com.fsck.k9 7 | Version: 4.011 8 | License: Free/Open Source Software 9 | System_requirements:Android 1.5 or higher; APG must be installed before installing K-9 10 | Admin: false 11 | Alternatives: 12 | Comment: This file should only be used in connection with the whole hands-on guide; read 03-k9-premise before installing and using this tool 13 | Group: Synthesis 14 | Title: What you will get from this guide 15 | Language: EN 16 | 17 | 18 | * The ability to **use encrypted email on your Android device* 19 | -------------------------------------------------------------------------------- /hands-on-guides/k9/03-k9-premise.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: K9 with APG 3 | Platform: Google Android 4 | Need: Email encryption on Android devices 5 | Website: https://code.google.com/p/k9mail 6 | Download: https://play.google.com/store/apps/details?id=com.fsck.k9 7 | Version: 4.011 8 | License: Free/Open Source Software 9 | System_requirements:Android 1.5 or higher; APG must be installed before installing K-9 10 | Admin: false 11 | Alternatives: 12 | Comment: 13 | Group: Basic Usage 14 | Title: Important premise 15 | Language: EN 16 | 17 | 18 | # Introduction to K9 19 | 20 | - You need an email account. 21 | - You need an OpenPGP key-pair and public keys of the people you wish to communicate with. 22 | - You need to be familiar with the concept of public/private key encryption. 23 | - You need to be online when setting up and using **K-9**. 24 | - Due to the nature of data storage on smartphones, the private key you generate or import can not be deleted securely. 25 | -------------------------------------------------------------------------------- /hands-on-guides/k9/04-k9-installation.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: K9 with APG 3 | Platform: Google Android 4 | Need: Email encryption on Android devices 5 | Website: https://code.google.com/p/k9mail 6 | Download: https://play.google.com/store/apps/details?id=com.fsck.k9 7 | Version: 4.011 8 | License: Free/Open Source Software 9 | System_requirements:Android 1.5 or higher; APG must be installed before installing K-9 10 | Admin: false 11 | Alternatives: 12 | Comment: read 03-k9-premise before installing and using this tool 13 | Group: Basic Usage 14 | Title: Installation 15 | Language: EN 16 | 17 | 18 | # Install K9 19 | 20 | ## Step 1 21 | 22 | **Download** the app from the [Google play store](https://play.google.com/store/apps/details?id=com.fsck.k9) 23 | 24 | ## Step 2 25 | 26 | **Install** the app by tapping the **Install** button 27 | 28 | ## Step 3 29 | 30 | **Confirm** the permissions required by the app and tap **Accept & download** 31 | 32 | ## Step 4 33 | 34 | **Tap** *Open* to run the app for the first time 35 | -------------------------------------------------------------------------------- /hands-on-guides/k9/06-k9-basic.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: K9 with APG 3 | Platform: Google Android 4 | Need: Email encryption on Android devices 5 | Website: https://code.google.com/p/k9mail 6 | Download: https://play.google.com/store/apps/details?id=com.fsck.k9 7 | Version: 4.011 8 | License: Free/Open Source Software 9 | System_requirements:Android 1.5 or higher; APG must be installed before installing K-9 10 | Admin: false 11 | Alternatives: 12 | Comment: read 03-k9-premise before installing and using this tool 13 | Group: Basic Usage 14 | Title: Basic Howto 15 | Language: EN 16 | 17 | 18 | # Use K9 with APG 19 | 20 | Before you can start sending and receiving encrypted email, you need to ensure that you have all your OpenPGP keys imported into APG. To do this you need to copy your keys from your computer to your phone. 21 | 22 | Once copied over, complete the following steps to import your keys into APG. 23 | 24 | ## Step 1 25 | 26 | **Open** **APG**. 27 | 28 | ## Step 2 29 | 30 | **Tap** the *menu* button, and **choose** *manage secret keys*. 31 | 32 | ![manage secret keys](https://securityinabox.org/sbox/screen/k9apg-en/apgimp-01.png)[k9 img 08] 33 | 34 | ## Step 3 35 | 36 | **Press** the menu button again and select import keys 37 | ![import keys](https://securityinabox.org/sbox/screen/k9apg-en/apgimp-02.png)[k9 img 09], enter the location you stored your private key pair in and press *OK*. Once imported, repeat the above steps and import your public keys from the *manage public keys* menu. 38 | 39 | ![Key management options](https://securityinabox.org/sbox/screen/k9apg-en/apgimp-03.png)[k9 img 10] 40 | 41 | *Figure 7: Key management options* 42 | 43 | ## Step 4 44 | 45 | To import your public keys, **repeat** steps 2 and 3, choosing *manage public keys* at step 2. 46 | 47 | ## Step 5 48 | 49 | Once your keypair(s) and your collection of public keys are imported into APG, **K-9** will give you the options to *sign* and *encrypt* messages when writing emails, or if you received encrypted mail, it will allow you to decrypt it. 50 | 51 | ![](https://securityinabox.org/sbox/screen/k9apg-en/apgimp-06.png)[k9 img 11] ![](https://securityinabox.org/sbox/screen/k9apg-en/apgimp-07.png)[k9 img 12] 52 | -------------------------------------------------------------------------------- /hands-on-guides/k9/07-k9-required_reading.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: K9 with APG 3 | Platform: Google Android 4 | Need: Email encryption on Android devices 5 | Website: https://code.google.com/p/k9mail 6 | Download: https://play.google.com/store/apps/details?id=com.fsck.k9 7 | Version: 4.011 8 | License: Free/Open Source Software 9 | System_requirements:Android 1.5 or higher; APG must be installed before installing K-9 10 | Admin: false 11 | Alternatives: 12 | Comment: read 03-k9-premise before installing and using this tool 13 | Group: Required Reading 14 | Title: Required Reading 15 | Language: EN 16 | 17 | 18 | * How-to Chapter [How to keep your Internet communication private](https://securityinabox.org/chapter-7)[Private Communication] 19 | * How-to Chapter [How to use mobile phones as securely as possible](https://securityinabox.org/chapter-10)[Mobile Phones] 20 | * How-to Chapter [How to use mobile computing devices securely](https://securityinabox.org/en/chapter-11)[Smartphones] 21 | -------------------------------------------------------------------------------- /hands-on-guides/keepassdroid/01-keepassdroid-intro.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: KeePassDroid 3 | Platform: Google Android 4 | Need: Secure password storage 5 | Website: http://www.keepassdroid.com/ 6 | Download: https://play.google.com/store/apps/details?id=com.android.keepass 7 | Version: 1.99.11 8 | License: Free/Open Source Software 9 | System_requirements: Android 1.5 or higher 10 | Admin: false 11 | Alternatives: 12 | Comment: read 03-keepassdroid-premise before installing and using this tool 13 | Group: Synthesis 14 | Title: Introduction 15 | Language: EN 16 | 17 | 18 | KeePassDroid is a secure and easy-to-use password management tool for your Android device. 19 | -------------------------------------------------------------------------------- /hands-on-guides/keepassdroid/02-keepassdroid-wyg.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: KeePassDroid 3 | Platform: Google Android 4 | Need: Secure password storage 5 | Website: http://www.keepassdroid.com/ 6 | Download: https://play.google.com/store/apps/details?id=com.android.keepass 7 | Version: 1.99.11 8 | License: Free/Open Source Software 9 | System_requirements: Android 1.5 or higher 10 | Admin: false 11 | Alternatives: 12 | Comment: This file should only be used in connection with the whole hands-on guide; read 03-keepassdroid-premise before installing and using this tool 13 | Group: Synthesis 14 | Title: What you will get from this guide 15 | Language: EN 16 | 17 | 18 | * The ability to save all your passwords in one convenient and secure database. 19 | * The ability to create and store many strong passwords without having to remember them. 20 | * The ability to share your KeePass password database files between your mobile device and computer. 21 | -------------------------------------------------------------------------------- /hands-on-guides/keepassdroid/03-keepassdroid-premise.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: KeePassDroid 3 | Platform: Google Android 4 | Need: Secure password storage 5 | Website: http://www.keepassdroid.com/ 6 | Download: https://play.google.com/store/apps/details?id=com.android.keepass 7 | Version: 1.99.11 8 | License: Free/Open Source Software 9 | System_requirements: Android 1.5 or higher 10 | Admin: false 11 | Alternatives: 12 | Comment: 13 | Group: Basic Usage 14 | Title: Important premise 15 | Language: EN 16 | 17 | 18 | # Introduction to KeePassDroid 19 | 20 | **KeePassDroid** is an easy-to-use tool that helps you store and manage all your passwords in a highly secure database. You can copy your existing KeePass database file from your computer to the **KeePassDroid** application on the mobile device (or other way around: from the mobile device to your computer). 21 | 22 | **Note**: Before copying your password database to a mobile device and opening it, consider that security and the protection of the mobile device may not match the security on your computer and your password database may be more at risk. Instead of copying the database from your computer, you could create a unique database for your device which will only have the passwords you need on it. 23 | 24 | The database is protected by a 'master password' that you create. This password is also used to encrypt the entire contents of the database. You can store your existing passwords in **KeePassDroid** or have it generate one for you. **KeePassDroid** does not require any prior configuration or specific installation instructions. It's ready to go when you are! 25 | 26 | By using **KeePassDroid** all the time, you never actually have to see or know what your password is. The copy/paste functions take care of moving it from the database to the required window. For example, if you use KeePassDroid's *Random Generator* to create a password for a new account, you will be using a strong password that you would never have to remember! 27 | -------------------------------------------------------------------------------- /hands-on-guides/keepassdroid/04-keepassdroid-installation.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: KeePassDroid 3 | Platform: Google Android 4 | Need: Secure password storage 5 | Website: http://www.keepassdroid.com/ 6 | Download: https://play.google.com/store/apps/details?id=com.android.keepass 7 | Version: 1.99.11 8 | License: Free/Open Source Software 9 | System_requirements: Android 1.5 or higher 10 | Admin: false 11 | Alternatives: 12 | Comment: read 03-keepassdroid-premise before installing and using this tool 13 | Group: Basic Usage 14 | Title: Installation 15 | Language: EN 16 | 17 | 18 | # Install KeePassDroid 19 | 20 | ## Step 1 21 | 22 | On your Android device, **download** and **install** the app from the [**Google Play**](https://play.google.com/store/apps/details?id=com.android.keepass) store by pressing ![Install](https://securityinabox.org/sbox/screen/keepassdroid-en-1/002.png)[KeyPassDroid img 01] 23 | 24 | ![KeyPassDroid download page](https://securityinabox.org/sbox/screen/keepassdroid-en-1/001.png)[KeyPassDroid img 02] 25 | 26 | *Figure 1: KeyPassDroid download page* 27 | 28 | ## Step 2 29 | 30 | Before the installation process begins, you will be prompted to review the access the application will have on your phone. Review this carefully, once your are happy with the permissions that will be granted, press ![Accept](https://securityinabox.org/sbox/screen/keepassdroid-en-1/003.png)[KeyPassDroid img 03] and the installation will complete. If you do not agree with the permissions that will be granted, press the back button and the installation will be cancelled. 31 | 32 | ![Permissions necessary for KeyPassDroid](https://securityinabox.org/sbox/screen/keepassdroid-en-1/004.png)[KeyPassDroid img 04] 33 | 34 | *Figure 2: Permissions necessary for KeyPassDroid* 35 | 36 | **NOTE**: **KeePassDroid** can also be downloaded [directly](https://code.google.com/p/keepassdroid/downloads/list?can=1&q=) or from the third party [F-Droid](https://f-droid.org/repository/browse/?fdfilter=keepass&fdid=com.android.keepass) store. 37 | -------------------------------------------------------------------------------- /hands-on-guides/keepassdroid/07-keepassdroid-required_reading.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: KeePassDroid 3 | Platform: Google Android 4 | Need: Secure password storage 5 | Website: http://www.keepassdroid.com/ 6 | Download: https://play.google.com/store/apps/details?id=com.android.keepass 7 | Version: 1.99.11 8 | License: Free/Open Source Software 9 | System_requirements: Android 1.5 or higher 10 | Admin: false 11 | Alternatives: 12 | Comment: read 03-keepassdroid-premise before installing and using this tool 13 | Group: Required Reading 14 | Title: Required Reading 15 | Language: EN 16 | 17 | 18 | * How-to Chapter [How to create and maintain good passwords](https://securityinabox.org/en/chapter-3)[Secure Passwords] 19 | * Hands-On Guide Chapter [KeePass - Secure Password Storage](https://securityinabox.org/en/keepass_main)[KeePass Main] 20 | -------------------------------------------------------------------------------- /hands-on-guides/keepassx/01-keepassx-intro.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: KeePassX 3 | Platform: Microsoft Windows 4 | Need: Secure password storage 5 | Website: https://www.keepassx.org/ 6 | Download: https://www.keepassx.org/releases/KeePassX-0.4.3-win32.zip 7 | Version: 0.4.3 8 | License: Free/Open Source Software 9 | System_requirements: Windows 2000, Windows XP, Windows Vista, Windows 7, Windows 8 10 | Admin: false 11 | Alternatives: 12 | Comment: 13 | Group: Synthesis 14 | Title: Introduction 15 | Language: EN 16 | 17 | 18 | **KeePassX** is easy-to-use, cross-platform, free and open-source software (FOSS) that allows you to store all of your passwords in one secure, portable database. 19 | 20 | If you use KeePassX consistently for a particular account, you never actually have to know (or even *see*) your password for that application or service. The tool's *copy/paste* function takes care of moving the relevant password from the database to the required login form, then wiping it from *clipboard* memory. If, for example, you take advantage of the *Random Generator* feature of KeePassX, then configure your email account to use the generated password, you will be relying on a strong password that you have never actually seen. But it will still work! Just *remember to backup your KeePassX database!* 21 | -------------------------------------------------------------------------------- /hands-on-guides/keepassx/02-keepassx-wyg.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: KeePassX 3 | Platform: Microsoft Windows 4 | Need: Secure password storage 5 | Website: https://www.keepassx.org/ 6 | Download: https://www.keepassx.org/releases/KeePassX-0.4.3-win32.zip 7 | Version: 0.4.3 8 | License: Free/Open Source Software 9 | System_requirements: Windows 2000, Windows XP, Windows Vista, Windows 7, Windows 8 10 | Admin: false 11 | Alternatives: 12 | Comment: This file should only be used in connection with the whole hands-on guide 13 | Group: Synthesis 14 | Title: What you will get from this guide 15 | Language: EN 16 | 17 | 18 | * The ability to save all your passwords in one convenient and secure database 19 | * The ability to create and store many strong passwords without having to remember them 20 | 21 | In the sections that follow, you will learn how to: 22 | 23 | * Set a master passphrase 24 | * Save your newly-created database, 25 | * Generate a random password for a particular service 26 | * Extract passwords from KeePassX when you need them 27 | * Change your master passphrase. 28 | -------------------------------------------------------------------------------- /hands-on-guides/keepassx/06-keepassx-faq.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: KeePassX 3 | Platform: Microsoft Windows 4 | Need: Secure password storage 5 | Website: https://www.keepassx.org/ 6 | Download: https://www.keepassx.org/releases/KeePassX-0.4.3-win32.zip 7 | Version: 0.4.3 8 | License: Free/Open Source Software 9 | System_requirements: Windows 2000, Windows XP, Windows Vista, Windows 7, Windows 8 10 | Admin: false 11 | Alternatives: 12 | Comment: 13 | Group: FAQ 14 | Title: FAQ 15 | Language: EN 16 | 17 | 18 | **Q**: Nikolai, I was surprised how easy KeePass was to use. However, on the outside chance that I forget my master password, is there anything I can do to access KeePass and retrieve my password databases? 19 | 20 | **A**: Oh, that's an easy one, Elena! Nope. Sorry, there's nothing you can do in that situation. On the bright side, at least no one else will be able to access your password database! To prevent this from happening, you could use some of the methods for remembering a password that are described in the How-to Booklet chapter 3. How to create and maintain good passwords. 21 | 22 | **Q**: And if I uninstall KeePass, what will happen to my passwords? 23 | 24 | **A**: The program will be deleted from your computer; however, your database (stored in a .kdb file) will remain. You can open this file at any time in the future if you install KeePass again. 25 | 26 | **Q**: I think I accidentally deleted the database file! 27 | 28 | **A**: Hopefully, you made a backup beforehand. Also, make sure you haven't simply forgotten where you stored the file in the first place. Search your computer for a file with a .kdb extension. If you really have deleted it, take a look at the Hands-on guide to Recuva. It could help you to recover the file. 29 | -------------------------------------------------------------------------------- /hands-on-guides/keepassx/07-keepassx-questions.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: KeePassX 3 | Platform: Microsoft Windows 4 | Need: Secure password storage 5 | Website: https://www.keepassx.org/ 6 | Download: https://www.keepassx.org/releases/KeePassX-0.4.3-win32.zip 7 | Version: 0.4.3 8 | License: Free/Open Source Software 9 | System_requirements: Windows 2000, Windows XP, Windows Vista, Windows 7, Windows 8 10 | Admin: false 11 | Alternatives: 12 | Comment: 13 | Group: Training 14 | Title: Review questions 15 | Language: EN 16 | 17 | 18 | 1. What makes a strong password? 19 | 2. How can you modify an existing password entry in KeePass? 20 | 3. How can you generate a thirty-character password in KeePass? 21 | -------------------------------------------------------------------------------- /hands-on-guides/keepassx/08-keepassx-required_reading.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: KeePassX 3 | Platform: Microsoft Windows 4 | Need: Secure password storage 5 | Website: https://www.keepassx.org/ 6 | Download: https://www.keepassx.org/releases/KeePassX-0.4.3-win32.zip 7 | Version: 0.4.3 8 | License: Free/Open Source Software 9 | System_requirements: Windows 2000, Windows XP, Windows Vista, Windows 7, Windows 8 10 | Admin: false 11 | Alternatives: 12 | Comment: 13 | Group: Required Reading 14 | Title: Required Reading 15 | Language: EN 16 | 17 | 18 | * How-to Chapter [How to create and maintain good passwords](https://securityinabox.org/chapter-3)[Secure Passwords] 19 | -------------------------------------------------------------------------------- /hands-on-guides/metanull/01-metanull-intro.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Metanull 3 | Platform: Microsoft Windows 4 | Need: Image Metadata Removal 5 | Website: http://woronoi.blogspot.de/2012/05/metanull-11.html 6 | Download: http://woronoi.blogspot.de/2012/05/metanull-11.html 7 | Version: 1.0 8 | License: Free/Open Source Software 9 | System_requirements: Microsoft Windows 10 | Admin: false 11 | Alternatives: 12 | Comment: read 03-metanull-premise before installing and using this tool 13 | Group: Synthesis 14 | Title: Introduction 15 | Language: EN 16 | 17 | 18 | **Metanull** is a Windows application for removing metadata from files, such as TIFF or JPEG which are created by digital cameras or mobile phones. 19 | -------------------------------------------------------------------------------- /hands-on-guides/metanull/02-metanull-wyg.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Metanull 3 | Platform: Microsoft Windows 4 | Need: Image Metadata Removal 5 | Website: http://woronoi.blogspot.de/2012/05/metanull-11.html 6 | Download: http://woronoi.blogspot.de/2012/05/metanull-11.html 7 | Version: 1.0 8 | License: Free/Open Source Software 9 | System_requirements: Microsoft Windows 10 | Admin: false 11 | Alternatives: 12 | Comment: This file should only be used in connection with the whole hands-on guide; read 03-metanull-premise before installing and using this tool 13 | Group: Synthesis 14 | Title: What you will get from this guide 15 | Language: EN 16 | 17 | 18 | * The ability to scan for and remove sensitive metadata from image files without installing the software on your computer. 19 | * The ability to save disk space and server bandwidth by removing uneeded metadata. 20 | -------------------------------------------------------------------------------- /hands-on-guides/metanull/03-metanull-premise.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Metanull 3 | Platform: Microsoft Windows 4 | Need: Image Metadata Removal 5 | Website: http://woronoi.blogspot.de/2012/05/metanull-11.html 6 | Download: http://woronoi.blogspot.de/2012/05/metanull-11.html 7 | Version: 1.0 8 | License: Free/Open Source Software 9 | System_requirements: Microsoft Windows 10 | Admin: false 11 | Alternatives: 12 | Comment: 13 | Group: Basic Usage 14 | Title: Important premise 15 | Language: EN 16 | 17 | 18 | Digital cameras and mobile phones create image file formats such as TIFF (Tagged Image File Format) and JPEG (Joint Photographic Experts Group), These files contains hidden data or metadata called EXIF (Exchangeable image file format) which can include the date, time and sometimes the GPS coordinates of the picture, the brand and serial number of the device which took it as well as a thumbnail of the original image. **Metanull** can remove the metadata from your image files so the image you have won't have kind of information that identify you in it. 19 | 20 | - Make sure to securely delete, hide or encrypt the original version of the image that you stripped the metadata from. Metanull doesn't delete the original version of the images by default. 21 | 22 | - Make sure to check out the image's properties after using Metanull to ensure that there are no metadata left in the image before you share it with anyone. 23 | 24 | - Metanull has been tested with a range of different images, but since it is not possible to test it with every known image type, there is the possibility that it may corrupt some files. Be sure to keep backups of your files. 25 | 26 | - Metanull doesn't protect you against [facial recognition technology](https://en.wikipedia.org/wiki/Facial_recognition_system) 27 | 28 | -------------------------------------------------------------------------------- /hands-on-guides/metanull/04-metanull-installation.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Metanull 3 | Platform: Microsoft Windows 4 | Need: Image Metadata Removal 5 | Website: http://woronoi.blogspot.de/2012/05/metanull-11.html 6 | Download: http://woronoi.blogspot.de/2012/05/metanull-11.html 7 | Version: 1.0 8 | License: Free/Open Source Software 9 | System_requirements: Microsoft Windows 10 | Admin: false 11 | Alternatives: 12 | Comment: read 03-metanull-premise before installing and using this tool 13 | Group: Basic Usage 14 | Title: Installation 15 | Language: EN 16 | 17 | 18 | * How to download metanull 19 | 20 | - Read the brief [Hands on Guides](https://securityinabox.org/handsonguides)[Hands on Guides] introduction 21 | - Go to the [**Metanull Download page**](http://woronoi.blogspot.de/2012/05/metanull-11.html) 22 | - **Click** on the arrow on the left of the page, and then **click** on *Download* 23 | - **Click** *Save file* and choose a location to save the *executable file*, which you will use to open the program. 24 | - You will need to go directly to the .zip file to unpack it in order to execute the program and run it. You don't need to install this software on your computer. 25 | -------------------------------------------------------------------------------- /hands-on-guides/metanull/06-metanull-required_reading.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Metanull 3 | Platform: Microsoft Windows 4 | Need: Image Metadata Removal 5 | Website: http://woronoi.blogspot.de/2012/05/metanull-11.html 6 | Download: http://woronoi.blogspot.de/2012/05/metanull-11.html 7 | Version: 1.0 8 | License: Free/Open Source Software 9 | System_requirements: Microsoft Windows 10 | Admin: false 11 | Alternatives: 12 | Comment: read 03-metanull-premise before installing and using this tool 13 | Group: Required Reading 14 | Title: Required Reading 15 | Language: EN 16 | 17 | 18 | * How-to Chapter [How to destroy sensitive information](https://securityinabox.org/chapter-6)[Sensitive Information] 19 | 20 | -------------------------------------------------------------------------------- /hands-on-guides/obscuracam/01-obscuracam-intro.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: ObscuraCam 3 | Platform: Google Android 4 | Need: Hide faces in photos 5 | Website: https://guardianproject.info/apps/obscuracam/ 6 | Download: https://play.google.com/store/apps/details?id=org.witness.sscphase1 7 | Version: 2.0-RC2b 8 | License: Free/Open Source Software 9 | System_requirements: Android 10 | Admin: false 11 | Alternatives: 12 | Comment: read 03-obscuracam-premise before installing and using this tool 13 | Group: Synthesis 14 | Title: Introduction 15 | Language: EN 16 | 17 | 18 | **ObscuraCam** is a free camera application for Android devices, created by the [Guardian Project](https://guardianproject.info/), that has the ability to recognize and hide faces. It allows you to blur or delete the faces of those you photograph in order to protect their identities. 19 | -------------------------------------------------------------------------------- /hands-on-guides/obscuracam/02-obscuracam-wyg.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: ObscuraCam 3 | Platform: Google Android 4 | Need: Hide faces in photos 5 | Website: https://guardianproject.info/apps/obscuracam/ 6 | Download: https://play.google.com/store/apps/details?id=org.witness.sscphase1 7 | Version: 2.0-RC2b 8 | License: Free/Open Source Software 9 | System_requirements: Android 10 | Admin: false 11 | Alternatives: 12 | Comment: This file should only be used in connection with the whole hands-on guide; read 03-obscuracam-premise before installing and using this tool 13 | Group: Synthesis 14 | Title: What you will get from this guide 15 | Language: EN 16 | 17 | 18 | * The ability to **hide faces in photos taken with your Android device** 19 | * An easy way to **share or save these "obscured" photos** 20 | -------------------------------------------------------------------------------- /hands-on-guides/obscuracam/03-obscuracam-premise.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: ObscuraCam 3 | Platform: Google Android 4 | Need: Hide faces in photos 5 | Website: https://guardianproject.info/apps/obscuracam/ 6 | Download: https://play.google.com/store/apps/details?id=org.witness.sscphase1 7 | Version: 2.0-RC2b 8 | License: Free/Open Source Software 9 | System_requirements: Android 10 | Admin: false 11 | Alternatives: 12 | Comment: 13 | Group: Basic Usage 14 | Title: Important premise 15 | Language: EN 16 | 17 | 18 | # Introduction to ObscuraCam 19 | 20 | - **ObscuraCam**'s automatic face-recognition does not always work, but you can easily select and obscure faces manually. 21 | - On some versions of the Android operating system, the option to *delete the original media file* does not work. If you rely on this option, please check to make sure that you do not have **ObscuraCam** photos (with visible faces!) somewhere on your device. 22 | - If you use **ObscuraCam** to send photos to yourself or to someone else, the tool **does not** provide additional protection (such as end-to-end encryption) for the photo in transit. 23 | -------------------------------------------------------------------------------- /hands-on-guides/obscuracam/04-obscuracam-installation.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool/Issue 2 | Tool: 3 | Platform: 4 | Need: 5 | Website: 6 | Download: 7 | Object_type: Tool 8 | Tool: ObscuraCam 9 | Platform: Google Android 10 | Need: Hide faces in photos 11 | Website: https://guardianproject.info/apps/obscuracam/ 12 | Download: https://play.google.com/store/apps/details?id=org.witness.sscphase1 13 | Version: 2.0-RC2b 14 | License: Free/Open Source Software 15 | System_requirements: Android 16 | Admin: false 17 | Alternatives: 18 | Comment: read 03-obscuracam-premise before installing and using this tool 19 | Group: Basic Usage 20 | Title: Installation 21 | Language: EN 22 | 23 | 24 | # Install ObscuraCam 25 | 26 | ## Step 1 27 | 28 | **Download** the app from the [Google play store](https://play.google.com/store/apps/details?id=org.witness.sscphase1&hl=en) 29 | 30 | ![ObscuraCam in the Google Play store](https://securityinabox.org/sbox/screen/obscuracam-en/02.png)[ObscuraCam img 01] 31 | 32 | *Figure 1: ObscuraCam in the Google Play store* 33 | 34 | ## Step 2 35 | 36 | **Confirm** the permissions required by the app and begin installation by tapping the *Install* button. 37 | 38 | ![Confirmation of permissions and installation process](https://siabnext.ttc.io/sites/siabnext.ttc.io/files/media/obscuracam-and-03.png)[ObscuraCam img 02] ![Confirmation of permissions and installation process](https://siabnext.ttc.io/sites/siabnext.ttc.io/files/media/obscuracam-and-04.png)[ObscuraCam img 03] 39 | ![Confirmation of permissions and installation process](https://siabnext.ttc.io/sites/siabnext.ttc.io/files/media/obscuracam-and-05.png)[ObscuraCam img 04] 40 | 41 | *Figures 3, 4, and 5: Confirmation of permissions and installation process* 42 | 43 | ## Step 3 44 | 45 | **Tap** *Open* to run the app for the first time. 46 | 47 | ** Step 4 48 | 49 | **Read** the *Terms of Use* carefully. You can **accept** by tapping *I Accept*. 50 | 51 | ![Terms of Use](https://siabnext.ttc.io/sites/siabnext.ttc.io/files/media/obscuracam-and-06.png)[ObscuraCam img 05] 52 | 53 | *Figure 6: Terms of Use* 54 | -------------------------------------------------------------------------------- /hands-on-guides/obscuracam/06-obscuracam-required_reading.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: ObscuraCam 3 | Platform: Google Android 4 | Need: Hide faces in photos 5 | Website: https://guardianproject.info/apps/obscuracam/ 6 | Download: https://play.google.com/store/apps/details?id=org.witness.sscphase1 7 | Version: 2.0-RC2b 8 | License: Free/Open Source Software 9 | System_requirements: Android 10 | Admin: false 11 | Alternatives: 12 | Comment: read 03-obscuracam-premise before installing and using this tool 13 | Group: Required Reading 14 | Title: Required Reading 15 | Language: EN 16 | 17 | 18 | * How-to Chapter [How to use mobile phones as securely as possible](https://securityinabox.org/chapter-10)[Mobile Phones] 19 | * How-to Chapter [How to use smartphones as securely as possible](https://securityinabox.org/en/chapter-11)[Smartphones] 20 | -------------------------------------------------------------------------------- /hands-on-guides/orbot/01-orbot-intro.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Orbot 3 | Platform: Google Android 4 | Need: Digital Anonymity and Circumvention 5 | Website: https://guardianproject.info/apps/orbot/ 6 | Download: https://play.google.com/store/apps/details?id=org.torproject.android 7 | Version: 14.0.4.3 8 | License: Free/Open Source Software 9 | System_requirements: Android 2.3 or higher 10 | Admin: false 11 | Alternatives: 12 | Comment: read 03-orbot-premise before installing and using this tool 13 | Group: Synthesis 14 | Title: Introduction 15 | Language: EN 16 | 17 | 18 | **Orbot** is an Android-platform mobile phone application created by the [Guardian Project](https://guardianproject.info/), that is designed to increase the anonymity of your activities on the Internet. 19 | -------------------------------------------------------------------------------- /hands-on-guides/orbot/02-orbot-wyg.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Orbot 3 | Platform: Google Android 4 | Need: Digital Anonymity and Circumvention 5 | Website: https://guardianproject.info/apps/orbot/ 6 | Download: https://play.google.com/store/apps/details?id=org.torproject.android 7 | Version: 14.0.4.3 8 | License: Free/Open Source Software 9 | System_requirements: Android 2.3 or higher 10 | Admin: false 11 | Alternatives: 12 | Comment: This file should only be used in connection with the whole hands-on guide; read 03-orbot-premise before installing and using this tool 13 | Required_reading: 14 | Group: Synthesis 15 | Title: What you will get from this guide 16 | Language: EN 17 | 18 | 19 | * The ability to conceal your online identity from websites and other services, when using certain Android applications 20 | * The ability to conceal your browsing activities when using the Orweb browser for Android 21 | * The ability to bypass Internet censorship and online filtering when using the Orweb browser for Android 22 | -------------------------------------------------------------------------------- /hands-on-guides/orbot/03-orbot-premise.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Orbot 3 | Platform: Google Android 4 | Need: Digital Anonymity and Circumvention 5 | Website: https://guardianproject.info/apps/orbot/ 6 | Download: https://play.google.com/store/apps/details?id=org.torproject.android 7 | Version: 14.0.4.3 8 | License: Free/Open Source Software 9 | System_requirements: Android 2.3 or higher 10 | Admin: false 11 | Alternatives: 12 | Comment: 13 | Required_reading: 14 | Group: Basic Usage 15 | Title: Important premise 16 | Language: EN 17 | 18 | 19 | Orbot provides Android devices with access to the [*Tor Network*](https://securityinabox.org/glossary#Tor)[Glossary #Tor]. Form more information see [**Tor - Digital Anonymity and Circumvention**](https://securityinabox.org/tor_main)[Tor Main]. 20 | -------------------------------------------------------------------------------- /hands-on-guides/orbot/04-orbot-installation.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Orbot 3 | Platform: Google Android 4 | Need: Digital Anonymity and Circumvention 5 | Website: https://guardianproject.info/apps/orbot/ 6 | Download: https://play.google.com/store/apps/details?id=org.torproject.android 7 | Version: 14.0.4.3 8 | License: Free/Open Source Software 9 | System_requirements: Android 2.3 or higher 10 | Admin: false 11 | Alternatives: 12 | Comment: read 03-orbot-premise before installing and using this tool 13 | Group: Basic Usage 14 | Title: Installation 15 | Language: EN 16 | 17 | 18 | # Install OrBot 19 | 20 | ## Step 1 21 | 22 | On your Android device, **download** and **install** the app from the [Google Play store](https://play.google.com/store/apps/details?id=org.torproject.android) store by pressing ![Install](https://securityinabox.org/sbox/screen/orbot-en-1/002.png)[Orbot img 01] 23 | 24 | ![Orbot in the Google Play store](https://securityinabox.org/sbox/screen/orbot-en-1/001.png)[Orbot img 02] 25 | 26 | *Figure 1: Orbot in the Google Play store* 27 | 28 | **Note:** **Orbot** can also be downloaded [directly](https://guardianproject.info/releases/orbot-latest.apk) or from the third party [F-Droid](https://f-droid.org/repository/browse/?fdfilter=orbot&fdid=org.torproject.android) and [Amazon](http://www.amazon.com/The-Guardian-Project-Orbot-Proxy/dp/B00E7TIFGQ) stores. 29 | 30 | ## Step 2 31 | 32 | Before the installation process begins, you will be prompted to review the access the application will have on your phone. Review this carefully. Once your are happy with the permissions that will be granted, press ![Accept](https://securityinabox.org/sbox/screen/orbot-en-1/003.png)[Orbot img 03] and the installation will complete. If you do not agree with the permissions that will be granted, press the back button and the installation will be cancelled. 33 | 34 | ![Permissions required](https://securityinabox.org/sbox/screen/orbot-en-1/004.png)[Orbot img 04] 35 | 36 | *Figure 2: Permissions required* 37 | -------------------------------------------------------------------------------- /hands-on-guides/orbot/07-orbot-required_reading.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Orbot 3 | Platform: Google Android 4 | Need: Digital Anonymity and Circumvention 5 | Website: https://guardianproject.info/apps/orbot/ 6 | Download: https://play.google.com/store/apps/details?id=org.torproject.android 7 | Version: 14.0.4.3 8 | License: Free/Open Source Software 9 | System_requirements: Android 2.3 or higher 10 | Admin: false 11 | Alternatives: 12 | Comment: read 03-orbot-premise before installing and using this tool 13 | Group: Required Reading 14 | Title: Required Reading 15 | Language: EN 16 | 17 | 18 | * How-to Chapter [How to remain anonymous and bypass censorship on the Internet](https://securityinabox.org/chapter-8)[Anonymous Browsing] 19 | * How-to Chapter [How to use mobile phones as securely as possible](https://securityinabox.org/chapter-10)[Mobile Phones] 20 | * How-to Chapter [How to use smartphones as securely as possible](https://securityinabox.org/en/chapter-11)[Smartphones] 21 | 22 | -------------------------------------------------------------------------------- /hands-on-guides/orweb/01-orweb-intro.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Orweb 3 | Platform: Google Android 4 | Need: Anonymity and Circumvention 5 | Website: https://guardianproject.info/apps/orweb/ 6 | Download: https://play.google.com/store/apps/details?id=info.guardianproject.browser&hl=en 7 | Version: 0.6.1 8 | License: Free/Open Source Software 9 | System_requirements: Android 1.6 or higher; Orbot pre-installed 10 | Admin: false 11 | Alternatives: 12 | Comment: read 03-orweb-premise before installing and using this tool 13 | Group: Synthesis 14 | Title: Introduction 15 | Language: EN 16 | 17 | 18 | **Orweb** is an free Android-platform mobile phone application, created by the [Guardian Project](https://guardianproject.info/) for browsing the internet anonymously in conjunction with [**Orbot**](https://securityinabox.org/Orbot_main)[Orbot Main]. 19 | -------------------------------------------------------------------------------- /hands-on-guides/orweb/02-orweb-wyg.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Orweb 3 | Platform: Google Android 4 | Need: Anonymity and Circumvention 5 | Website: https://guardianproject.info/apps/orweb/ 6 | Download: https://play.google.com/store/apps/details?id=info.guardianproject.browser&hl=en 7 | Version: 0.6.1 8 | License: Free/Open Source Software 9 | System_requirements: Android 1.6 or higher; Orbot pre-installed 10 | Admin: false 11 | Alternatives: 12 | Comment: This file should only be used in connection with the whole hands-on guide; read 03-orweb-premise before installing and using this tool 13 | Group: Synthesis 14 | Title: What you will get from this guide 15 | Language: EN 16 | 17 | 18 | * The ability to conceal your digital identity from the websites you visit 19 | * The ability to conceal the websites you visit 20 | * The ability to bypass Internet censorship and online filtering 21 | 22 | -------------------------------------------------------------------------------- /hands-on-guides/orweb/03-orweb-premise.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Orweb 3 | Platform: Google Android 4 | Need: Anonymity and Circumvention 5 | Website: https://guardianproject.info/apps/orweb/ 6 | Download: https://play.google.com/store/apps/details?id=info.guardianproject.browser&hl=en 7 | Version: 0.6.1 8 | License: Free/Open Source Software 9 | System_requirements: Android 1.6 or higher; Orbot pre-installed 10 | Admin: false 11 | Alternatives: 12 | Comment: 13 | Group: Basic Usage 14 | Title: Important premise 15 | Language: EN 16 | 17 | 18 | # Introduction to Orweb 19 | 20 | **Note:** There is a [bug](http://xordern.net/ip-leakage-of-mobile-tor-browsers.html) in the current version of **Orweb** (0.6.1 and older) that may leak information about you, such as your IP address, to the website owners if you are viewing HTML5 based videos. **Orweb** will still allow you to circumvent censorship and prevent you from being spied on by your *Internet Service Provider* (ISP) but we do not recommend it to be used to view sites that may be considered hostile. For more information on the issue see the developers' [response](https://guardianproject.info/2014/06/30/recent-news-on-orweb-flaws/). 21 | 22 | **Orweb** will only work properly after installing and configuring [**Orbot**](https://securityinabox.org/Orbot_main)[Orbot Main]. 23 | 24 | Remember, if you previously created a mail or blog without using **Orweb**, the site will still know your real location even if you return using **Orweb**. 25 | 26 | If you want stronger anonymity while using **Orweb** other steps need to be taken including: 27 | 28 | - never access accounts made in your real name 29 | - never give your personal data 30 | - never do the same things that you do when not trying to be anonymous. 31 | -------------------------------------------------------------------------------- /hands-on-guides/orweb/04-orweb-installation.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Orweb 3 | Platform: Google Android 4 | Need: Anonymity and Circumvention 5 | Website: https://guardianproject.info/apps/orweb/ 6 | Download: https://play.google.com/store/apps/details?id=info.guardianproject.browser&hl=en 7 | Version: 0.6.1 8 | License: Free/Open Source Software 9 | System_requirements: Android 1.6 or higher; Orbot pre-installed 10 | Admin: false 11 | Alternatives: 12 | Comment: read 03-orweb-premise before installing and using this tool 13 | Group: Basic Usage 14 | Title: Installation 15 | Language: EN 16 | 17 | 18 | # Install Orweb 19 | 20 | ## Step 1 21 | 22 | On your Android device, **download** and **install** the app from the [Google Play store](https://play.google.com/store/apps/details?id=info.guardianproject.browser) store by tapping ![Install](https://securityinabox.org/sbox/screen/orweb-en-1/002.png)[Orweb img 01] 23 | 24 | ![Orweb in the Google Play store](https://securityinabox.org/sbox/screen/orweb-en-1/001.png)[Orweb img 02] 25 | 26 | *Figure 1: Orweb in the Google Play store* 27 | 28 | **Note:** **Orweb** can also be downloaded [directly](https://guardianproject.info/releases/orweb-latest.apk) or from the third party [F-Droid](https://f-droid.org/repository/browse/?fdfilter=orweb&fdid=info.guardianproject.browser) store. 29 | 30 | ## Step 2 31 | 32 | Before the installation process begins, you will be prompted to review the access the application will have on your phone. Review this carefully. Once your are happy with the permissions that will be granted, press ![Accept](https://securityinabox.org/sbox/screen/orweb-en-1/003.png)[Orweb img 03] to start the installation. If you do not agree with the permissions that will be granted, press the back button and the installation will be cancelled. 33 | 34 | ![Permissions required](https://securityinabox.org/sbox/screen/orweb-en-1/004.png)[Orweb img 04] 35 | 36 | *Figure 2: Permissions required* 37 | 38 | ## Step 3 39 | 40 | Once **Orweb** downloads and installation has completed, you can press ![Open](https://securityinabox.org/sbox/screen/orweb-en-1/005.png)[Orweb img 05] to start the application. 41 | -------------------------------------------------------------------------------- /hands-on-guides/orweb/06-orweb-required_reading.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Orweb 3 | Platform: Google Android 4 | Need: Anonymity and Circumvention 5 | Website: https://guardianproject.info/apps/orweb/ 6 | Download: https://play.google.com/store/apps/details?id=info.guardianproject.browser&hl=en 7 | Version: 0.6.1 8 | License: Free/Open Source Software 9 | System_requirements: Android 1.6 or higher; Orbot pre-installed 10 | Admin: false 11 | Alternatives: 12 | Comment: read 03-orweb-premise before installing and using this tool 13 | Group: Required Reading 14 | Title: Required Reading 15 | Language: EN 16 | 17 | 18 | * How-to Chapter [How to remain anonymous and bypass censorship on the Internet](https://securityinabox.org/chapter-8)[Anonymous Browsing] 19 | * How-to Chapter [How to use mobile phones as securely as possible](https://securityinabox.org/chapter-10)[Mobile Phones] 20 | * How-to Chapter [How to use smartphones as securely as possible](https://securityinabox.org/en/chapter-11)[Smartphones] 21 | -------------------------------------------------------------------------------- /hands-on-guides/pidgin/01-pidgin-intro.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Pidgin with OTR 3 | Platform: Microsoft Windows 4 | Need: Secure Instant Messaging 5 | Website: https://www.pidgin.im/ 6 | Download: https://www.pidgin.im/download/windows/ 7 | Version: 2.10.9 (OTR 4.0.0-1) 8 | License: Free/Open Source Software 9 | System_requirements: Microsoft Windows; GNU/Linux 10 | Admin: false 11 | Alternatives: [Jitsi](https://securityinabox.org/jitsi)[Jitsi Main] for Microsoft Windows, GNU/Linux, Mac OS; [Miranda IM](http://www.miranda-im.org/) for Microsoft Windows; [Adium](http://adium.im/) for Mac OS 12 | Comment: read 03-pidgin-premise before installing and using this tool 13 | Group: Synthesis 14 | Title: Introduction 15 | Language: EN 16 | 17 | 18 | **Pidgin** is a free and open source client that lets you organize and manage your different **Instant Messaging (IM)** accounts using a single interface. The **Off-the-Record (OTR)** plug-in designed for use with **Pidgin** ensures authenticated and secure communications between **Pidgin** users. 19 | -------------------------------------------------------------------------------- /hands-on-guides/pidgin/02-pidgin-wyg.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Pidgin with OTR 3 | Platform: Microsoft Windows 4 | Need: Secure Instant Messaging 5 | Website: https://www.pidgin.im/ 6 | Download: https://www.pidgin.im/download/windows/ 7 | Version: 2.10.9 (OTR 4.0.0-1) 8 | License: Free/Open Source Software 9 | System_requirements: Microsoft Windows; GNU/Linux 10 | Admin: false 11 | Alternatives: [Jitsi](https://securityinabox.org/jitsi)[Jitsi Main] for Microsoft Windows, GNU/Linux, Mac OS; [Miranda IM](http://www.miranda-im.org/) for Microsoft Windows; [Adium](http://adium.im/) for Mac OS 12 | Comment: This file should only be used in connection with the whole hands-on guide; read 03-pidgin-premise before installing and using this tool 13 | Group: Synthesis 14 | Title: What you will get from this guide 15 | Language: EN 16 | 17 | 18 | * The ability to organize and manage some of the most popular instant messaging services through a single program 19 | * The ability to have private and authenticated chat sessions 20 | -------------------------------------------------------------------------------- /hands-on-guides/pidgin/10-pidgin-questions.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Pidgin with OTR 3 | Platform: Microsoft Windows 4 | Need: Secure Instant Messaging 5 | Website: https://www.pidgin.im/ 6 | Download: https://www.pidgin.im/download/windows/ 7 | Version: 2.10.9 (OTR 4.0.0-1) 8 | License: Free/Open Source Software 9 | System_requirements: Microsoft Windows; GNU/Linux 10 | Admin: false 11 | Alternatives: [Jitsi](https://securityinabox.org/jitsi)[Jitsi Main] for Microsoft Windows, GNU/Linux, Mac OS; [Miranda IM](http://www.miranda-im.org/) for Microsoft Windows; [Adium](http://adium.im/) for Mac OS 12 | Comment: read 03-pidgin-premise before installing and using this tool 13 | Group: Training 14 | Title: Review questions 15 | Language: EN 16 | 17 | 18 | - How many times do you need to 'authenticate' your chat session with a given buddy? 19 | - Is it possible to register and simultaneously use multiple **IM** accounts in **Pidgin**? 20 | - What is a fingerprint in **Pidgin**? 21 | - What will happen to your **OTR** preferences (including the received keys' fingerprints) when you install **Pidgin- OTR** on another computer? 22 | - What is required to initiate a private and authenticated chat session in **Pidgin**? 23 | - What are the requirements for creating an account in **Pidgin**? 24 | -------------------------------------------------------------------------------- /hands-on-guides/pidgin/11-pidgin-required_reading.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Pidgin with OTR 3 | Platform: Microsoft Windows 4 | Need: Secure Instant Messaging 5 | Website: https://www.pidgin.im/ 6 | Download: https://www.pidgin.im/download/windows/ 7 | Version: 2.10.9 (OTR 4.0.0-1) 8 | License: Free/Open Source Software 9 | System_requirements: Microsoft Windows; GNU/Linux 10 | Admin: false 11 | Alternatives: [Jitsi](https://securityinabox.org/jitsi)[Jitsi Main] for Microsoft Windows, GNU/Linux, Mac OS; [Miranda IM](http://www.miranda-im.org/) for Microsoft Windows; [Adium](http://adium.im/) for Mac OS 12 | Comment: read 03-pidgin-premise before installing and using this tool 13 | Group: Required Reading 14 | Title: Required Reading 15 | Language: EN 16 | 17 | 18 | * How-to Chapter [Keeping your Internet Communication Private](https://securityinabox.org/chapter-7)[Private Communication] 19 | -------------------------------------------------------------------------------- /hands-on-guides/recuva/01-recuva-intro.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Recuva 3 | Platform: Microsoft Windows 4 | Need: Data recovery 5 | Website: https://www.piriform.com/recuva 6 | Download: https://www.piriform.com/recuva/builds 7 | Version: 1.3 8 | License: Free Proprietary Software 9 | System_requirements: Microsoft Windows 10 | Admin: false 11 | Alternatives: [R-Linux](http://www.r-tt.com/data_recovery_linux/) for GNU Linux; [TestDisk and PhotoRec](http://www.cgsecurity.org/) for Mac OS, Microsoft Windows and GNU Linux; [NTFS Undelete](http://ntfsundelete.com/) for Microsoft Windows; [Disk Digger](http://diskdigger.org/) for Microsoft Windows; [PCInspector File Recovery](http://www.pcinspector.de/Default.htm?language=1) for Microsoft Windows; [FileRestorePlus](http://undeleteplus.com/) for Microsoft Windows 12 | Comment: read 03-recuva-premise before installing and using this tool 13 | Group: Synthesis 14 | Title: Introduction 15 | Language: EN 16 | 17 | 18 | **Recuva** is an easy-to-use data recovery tool. It lets you scan for and retrieve previously deleted documents, files, folders and other information, including emails, images and video formats. **Recuva** also uses secure overwriting techniques for erasing important, private or sensitive information. 19 | -------------------------------------------------------------------------------- /hands-on-guides/recuva/02-recuva-wyg.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Recuva 3 | Platform: Microsoft Windows 4 | Need: Data recovery 5 | Website: https://www.piriform.com/recuva 6 | Download: https://www.piriform.com/recuva/builds 7 | Version: 1.3 8 | License: Free Proprietary Software 9 | System_requirements: Microsoft Windows 10 | Admin: false 11 | Alternatives: [R-Linux](http://www.r-tt.com/data_recovery_linux/) for GNU Linux; [TestDisk and PhotoRec](http://www.cgsecurity.org/) for Mac OS, Microsoft Windows and GNU Linux; [NTFS Undelete](http://ntfsundelete.com/) for Microsoft Windows; [Disk Digger](http://diskdigger.org/) for Microsoft Windows; [PCInspector File Recovery](http://www.pcinspector.de/Default.htm?language=1) for Microsoft Windows; [FileRestorePlus](http://undeleteplus.com/) for Microsoft Windows 12 | Comment: This file should only be used in connection with the whole hands-on guide; read 03-recuva-premise before installing and using this tool 13 | Group: Synthesis 14 | Title: What you will get from this guide 15 | Language: EN 16 | 17 | 18 | * The ability to perform different scanning techniques 19 | * The ability to recover previously deleted files on your computer 20 | * The ability to securely delete private or sensitive information 21 | -------------------------------------------------------------------------------- /hands-on-guides/recuva/03-recuva-premise.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Recuva 3 | Platform: Microsoft Windows 4 | Need: Data recovery 5 | Website: https://www.piriform.com/recuva 6 | Download: https://www.piriform.com/recuva/builds 7 | Version: 1.3 8 | License: Free Proprietary Software 9 | System_requirements: Microsoft Windows 10 | Admin: false 11 | Alternatives: [R-Linux](http://www.r-tt.com/data_recovery_linux/) for GNU Linux; [TestDisk and PhotoRec](http://www.cgsecurity.org/) for Mac OS, Microsoft Windows and GNU Linux; [NTFS Undelete](http://ntfsundelete.com/) for Microsoft Windows; [Disk Digger](http://diskdigger.org/) for Microsoft Windows; [PCInspector File Recovery](http://www.pcinspector.de/Default.htm?language=1) for Microsoft Windows; [FileRestorePlus](http://undeleteplus.com/) for Microsoft Windows 12 | Comment: 13 | Group: Basic Usage 14 | Title: Important premise 15 | Language: EN 16 | 17 | 18 | In situations where private or sensitive files may have been mistakenly deleted, **Recuva** can help you to scan for and restore some of them. As discussed in chapter [**6. How-to Destroy Sensitive Information**](https://securityinabox.org/chapter-6)[Sensitive Information], a file deleted using the standard **Windows** operating system *Delete* function, even after the *Recycle Bin* has been emptied, might still exist on the computer. 19 | 20 | However, there are circumstances under which **Recuva** cannot retrieve information. If you have permanently deleted or *wiped* any temporary files by running **CCleaner** with the *Secure file deletion (Slower)* option enabled, those files are virtually unrecoverable. **Recuva** cannot recover files after programs like **CCleaner** or **Eraser** have been used to wipe free disk space or if **Windows** itself has already overwritten any previously occupied space. **Recuva** also cannot recover damaged documents and files. 21 | 22 | **Recuva** can also be used to securely overwrite your private or sensitive data. 23 | -------------------------------------------------------------------------------- /hands-on-guides/recuva/08-recuva-questions.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Recuva 3 | Platform: Microsoft Windows 4 | Need: Data recovery 5 | Website: https://www.piriform.com/recuva 6 | Download: https://www.piriform.com/recuva/builds 7 | Version: 1.3 8 | License: Free Proprietary Software 9 | System_requirements: Microsoft Windows 10 | Admin: false 11 | Alternatives: [R-Linux](http://www.r-tt.com/data_recovery_linux/) for GNU Linux; [TestDisk and PhotoRec](http://www.cgsecurity.org/) for Mac OS, Microsoft Windows and GNU Linux; [NTFS Undelete](http://ntfsundelete.com/) for Microsoft Windows; [Disk Digger](http://diskdigger.org/) for Microsoft Windows; [PCInspector File Recovery](http://www.pcinspector.de/Default.htm?language=1) for Microsoft Windows; [FileRestorePlus](http://undeleteplus.com/) for Microsoft Windows 12 | Comment: read 03-recuva-premise before installing and using this tool 13 | Group: Training 14 | Title: Review questions 15 | Language: EN 16 | 17 | 18 | - Does turning off your computer reduce the ability of **Recuva** to effectively recover your deleted documents, files and folders? 19 | - How does increasing the number of passes affect the secure overwriting of a given document or file? 20 | - Name two conditions affecting your ability to successfully recover a deleted document or file in **Recuva**. 21 | - There are two ways to enable a *Deep Scan* in **Recuva**; what are they? 22 | - Under what circumstances should you use the *Recuva Wizard* when scanning for deleted files? 23 | -------------------------------------------------------------------------------- /hands-on-guides/riseup/01-riseup-intro.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Riseup 3 | Platform: Email; Internet 4 | Need: Secure email service 5 | Website: https://riseup.net/ 6 | Download: 7 | Version: N/A 8 | License: Free/Open Source Software 9 | System_requirements: Internet connection; Web browser and/or Email client 10 | Admin: 11 | Alternatives: 12 | Comment: read 03-riseup-premise before using this tool 13 | Group: Synthesis 14 | Title: Introduction 15 | Language: EN 16 | 17 | 18 | **Riseup** is a collective organization dedicated to providing private and secure email and hosting services for individuals and organisations committed to political and social justice. 19 | -------------------------------------------------------------------------------- /hands-on-guides/riseup/02-riseup-wyg.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Riseup 3 | Platform: Email 4 | Need: Secure email service 5 | Website: https://riseup.net/ 6 | Download: 7 | Version: N/A 8 | License: Free/Open Source Software 9 | System_requirements: Internet connection; Web browser and/or Email client 10 | Admin: 11 | Alternatives: 12 | Comment: This file should only be used in connection with the whole hands-on guide; read 03-riseup-premise before using this tool 13 | Group: Synthesis 14 | Title: What you will get from this guide 15 | Language: EN 16 | 17 | 18 | * A community-driven and an advertisement-free email account 19 | * The ability to access your email over the Internet or with an email program, and conduct private email communications over an encrypted connection 20 | * The ability to change your email address, set your email box size, and invite others to join **RiseUp** 21 | -------------------------------------------------------------------------------- /hands-on-guides/riseup/07-riseup-faq.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Riseup 3 | Platform: Email 4 | Need: Secure email service 5 | Website: https://riseup.net/ 6 | Download: 7 | Version: N/A 8 | License: Free/Open Source Software 9 | System_requirements: Internet connection; Web browser and/or Email client 10 | Admin: 11 | Alternatives: 12 | Comment: read 03-riseup-premise before using this tool 13 | Group: FAQ 14 | Title: FAQ 15 | Language: EN 16 | 17 | 18 | ***Q***: I cannot log in to my Riseup account 19 | 20 | ***A***: Please see the [Troubleshooting webmail login](https://help.riseup.net/en/email/webmail#troubleshooting-webmail-login) in [Riseup Email Help](https://help.riseup.net/email). Also see [Riseup Help: Frequently asked questions](https://help.riseup.net/en/email#frequently-asked-questions-faq) for many other topics. 21 | 22 | ***Q***: In which circumstances would I use the default (Roundcube) as opposed to the SquirrelMail web email interface? 23 | 24 | ***A***: If for some reason, one email interface is down or has to undergo routine maintenance, you can always continue working on the other email interface without interruption. Also, the **SquirrelMail** service does not require JavaScript. 25 | 26 | ***Q***: When creating my account I am uncomfortable giving information about my self, do I have to supply this. 27 | 28 | ***A***: No, you are not required to supply any personal information unless you want to. 29 | 30 | ***Q***: How can I create an email account for an activist that I know? 31 | 32 | ***A***: You need to know another **Riseup** user and both of you need to generate an [invite code](/en/riseup_changingsettings#4.3) each and send this to your colleague. The codes will be used when this person creates a **Riseup** account. 33 | 34 | ***Q***: I noticed the two-factor authentication setting in the Roundcube web mail interface, should I use it? 35 | 36 | ***A***: Two-factor authentication provides an additional layer of protection to your email account by requiring the entry of a random, changing code in addition to your password when login in. However at this time even if you set it up and activate you can still access your emails without a need to use two-factor authentication with **SquirrelMail** web mail interface or with an email client (like Thunderbird) over POP/IMAP access. We are looking forward to further development of the two-factor authentication support on **Riseup**. 37 | -------------------------------------------------------------------------------- /hands-on-guides/riseup/08-riseup-questions.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Riseup 3 | Platform: Email 4 | Need: Secure email service 5 | Website: https://riseup.net/ 6 | Download: 7 | Version: N/A 8 | License: Free/Open Source Software 9 | System_requirements: Internet connection; Web browser and/or Email client 10 | Admin: 11 | Alternatives: 12 | Comment: read 03-riseup-premise before using this tool 13 | Group: Training 14 | Title: Review questions 15 | Language: EN 16 | 17 | 18 | - What is the difference between reading your email over webmail and reading through an email client program? 19 | - What is a *Secure Sockets Layer (SSL)* and how does it work? 20 | - What is a virtual keyboard and how does it work? 21 | - How can you add an alias to your email account? 22 | - For what length of time is a newly created invite code valid? 23 | -------------------------------------------------------------------------------- /hands-on-guides/riseup/09-riseup-required_reading.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Riseup 3 | Platform: Email 4 | Need: Secure email service 5 | Website: https://riseup.net/ 6 | Download: 7 | Version: N/A 8 | License: Free/Open Source Software 9 | System_requirements: Internet connection; Web browser and/or Email client 10 | Admin: 11 | Alternatives: 12 | Comment: This file should only be used in connection with the whole hands-on guide; read 03-riseup-premise before using this tool 13 | Group: Required Reading 14 | Title: Required Reading 15 | Language: EN 16 | 17 | 18 | * How-to Chapter [Keeping your Internet Communication Private](https://securityinabox.org/chapter-7)[Private Communication] 19 | -------------------------------------------------------------------------------- /hands-on-guides/template-hog/01-siab-intro.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool/Issue 2 | Tool: 3 | Platform: 4 | Need: 5 | Website: 6 | Download: 7 | Version: 8 | License: 9 | System_requirements: 10 | Admin: true/false 11 | Alternatives: 12 | Comment: 13 | Group: Synthesis 14 | Title: Introduction 15 | Language: EN 16 | 17 | 18 | 19 | -------------------------------------------------------------------------------- /hands-on-guides/template-hog/02-siab-wyg.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool/Issue 2 | Tool: 3 | Platform: 4 | Need: 5 | Website: 6 | Download: 7 | Version: 8 | License: 9 | System_requirements: 10 | Admin: true/false 11 | Alternatives: 12 | Comment: This file should only be used in connection with the whole hands-on guide 13 | Group: Synthesis 14 | Title: What you will get from this guide 15 | Language: EN 16 | 17 | 18 | 19 | -------------------------------------------------------------------------------- /hands-on-guides/template-hog/03-siab-premise.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool/Issue 2 | Tool: 3 | Platform: 4 | Need: 5 | Website: 6 | Download: 7 | Version: 8 | License: 9 | System_requirements: 10 | Admin: true/false 11 | Alternatives: 12 | Comment: 13 | Group: Basic Usage 14 | Title: Important premise 15 | Language: EN 16 | 17 | 18 | 19 | -------------------------------------------------------------------------------- /hands-on-guides/template-hog/04-siab-installation.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool/Issue 2 | Tool: 3 | Platform: 4 | Need: 5 | Website: 6 | Download: 7 | Version: 8 | License: 9 | System_requirements: 10 | Admin: true/false 11 | Alternatives: 12 | Comment: 13 | Group: Basic Usage 14 | Title: Installation 15 | Language: EN 16 | 17 | 18 | 19 | -------------------------------------------------------------------------------- /hands-on-guides/template-hog/05-siab-setup.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool/Issue 2 | Tool: 3 | Platform: 4 | Need: 5 | Website: 6 | Download: 7 | Version: 8 | License: 9 | System_requirements: 10 | Admin: true/false 11 | Alternatives: 12 | Comment: 13 | Group: Basic Usage 14 | Title: Configuration 15 | Language: EN 16 | 17 | 18 | 19 | -------------------------------------------------------------------------------- /hands-on-guides/template-hog/06-siab-update.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool/Issue 2 | Tool: 3 | Platform: 4 | Need: 5 | Website: 6 | Download: 7 | Version: 8 | License: 9 | System_requirements: 10 | Admin: true/false 11 | Alternatives: 12 | Comment: 13 | Group: Basic Usage 14 | Title: Update 15 | Language: EN 16 | 17 | 18 | 19 | -------------------------------------------------------------------------------- /hands-on-guides/template-hog/07-siab-basic.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool/Issue 2 | Tool: 3 | Platform: 4 | Need: 5 | Website: 6 | Download: 7 | Version: 8 | License: 9 | System_requirements: 10 | Admin: true/false 11 | Alternatives: 12 | Comment: 13 | Group: Basic Usage 14 | Title: Basic Howto 15 | Language: EN 16 | 17 | 18 | 19 | -------------------------------------------------------------------------------- /hands-on-guides/template-hog/08-siab-problems.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool/Issue 2 | Tool: 3 | Platform: 4 | Need: 5 | Website: 6 | Download: 7 | Version: 8 | License: 9 | System_requirements: 10 | Admin: 11 | Alternatives: 12 | Comment: 13 | Group: Basic Usage 14 | Title: Problems and Solutions 15 | Language: EN 16 | 17 | 18 | 19 | -------------------------------------------------------------------------------- /hands-on-guides/template-hog/09-siab-portable.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool/Issue 2 | Tool: 3 | Platform: 4 | Need: 5 | Website: 6 | Download: 7 | Version: 8 | License: 9 | System_requirements: 10 | Admin: true/false 11 | Alternatives: 12 | Comment: 13 | Group: Basic Usage 14 | Title: Portable 15 | Language: EN 16 | 17 | 18 | 19 | -------------------------------------------------------------------------------- /hands-on-guides/template-hog/10-siab-advanced.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool/Issue 2 | Tool: 3 | Platform: 4 | Need: 5 | Website: 6 | Download: 7 | Version: 8 | License: 9 | System_requirements: 10 | Admin: true/false 11 | Alternatives: 12 | Comment: 13 | Group: Advanced Usage 14 | Title: Advanced Howto 15 | Language: EN 16 | 17 | -------------------------------------------------------------------------------- /hands-on-guides/template-hog/11-siab-addons.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool/Issue 2 | Tool: 3 | Platform: 4 | Need: 5 | Website: 6 | Download: 7 | Version: 8 | License: 9 | System_requirements: 10 | Admin: true/false 11 | Alternatives: 12 | Comment: 13 | Group: Advanced Usage 14 | Title: Add-ons 15 | Language: EN 16 | 17 | 18 | 19 | -------------------------------------------------------------------------------- /hands-on-guides/template-hog/12-siab-faq.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool/Issue 2 | Tool: 3 | Platform: 4 | Need: 5 | Website: 6 | Download: 7 | Version: 8 | License: 9 | System_requirements: 10 | Admin: true/false 11 | Alternatives: 12 | Comment: 13 | Group: FAQ 14 | Title: FAQ 15 | Language: EN 16 | 17 | 18 | 19 | -------------------------------------------------------------------------------- /hands-on-guides/template-hog/13-siab-questions.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool/Issue 2 | Tool: 3 | Platform: 4 | Need: 5 | Website: 6 | Download: 7 | Version: 8 | License: 9 | System_requirements: 10 | Admin: true/false 11 | Alternatives: 12 | Comment: 13 | Group: Training 14 | Title: Review questions 15 | Language: EN 16 | 17 | 18 | 19 | -------------------------------------------------------------------------------- /hands-on-guides/template-hog/14-siab-required_reading.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: 3 | Platform: 4 | Need: 5 | Website: 6 | Download: 7 | Version: 8 | License: 9 | System_requirements: 10 | Admin: 11 | Alternatives: 12 | Comment: 13 | Group: Required Reading 14 | Title: Required Reading 15 | Language: EN 16 | 17 | 18 | 19 | -------------------------------------------------------------------------------- /hands-on-guides/textsecure/01-textsecure-intro.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: TextSecure 3 | Platform: Google Android 4 | Need: Secure mobile messaging 5 | Website: https://whispersystems.org/ 6 | Download: https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms 7 | Version: 0.5.7 8 | License: Free/Open Source Software 9 | System_requirements: Android 1.6 or higher 10 | Admin: false 11 | Alternatives: 12 | Comment: read 03-textsecure-premise before installing and using this tool 13 | Group: Synthesis 14 | Title: Introduction 15 | Language: EN 16 | 17 | 18 | **TextSecure** is an Android-platform mobile phone application to encrypt text messages (SMS) as they are sent, or while they reside on your phone. 19 | -------------------------------------------------------------------------------- /hands-on-guides/textsecure/02-textsecure-wyg.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: TextSecure 3 | Platform: Google Android 4 | Need: Secure mobile messaging 5 | Website: https://whispersystems.org/ 6 | Download: https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms 7 | Version: 0.5.7 8 | License: Free/Open Source Software 9 | System_requirements: Android 1.6 or higher 10 | Admin: false 11 | Alternatives: 12 | Comment: This file should only be used in connection with the whole hands-on guide; read 03-textsecure-premise before installing and using this tool 13 | Group: Synthesis 14 | Title: What you will get from this guide 15 | Language: EN 16 | 17 | 18 | * Text messages to other TextSecure users can be encrypted when sent 19 | * Text messages are stored in an encrypted database on your device, protected by a passphrase 20 | * If your phone is lost or stolen, your messages will remain unreadable to those without the passphrase 21 | -------------------------------------------------------------------------------- /hands-on-guides/textsecure/03-textsecure-premise.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: TextSecure 3 | Platform: Google Android 4 | Need: Secure mobile messaging 5 | Website: https://whispersystems.org/ 6 | Download: https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms 7 | Version: 0.5.7 8 | License: Free/Open Source Software 9 | System_requirements: Android 1.6 or higher 10 | Admin: false 11 | Alternatives: 12 | Comment: 13 | Group: Basic Usage 14 | Title: Important premise 15 | Language: EN 16 | 17 | 18 | # Introduction to TextSecure 19 | 20 | - Using this application will prevent anyone from being able to read the content of your text messages, but will not hide the fact that you are sending messages, nor will it hide the destination of the message. 21 | 22 | - You should consider SMS costs, as establishing a secure connection for sending text messages will require **TextSecure** to use an SMS-message whereby both sides will send AND receive a message to establish this connection. 23 | 24 | - In some countries, an encryption programme such as **TextSecure** may be illegal or subject to legal constraints. 25 | -------------------------------------------------------------------------------- /hands-on-guides/textsecure/04-textsecure-installation.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: TextSecure 3 | Platform: Google Android 4 | Need: Secure mobile messaging 5 | Website: https://whispersystems.org/ 6 | Download: https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms 7 | Version: 0.5.7 8 | License: Free/Open Source Software 9 | System_requirements: Android 1.6 or higher 10 | Admin: false 11 | Alternatives: 12 | Comment: read 03-textsecure-premise before installing and using this tool 13 | Group: Basic Usage 14 | Title: Installation 15 | Language: EN 16 | 17 | 18 | # Install TextSecure 19 | 20 | ## Step 1 21 | 22 | **Download** the app from [from Google play store](https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms&hl=en) 23 | 24 | ![TextSecure in the Google Play store](https://securityinabox.org/sbox/screen/textsecure-en/02.png)[TextSecure img 01] 25 | 26 | *Figure 1: TextSecure in the Google Play store* 27 | 28 | ## Step 2 29 | 30 | **Install** the app (by **clicking** the appropriate install button). 31 | 32 | ![Permissions necessary for downloading](https://securityinabox.org/sbox/screen/textsecure-en/03.png)[TextSecure img 02] 33 | 34 | *Figure 2: Permissions necessary for downloading* 35 | 36 | ## Step 3 37 | 38 | **Read** and accept the [*GNU*](https://securityinabox.org/glossary#GNU_Linux) license. 39 | 40 | ![End User License Agreement](https://securityinabox.org/sbox/screen/textsecure-en/04.png)[TextSecure img 03] 41 | 42 | *Figure 3: End User License Agreement* 43 | 44 | ## Step 4 45 | 46 | **Create** a password or passphrase to encrypt the data stored on your phone 47 | 48 | ![Create and repeat a password or passphrase](https://securityinabox.org/sbox/screen/textsecure-en/05.png)[TextSecure img 04] 49 | 50 | *Figure 4: Create and repeat a password or passphrase* 51 | -------------------------------------------------------------------------------- /hands-on-guides/textsecure/05-textsecure-setup.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: TextSecure 3 | Platform: Google Android 4 | Need: Secure mobile messaging 5 | Website: https://whispersystems.org/ 6 | Download: https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms 7 | Version: 0.5.7 8 | License: Free/Open Source Software 9 | System_requirements: Android 1.6 or higher 10 | Admin: false 11 | Alternatives: 12 | Comment: read 03-textsecure-premise before installing and using this tool 13 | Group: Basic Usage 14 | Title: Configuration 15 | Language: EN 16 | 17 | 18 | ## Configure TextSecure 19 | 20 | ## Step 1 21 | 22 | **Click** on the TextSecure icon, and enter your TextSecure password. 23 | 24 | ![Enter password or passphrase](https://securityinabox.org/sbox/screen/textsecure-en/06.png)[TextSecure img 05] 25 | 26 | *Figure 5: Enter password or passphrase* 27 | 28 | ## Step 2 29 | 30 | The application will ask you if you want to copy the existing text message database on your device. It is recommended to **copy** your messages in order to have them encrypted, and **delete** them from the old location. 31 | 32 | ![Migrating text message database](https://securityinabox.org/sbox/screen/textsecure-en/07.png)[TextSecure img 06] ![Migrating text message database](https://securityinabox.org/sbox/screen/textsecure-en/08.png)[TextSecure img 07] 33 | 34 | *Figures 6 and 7: Migrating text message database* 35 | 36 | ## Step 3 37 | 38 | **Check** to make sure your old messages appear in the **TextSecure** app inbox. 39 | 40 | ## Step 4 41 | 42 | **Delete** your messages from their previous location. 43 | 44 | At this point you are ready to use **TextSecure** as your texting application. **Note:** If you do not wish to exchange encrypted text messages, you can still use **TextSecure** to securely *store* the messages you send and receive, meaning that should you lose your device, they will remain unreadable to anyone who should find it. 45 | -------------------------------------------------------------------------------- /hands-on-guides/textsecure/07-textsecure-required_reading.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: TextSecure 3 | Platform: Google Android 4 | Need: Secure mobile messaging 5 | Website: https://whispersystems.org/ 6 | Download: https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms 7 | Version: 0.5.7 8 | License: Free/Open Source Software 9 | System_requirements: Android 1.6 or higher 10 | Admin: false 11 | Alternatives: 12 | Comment: read 03-textsecure-premise before installing and using this tool 13 | Group: Required Reading 14 | Title: Required Reading 15 | Language: EN 16 | 17 | 18 | * How-to Chapter [How to use mobile phones as securely as possible](https://securityinabox.org/chapter-10)[Mobile Phones] 19 | -------------------------------------------------------------------------------- /hands-on-guides/thunderbird-enigmail/01-thunderbird-intro.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Thunderbird, gpg, Enigmail 3 | Platform: Microsoft Windows 4 | Need: Secure communication, Encryption 5 | Website: https://www.mozilla.org/en-US/thunderbird/, http://enigmail.net/, http://www.gnupg.org/ 6 | Download: https://www.mozilla.org/en-US/thunderbird/ 7 | Version: Thunderbird 3.1.5, Enigmail 1.1.2, GPG 2.0.4 8 | License: Free/Open Source Software 9 | System_requirements: Microsoft Windows 10 | Admin: false 11 | Alternatives: [gpg4usb](https://securityinabox.org/gpg4usb_portable)[gpg4usb Main] for Windows; [Claws Mail](http://www.claws-mail.org/) for GNU Linux and Microsoft Windows; [Sylpheed](http://sylpheed.sraoss.jp/en/) for GNU Linux Mac OS and Microsoft Windows; [Alpine](http://www.washington.edu/alpine/) for GNU Linux Mac OS and Microsoft Windows 12 | Comments: read 03-thunderbird-premise before installing and using this tool 13 | Group: Synthesis 14 | Title: Introduction 15 | Language: EN 16 | 17 | 18 | **Mozilla Thunderbird** is a free and open source email client for receiving, sending and storing emails. You can manage multiple email accounts through a single program. **Enigmail** and **GnuPG** will give you access to authentication, digital signing and encryption to ensure the privacy and security of your email communication. 19 | 20 | The **Mozilla Thunderbird** email client is available for **GNU Linux**, **Mac OS**, **Microsoft Windows** and other operating systems. Managing multiple email accounts is a complex task from the digital security viewpoint; therefore, we *strongly recommend* that you use **Mozilla Thunderbird** for this purpose. The security advantages available in **Thunderbird**, a cross-platform *free* and *open source* program, are even more important when compared to its commercial equivalents like **Microsoft Outlook**. However, if you would prefer to use a program other than **Mozilla Thunderbird**, we recommend the following free and open source alternatives: 21 | 22 | * **Claws Mail** available for **GNU Linux** and **Microsoft Windows**; 23 | * **Sylpheed** available for for **GNU Linux**, **Mac OS** and **Microsoft Windows**; 24 | * **Alpine** available for **GNU Linux**, **Mac OS** and **Microsoft Windows**. 25 | 26 | Note: Although we recommend using **Enigmail/GnuPG** for its ease of use with Thunderbird, you still can also use stand-alone encryption tools such as gpg4usb in conjunction with Thunderbird. Please read [gpg4usb](https://securityinabox.org/gpg4usb_portable "gpg4usb")[gpg4usb Main] chapter to see other way to encrypt your email using public key encryption method. 27 | -------------------------------------------------------------------------------- /hands-on-guides/thunderbird-enigmail/02-thunderbird-wyg.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Thunderbird, gpg, Enigmail 3 | Platform: Microsoft Windows 4 | Need: Secure communication, Encryption 5 | Website: https://www.mozilla.org/en-US/thunderbird/, http://enigmail.net/, http://www.gnupg.org/ 6 | Download: https://www.mozilla.org/en-US/thunderbird/ 7 | Version: Thunderbird 3.1.5, Enigmail 1.1.2, GPG 2.0.4 8 | License: Free/Open Source Software 9 | System_requirements: Microsoft Windows 10 | Admin: false 11 | Alternatives: [gpg4usb](https://securityinabox.org/gpg4usb_portable)[gpg4usb Main] for Windows; [Claws Mail](http://www.claws-mail.org/) for GNU Linux and Microsoft Windows; [Sylpheed](http://sylpheed.sraoss.jp/en/) for GNU Linux Mac OS and Microsoft Windows; [Alpine](http://www.washington.edu/alpine/) for GNU Linux Mac OS and Microsoft Windows 12 | Comments: This file should only be used in connection with the whole hands-on guide; read 03-thunderbird-premise before installing and using this tool 13 | Group: Synthesis 14 | Title: What you will get from this guide 15 | Language: EN 16 | 17 | 18 | * The ability to manage different e-mail accounts through a single program 19 | * The ability to read and compose messages after disconnecting from the Internet 20 | * The ability to use public key encryption to keep your email private 21 | 22 | -------------------------------------------------------------------------------- /hands-on-guides/thunderbird-enigmail/03-thunderbird-premise.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Thunderbird, gpg, Enigmail 3 | Platform: Microsoft Windows 4 | Need: Secure communication, Encryption 5 | Website: https://www.mozilla.org/en-US/thunderbird/, http://enigmail.net/, http://www.gnupg.org/ 6 | Download: https://www.mozilla.org/en-US/thunderbird/ 7 | Version: Thunderbird 3.1.5, Enigmail 1.1.2, GPG 2.0.4 8 | License: Free/Open Source Software 9 | System_requirements: Microsoft Windows 10 | Admin: false 11 | Alternatives: [gpg4usb](https://securityinabox.org/gpg4usb_portable)[gpg4usb Main] for Windows; [Claws Mail](http://www.claws-mail.org/) for GNU Linux and Microsoft Windows; [Sylpheed](http://sylpheed.sraoss.jp/en/) for GNU Linux Mac OS and Microsoft Windows; [Alpine](http://www.washington.edu/alpine/) for GNU Linux Mac OS and Microsoft Windows 12 | Comments: 13 | Group: Basic Usage 14 | Title: Important premise 15 | Language: EN 16 | 17 | 18 | # Things you should know about this tool before you start 19 | 20 | **Mozilla Thunderbird** is a cross-platform, free and open source email client for receiving, sending and storing emails. An email client is a computer application that lets you download and manage your email messages without an Internet browser. You can manage multiple email accounts using a single program. You must have an existing email account before using **Thunderbird**. You may also create **RiseUp** email accounts if you wish. 21 | 22 | **Enigmail** is an add-on developed for **Thunderbird**. It lets users access the authentication and encryption features provided by **GNU Privacy Guard** (**GnuPG**). 23 | 24 | **GnuPG** is a public key encryption program used to generate and manage the key pairs to be used in encrypting and decrypting messages, to keep your email communications private and secure. **GnuPG** must be installed for **Enigmail** to work, as will be described later in this chapter. 25 | -------------------------------------------------------------------------------- /hands-on-guides/thunderbird-enigmail/09-thunderbird-faq.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Thunderbird, gpg, Enigmail 3 | Platform: Microsoft Windows 4 | Need: Secure communication, Encryption 5 | Website: https://www.mozilla.org/en-US/thunderbird/, http://enigmail.net/, http://www.gnupg.org/ 6 | Download: https://www.mozilla.org/en-US/thunderbird/ 7 | Version: Thunderbird 3.1.5, Enigmail 1.1.2, GPG 2.0.4 8 | License: Free/Open Source Software 9 | System_requirements: Microsoft Windows 10 | Admin: false 11 | Alternatives: [gpg4usb](https://securityinabox.org/gpg4usb_portable)[gpg4usb Main] for Windows; [Claws Mail](http://www.claws-mail.org/) for GNU Linux and Microsoft Windows; [Sylpheed](http://sylpheed.sraoss.jp/en/) for GNU Linux Mac OS and Microsoft Windows; [Alpine](http://www.washington.edu/alpine/) for GNU Linux Mac OS and Microsoft Windows 12 | Comments: read 03-thunderbird-premise before installing and using this tool 13 | Group: FAQ 14 | Title: FAQ 15 | Language: EN 16 | 17 | 18 | **Q: What happens if I just install Enigmail and not GnuPG?** 19 | 20 | **A**: **Enigmail** just won't work. After all, it's the **GnuPG** software that provides the encryption engine that **Enigmail** uses. 21 | 22 | **Q: How many email accounts can I set up in Thunderbird?** 23 | 24 | **A**: As many as you like! **Thunderbird** is an email manager and can easily handle 20 or more email accounts! 25 | 26 | **Q: My friend has a Riseup and Gmail account. Should I convince him to install Thunderbird, Enigmail and GnuPG?** 27 | 28 | **A**: That would be ideal. Just make sure he configures all of his security settings in exactly the same way as you did. Then the two of you will have an extremely effective way of communicating in privacy and safety! 29 | 30 | **Q: Remind me one more time, which parts of an email message does Enigmail encrypt?** 31 | 32 | **A**: **Enigmail** encrypts the content of the message. It doesn't encrypt the subject line of the message, your email address or the name you chose to associate with that email account. So, if you're trying to send a confidential message, make sure the subject line doesn't give you away! And, if you want to stay anonymous, avoid displaying or even using your real name when you create your email account. 33 | 34 | **Q: I still don't understand the purpose of digitally signing my messages.** 35 | 36 | **A**: A digital signature proves that you're the real sender of a particular message and that the message hasn't been tampered with on its way to your intended recipient. Think of it as the electronic equivalent of the wax seal on an envelope, which contains a very important letter. 37 | 38 | -------------------------------------------------------------------------------- /hands-on-guides/thunderbird-enigmail/10-thunderbird-required_reading.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Thunderbird, gpg, Enigmail 3 | Platform: Microsoft Windows 4 | Need: Secure communication, Encryption 5 | Website: https://www.mozilla.org/en-US/thunderbird/, http://enigmail.net/, http://www.gnupg.org/ 6 | Download: https://www.mozilla.org/en-US/thunderbird/ 7 | Version: Thunderbird 3.1.5, Enigmail 1.1.2, GPG 2.0.4 8 | License: Free/Open Source Software 9 | System_requirements: Microsoft Windows 10 | Admin: false 11 | Alternatives: [gpg4usb](https://securityinabox.org/gpg4usb_portable)[gpg4usb Main] for Windows; [Claws Mail](http://www.claws-mail.org/) for GNU Linux and Microsoft Windows; [Sylpheed](http://sylpheed.sraoss.jp/en/) for GNU Linux Mac OS and Microsoft Windows; [Alpine](http://www.washington.edu/alpine/) for GNU Linux Mac OS and Microsoft Windows 12 | Comment: read 03-thunderbird-premise before installing and using this tool 13 | Group: Required Reading 14 | Title: Required Reading 15 | Language: EN 16 | 17 | 18 | * How-to Chapter [Keeping your Internet Communication Private](https://securityinabox.org/chapter-7)[Private Communication] 19 | -------------------------------------------------------------------------------- /hands-on-guides/torbrowser/01-torbrowser-intro.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Tor Browser 3 | Platform: Microsoft Windows 4 | Need: Digital Anonymity and Circumvention 5 | Website: https://www.torproject.org/ 6 | Download: https://www.torproject.org/download/download-easy.html.en 7 | Version: 3.5.3 8 | License: Free/Open Source Software 9 | System_requirements: Microsoft Windows 10 | Admin: false 11 | Alternatives: [Riseup VPN](https://help.riseup.net/en/riseup-vpn/) -- Virtual Private Network (VPN) proxy server for Linux, MAC, Android and Microsoft Windows; [Psiphon3](http://www.psiphon3.com/) -- Virtual Private Network (VPN) solution for Microsoft Windows and Android OS; [Dynaweb FreeGate](http://www.dit-inc.us/freegate) -- free proxy tool for Microsoft Windows; [Your Freedom](http://www.your-freedom.net/) -- freemium commercial proxy tool for Linux, Mac OS and Microsoft Windows 12 | Comment: read 03-torbrowser-premise before installing and using this tool 13 | Group: Synthesis 14 | Title: Introduction 15 | Language: EN 16 | 17 | 18 | The **Tor Browser** is designed to increase the anonymity of your activities on the Internet. It disguises your identity and protects your on-line activities from many forms of Internet surveillance. **Tor** can also be used to bypass Internet filters. 19 | -------------------------------------------------------------------------------- /hands-on-guides/torbrowser/02-torbrowser-wyg.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Tor Browser 3 | Platform: Microsoft Windows 4 | Need: Digital Anonymity and Circumvention 5 | Website: https://www.torproject.org/ 6 | Download: https://www.torproject.org/download/download-easy.html.en 7 | Version: 3.5.3 8 | License: Free/Open Source Software 9 | System_requirements: Microsoft Windows 10 | Admin: false 11 | Alternatives: [Riseup VPN](https://help.riseup.net/en/riseup-vpn/) -- Virtual Private Network (VPN) proxy server for Linux, MAC, Android and Microsoft Windows; [Psiphon3](http://www.psiphon3.com/) -- Virtual Private Network (VPN) solution for Microsoft Windows and Android OS; [Dynaweb FreeGate](http://www.dit-inc.us/freegate) -- free proxy tool for Microsoft Windows; [Your Freedom](http://www.your-freedom.net/) -- freemium commercial proxy tool for Linux, Mac OS and Microsoft Windows 12 | Comment: This file should only be used in connection with the whole hands-on guide; read 03-torbrowser-premise before installing and using this tool 13 | Group: Synthesis 14 | Title: What you will get from this guide 15 | Language: EN 16 | 17 | 18 | * The ability to conceal your digital identity from the websites that you visit 19 | * The ability to conceal your on-line destinations from Internet Service Providers (ISPs) and other surveillance mechanisms 20 | * The ability to bypass Internet censorship and filtering rules 21 | -------------------------------------------------------------------------------- /hands-on-guides/torbrowser/08-torbrowser-required_reading.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Tor Browser 3 | Platform: Microsoft Windows 4 | Need: Digital Anonymity and Circumvention 5 | Website: https://www.torproject.org/ 6 | Download: https://www.torproject.org/download/download-easy.html.en 7 | Version: 3.5.3 8 | License: Free/Open Source Software 9 | System_requirements: Microsoft Windows 10 | Admin: false 11 | Alternatives: [Riseup VPN](https://help.riseup.net/en/riseup-vpn/) -- Virtual Private Network (VPN) proxy server for Linux, MAC, Android and Microsoft Windows; [Psiphon3](http://www.psiphon3.com/) -- Virtual Private Network (VPN) solution for Microsoft Windows and Android OS; [Dynaweb FreeGate](http://www.dit-inc.us/freegate) -- free proxy tool for Microsoft Windows; [Your Freedom](http://www.your-freedom.net/) -- freemium commercial proxy tool for Linux, Mac OS and Microsoft Windows 12 | Comment: read 03-torbrowser-premise before installing and using this tool 13 | Group: Required Reading 14 | Title: Required Reading 15 | Language: EN 16 | 17 | 18 | How-to Chapter [How to remain anonymous and bypass censorship on the Internet](https://securityinabox.org/en/chapter-8)[Anonymous Browsing] 19 | -------------------------------------------------------------------------------- /hands-on-guides/truecrypt/01-truecrypt-intro.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Truecrypt 3 | Platform: Microsoft Windows 4 | Need: Encryption 5 | Website: https://truecrypt.ch/ 6 | Download: https://truecrypt.ch/downloads/ 7 | Version: 7.1a 8 | License: Free/Open Source Software 9 | System_requirements: Microsoft Windows 10 | Admin: true 11 | Alternatives: GNU Linux [Ubuntu](http://www.ubuntu.com/) full-disk encryption; [dm-crypt](http://www.saout.de/misc/dm-crypt/) for GNU Linux; [cryptsetup and LUKS](http://code.google.com/p/cryptsetup/) for GNU Linux; [SD4L - ScramDisk](http://sd4l.sourceforge.net/) for GNU Linux; FileVault for Mac OS; [DiskCryptor](https://diskcryptor.net/wiki/Main_Page) for Microsoft Windows 12 | Comment: read 03-truecrypt-premise before installing and using this tool 13 | Group: Synthesis 14 | Title: Introduction 15 | Language: EN 16 | 17 | 18 | **Truecrypt** keeps your files secure by preventing anyone without the correct password from opening them. It works like an electronic safe, which you can use to securely lock up your files. 19 | 20 | **Note**: On 28 May 2014 TrueCrypt developers web page started to inform users that TrueCrypt development is discontinued as of now. The circumstances behind this situation are not clear yet. The developers web page is offering a new version 7.2 of TrueCrypt with some functionality removed. Despite this new release we recommend that you continue to use older version 7.1a (see Downloading instructions), until we know more about what has happen and what plans are for the future of TrueCrypt development. For alternatives to TrueCrypt please have a look at the "GNU Linux, Mac OS and other Microsoft Windows Compatible Programs" section below. 21 | -------------------------------------------------------------------------------- /hands-on-guides/truecrypt/02-truecrypt-wyg.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Truecrypt 3 | Platform: Microsoft Windows 4 | Need: Encryption 5 | Website: https://truecrypt.ch/ 6 | Download: https://truecrypt.ch/downloads/ 7 | Version: 7.1a 8 | License: Free/Open Source Software 9 | System_requirements: Microsoft Windows 10 | Admin: true 11 | Alternatives: GNU Linux [Ubuntu](http://www.ubuntu.com/) full-disk encryption; [dm-crypt](http://www.saout.de/misc/dm-crypt/) for GNU Linux; [cryptsetup and LUKS](http://code.google.com/p/cryptsetup/) for GNU Linux; [SD4L - ScramDisk](http://sd4l.sourceforge.net/) for GNU Linux; FileVault for Mac OS; [DiskCryptor](https://diskcryptor.net/wiki/Main_Page) for Microsoft Windows 12 | Comment: This file should only be used in connection with the whole hands-on guide; read 03-truecrypt-premise before installing and using this tool 13 | Group: Synthesis 14 | Title: What you will get from this guide 15 | Language: EN 16 | 17 | 18 | * The ability to effectively protect your files from intruders or unauthorized access 19 | * The ability to easily and securely store copies of your important files 20 | 21 | -------------------------------------------------------------------------------- /hands-on-guides/truecrypt/03-truecrypt-premise.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Truecrypt 3 | Platform: Microsoft Windows 4 | Need: Encryption 5 | Website: https://truecrypt.ch/ 6 | Download: https://truecrypt.ch/downloads/ 7 | Version: 7.1a 8 | License: Free/Open Source Software 9 | System_requirements: Microsoft Windows 10 | Admin: true 11 | Alternatives: GNU Linux [Ubuntu](http://www.ubuntu.com/) full-disk encryption; [dm-crypt](http://www.saout.de/misc/dm-crypt/) for GNU Linux; [cryptsetup and LUKS](http://code.google.com/p/cryptsetup/) for GNU Linux; [SD4L - ScramDisk](http://sd4l.sourceforge.net/) for GNU Linux; FileVault for Mac OS; [DiskCryptor](https://diskcryptor.net/wiki/Main_Page) for Microsoft Windows 12 | Comment: read 03-truecrypt-premise before installing and using this tool 13 | Group: Basic Usage 14 | Title: Important premise 15 | Language: EN 16 | 17 | 18 | # Things you should know about TrueCrypt before you start 19 | 20 | **On 28 May 2014 TrueCrypt developers web page started to inform users that TrueCrypt development is discontinued as of now. The circumstances behind this situation are not clear yet. The developers web page is offering a new version 7.2 of TrueCrypt with some functionality removed. Despite this new release we recommend that you continue to use older version 7.1a (see Downloading instructions), until we know more about what has happen and what plans are for the future of TrueCrypt development. For alternatives to TrueCrypt please have a look at the "GNU Linux, Mac OS and other Microsoft Windows Compatible Programs" section below.** 21 | 22 | **TrueCrypt** will protect your data from being accessed by locking it with a password that you will create. If you forget that password, you will lose access to your data! **TrueCrypt** uses a process called encryption to protect your files. Please bear in mind that the use of encryption is illegal in some countries. Rather than encrypting specific files, **TrueCrypt** creates a protected area, called a volume, on your computer. You can safely store your files inside this encrypted volume. 23 | 24 | **TrueCrypt** offers the ability to create a standard encrypted volume or a hidden volume. Either one will keep your files confidential, but a hidden volume allows you to hide your important information behind less sensitive data in order to protect it, even if you are forced to reveal your **TrueCrypt** volume. This guide explains both volumes in detail. 25 | 26 | -------------------------------------------------------------------------------- /hands-on-guides/truecrypt/09-truecrypt-questions.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Truecrypt 3 | Platform: Microsoft Windows 4 | Need: Encryption 5 | Website: https://truecrypt.ch/ 6 | Download: https://truecrypt.ch/downloads/ 7 | Version: 7.1a 8 | License: Free/Open Source Software 9 | System_requirements: Microsoft Windows 10 | Admin: true 11 | Alternatives: GNU Linux [Ubuntu](http://www.ubuntu.com/) full-disk encryption; [dm-crypt](http://www.saout.de/misc/dm-crypt/) for GNU Linux; [cryptsetup and LUKS](http://code.google.com/p/cryptsetup/) for GNU Linux; [SD4L - ScramDisk](http://sd4l.sourceforge.net/) for GNU Linux; FileVault for Mac OS; [DiskCryptor](https://diskcryptor.net/wiki/Main_Page) for Microsoft Windows 12 | Comment: read 03-truecrypt-premise before installing and using this tool 13 | Group: Training 14 | Title: Review questions 15 | Language: EN 16 | 17 | 18 | - Standard Volume Review Questions 19 | - What is encryption? 20 | - What is a *Standard Volume*? 21 | - How can you create a *Standard Volume* on a USB memory stick? 22 | - What are the different ways to dismount a *Standard Volume*? 23 | - How can you choose and maintain a good password for your *Standard Volume*? 24 | - What are the possibilities for creating a backup of your *Standard Volume*? 25 | - What are some methods to disguise the presence of your *Standard Volume* on the computer? 26 | 27 | - Hidden Volume Review Questions 28 | - What is the main difference between a *Standard Volume* and a *Hidden Volume*? 29 | - What type of files should you put in a *Standard Volume*, if you also have a hidden one? 30 | - Where is the *Hidden Volume* located? 31 | - What is the ideal size for the *Hidden Volume*? 32 | - What are the advantages and disadvantages of protecting your *Hidden Volume* from accidental erasure? 33 | 34 | -------------------------------------------------------------------------------- /hands-on-guides/truecrypt/10-truecrypt-required_reading.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Truecrypt 3 | Platform: Microsoft Windows 4 | Need: Encryption 5 | Website: https://truecrypt.ch/ 6 | Download: https://truecrypt.ch/downloads/ 7 | Version: 7.1a 8 | License: Free/Open Source Software 9 | System_requirements: Microsoft Windows 10 | Admin: true 11 | Alternatives: GNU Linux [Ubuntu](http://www.ubuntu.com/) full-disk encryption; [dm-crypt](http://www.saout.de/misc/dm-crypt/) for GNU Linux; [cryptsetup and LUKS](http://code.google.com/p/cryptsetup/) for GNU Linux; [SD4L - ScramDisk](http://sd4l.sourceforge.net/) for GNU Linux; FileVault for Mac OS; [DiskCryptor](https://diskcryptor.net/wiki/Main_Page) for Microsoft Windows 12 | Comment: read 03-truecrypt-premise before installing and using this tool 13 | Group: Required Reading 14 | Title: Required Reading 15 | Language: EN 16 | 17 | 18 | * How-to Chapter [How to protect the sensitive files on your computer](https://securityinabox.org/chapter-4)[Secure Storage] 19 | -------------------------------------------------------------------------------- /hands-on-guides/twitter-security/01-twitter-security-intro.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Twitter 3 | Platform: Social Networks 4 | Need: Social networking 5 | Website: https://twitter.com/ 6 | Download: 7 | Version: N/A 8 | License: Proprietary Software 9 | System_requirements: Web browser; Internet connection 10 | Admin: 11 | Alternatives: [Diaspora](http://joindiaspora.com/); [Crabgrass](https://securityinabox.org/en/context/01/crabgrass-online-collaboration)[Crabgrass Main]; [Friendica](http://friendica.com/); [Pidder](https://pidder.com/); [SecureShare](http://secushare.org/) 12 | Comment: read 03-twitter-security-premise before using this tool 13 | Group: Synthesis 14 | Title: Introduction 15 | Language: EN 16 | 17 | 18 | **Twitter** is a social network in which people share information via 140-character *status updates*. These updates originally responded to the question "what are you doing now?", although it has since evolved as a means of spreading various types of information. Unlike **Facebook**, on **Twitter** you 'follow' other users who interest you, rather than people you actually know. 19 | -------------------------------------------------------------------------------- /hands-on-guides/twitter-security/02-twitter-security-wyg.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Twitter 3 | Platform: Social Networks 4 | Need: Social networking 5 | Website: https://twitter.com/ 6 | Download: 7 | Version: N/A 8 | License: Proprietary Software 9 | System_requirements: Web browser; Internet connection 10 | Admin: 11 | Alternatives: [Diaspora](http://joindiaspora.com/); [Crabgrass](https://securityinabox.org/en/context/01/crabgrass-online-collaboration)[Crabgrass Main]; [Friendica](http://friendica.com/); [Pidder](https://pidder.com/); [SecureShare](http://secushare.org/) 12 | Comment: This file should only be used in connection with the whole hands-on guide; read 03-twitter-security-premise before using this tool 13 | Group: Synthesis 14 | Title: What you will get from this guide 15 | Language: EN 16 | 17 | 18 | * The ability to **reduce** the amount of your personal information made public when you use Twitter. 19 | * The ability to **control** who can access your status updates, photos, and other data shared via Twitter. 20 | * The ability to **reduce** the amount of your personal information made available to third parties 21 | -------------------------------------------------------------------------------- /hands-on-guides/twitter-security/06-twitter-security-required_reading.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: Twitter 3 | Platform: Social Networks 4 | Need: Social networking 5 | Website: https://twitter.com/ 6 | Download: 7 | Version: N/A 8 | License: Proprietary Software 9 | System_requirements: Web browser; Internet connection 10 | Admin: 11 | Alternatives: [Diaspora](http://joindiaspora.com/); [Crabgrass](https://securityinabox.org/en/context/01/crabgrass-online-collaboration)[Crabgrass Main]; [Friendica](http://friendica.com/); [Pidder](https://pidder.com/); [SecureShare](http://secushare.org/) 12 | Comment: read 03-twitter-security-premise before using this tool 13 | Group: Required Reading 14 | Title: Required Reading 15 | Language: EN 16 | 17 | 18 | * How-to Chapter [How to protect yourself and your data when using social networking sites](https://securityinabox.org/chapter-9)[Social Networks] 19 | * Twitter's [Terms of Service](https://www.twitter.com/tos) and [Privacy Policy](https://www.twitter.com/privacy/) 20 | 21 | -------------------------------------------------------------------------------- /hands-on-guides/youtube-security/01-youtube-security-intro.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: YouTube 3 | Platform: Social Networks 4 | Need: Upload and share video content 5 | Website: https://www.youtube.com/ 6 | Download: 7 | Version: N/A 8 | License: Proprietary Software 9 | System_requirements: Web browser; Internet connection 10 | Admin: 11 | Alternatives: [Diaspora](http://joindiaspora.com/); [Crabgrass](https://securityinabox.org/en/context/01/crabgrass-online-collaboration)[Crabgrass Main]; [Friendica](http://friendica.com/); [Pidder](https://pidder.com/); [SecureShare](http://secushare.org/) 12 | Comment: read 03-youtube-security-premise before using this tool 13 | Group: Synthesis 14 | Title: Introduction 15 | Language: EN 16 | 17 | 18 | **YouTube** is a service, owned by **Google**, which allows users to upload and share video content. It has become popular among human rights defenders for sharing campaigns and evidence of human rights abuses, among other things. 19 | -------------------------------------------------------------------------------- /hands-on-guides/youtube-security/02-youtube-security-wyg.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: YouTube 3 | Platform: Social Networks 4 | Need: Upload and share video content 5 | Website: https://www.youtube.com/ 6 | Download: 7 | Version: N/A 8 | License: Proprietary Software 9 | System_requirements: Web browser; Internet connection 10 | Admin: 11 | Alternatives: [Diaspora](http://joindiaspora.com/); [Crabgrass](https://securityinabox.org/en/context/01/crabgrass-online-collaboration)[Crabgrass Main]; [Friendica](http://friendica.com/); [Pidder](https://pidder.com/); [SecureShare](http://secushare.org/) 12 | Comment: This file should only be used in connection with the whole hands-on guide; read 03-youtube-security-premise before using this tool 13 | Group: Synthesis 14 | Title: What you will get from this guide 15 | Language: EN 16 | 17 | 18 | * Tips on how to protect your privacy and that of other individuals while using YouTube to share video material. 19 | -------------------------------------------------------------------------------- /hands-on-guides/youtube-security/05-youtube-security-required_reading.txt: -------------------------------------------------------------------------------- 1 | Object_type: Tool 2 | Tool: YouTube 3 | Platform: Social Networks 4 | Need: Upload and share video content 5 | Website: https://www.youtube.com/ 6 | Download: 7 | Version: N/A 8 | License: Proprietary Software 9 | System_requirements: Web browser; Internet connection 10 | Admin: 11 | Alternatives: [Diaspora](http://joindiaspora.com/); [Crabgrass](https://securityinabox.org/en/context/01/crabgrass-online-collaboration)[Crabgrass Main]; [Friendica](http://friendica.com/); [Pidder](https://pidder.com/); [SecureShare](http://secushare.org/) 12 | Comment: read 03-youtube-security-premise before using this tool 13 | Group: Required Reading 14 | Title: Required Reading 15 | Language: EN 16 | 17 | 18 | * How-to Chapter [How to protect yourself and your data when using social networking sites](https://securityinabox.org/chapter-9)[Social Networks] 19 | * **Youtube**'s [Terms of Service](https://www.youtube.com/t/terms) and **Google**'s [Privacy Policy](https://www.google.com/intl/en/policies/privacy/) 20 | 21 | -------------------------------------------------------------------------------- /howtos/malware/01-malware-scenario.txt: -------------------------------------------------------------------------------- 1 | Object_type: Howto 2 | Howto: Protect your device from malware and hackers 3 | Need: Digital Security Fundamentals 4 | Connected_tools: avast! for Microsoft Windows; NoScript Firefox Add-On for GNU Linux, Mac OS and Microsoft Windows; COMODO Firewall for Microsoft Windows 5 | Comment: 6 | Title: Scenario 7 | Language: EN 8 | 9 | 10 | # Protect your device from malware and hackers 11 | 12 | Regardless of your broader objectives, keeping your device healthy is a critical first step down the path toward better security. So, before you begin worrying too much about strong passwords, private communication and secure deletion, for example, you need to make sure that your computer is not vulnerable to [*hackers*](/en/glossary#Hacker) or plagued by malicious software, often called [*malware*](/en/glossary#Malware), such as viruses and spyware. Otherwise, it is impossible to guarantee the effectiveness of any other security precautions you might take. After all, there is no in point locking your door if the burglar is already downstairs, and it doesn't do you much good to search downstairs if you leave the door wide open. Accordingly, this chapter explains how to maintain your software and use tools like [*Avast*](/en/glossary#Avast), [*Spybot*](/en/glossary#Spybot) and [*Comodo Firewall*](/en/glossary#Comodo_Firewall) to protect your computer against the ever-present dangers of [*malware*](/en/glossary#Malware) infection and [*hacker*](/en/glossary#Hacker) attacks. Although the tools recommended in this chapter are for Windows, which is the operating system most vulnerable to these threats, [*GNU/Linux*](/en/glossary#GNU_Linux) and Apple OS X users are also at risk and should still adopt the tactics presented below. 13 | -------------------------------------------------------------------------------- /howtos/malware/02-malware-wyg.txt: -------------------------------------------------------------------------------- 1 | Object_type: Howto 2 | Howto: Protect your device from malware and hackers 3 | Need: Digital Security Fundamentals 4 | Connected_tools: avast! for Microsoft Windows; NoScript Firefox Add-On for GNU Linux, Mac OS and Microsoft Windows; COMODO Firewall for Microsoft Windows 5 | Comment: This file should only be used in connection with the whole hands-on guide 6 | Title: What you can learn from this chapter 7 | Language: EN 8 | 9 | 10 | * More about the nature of a few of the specific threats that [*malware*](/en/glossary#Malware) poses to the privacy and integrity of your information, the stability of your computer and the reliability of other security tools 11 | 12 | * How you can use a number of recommended tools to help protect yourself from these threats 13 | 14 | * How to keep your computer secure by updating your software frequently 15 | 16 | * Why you should use [*freeware*](/en/glossary#Freeware) tools, to avoid the dangers associated with expired licenses or pirated software, and popular [*FOSS*](/en/glossary#FOSS) tools, where possible, to enhance your security 17 | -------------------------------------------------------------------------------- /howtos/malware/03-malware-description.txt: -------------------------------------------------------------------------------- 1 | Object_type: Howto 2 | Howto: Protect your device from malware and hackers 3 | Need: Digital Security Fundamentals 4 | Connected_tools: avast! for Microsoft Windows; NoScript Firefox Add-On for GNU Linux, Mac OS and Microsoft Windows; COMODO Firewall for Microsoft Windows 5 | Comment: 6 | Title: Introduction to Malware 7 | 8 | 9 | # Viruses 10 | 11 | There are many different ways to classify viruses, and each of these methods comes with its own set of colorfully-named categories. Worms, macroviruses, trojans and backdoors are some of the more well-known examples. Many of these viruses spread over the Internet, using email, malicious webpages or other means to infect unprotected computers. Others spread through removable media, particularly devices like USB memory sticks and external hard drives that allow users to write information as well as reading it. Viruses can destroy, damage or infect the information in your computer, including data on external drives. They can also take control of your computer and use it to attack other computers. Fortunately there are many anti-virus tools that you can use to protect yourself and those with whom you exchange digital information. 12 | 13 | # Spyware 14 | 15 | Spyware is a class of malicious software that can track the work you do, both on your computer and on the Internet, and send information about it to someone who shouldn't have access to it. These programs can record the words you type on your keyboard, the movements of your mouse, the pages you visit and the programs you run, among other things. As a result, they can undermine your computer's security and reveal confidential information about you, your activities and your contacts. Computers become infected with spyware in much the same way that they contract viruses, so many of the suggestions above are also helpful when defending against this second class of [*malware*](https://siabnext.ttc.io/en/glossary#Malware). Because malicious webpages are a major source of spyware infection, you should pay extra attention to the websites you visit and make sure that your browser settings are secure. 16 | -------------------------------------------------------------------------------- /howtos/malware/08-malware-furthersteps.txt: -------------------------------------------------------------------------------- 1 | Object_type: Issue 2 | Issue: Malware and Hackers 3 | Platform: Computer; Microsoft Windows 4 | Need: Digital Security Fundamentals 5 | Connected_tools: [avast!](https://siabnext.ttc.io/en/avast_main) for Microsoft Windows; [NoScript Add-On for Firefox](https://siabnext.ttc.io/hands-on-guide/firefox-windows) for GNU Linux, Mac OS and Microsoft Windows; [COMODO Firewall](https://siabnext.ttc.io/hands-on-guide/comodo-windows) for Microsoft Windows 6 | Comment: 7 | Further_reading: *Malicious Software and Spam* and *Appendix on Internet Program Settings* in the [Digital Security and Privacy for Human Rights Defenders](http://www.frontlinedefenders.org/esecman) book; [Virus Bulletin](http://www.virusbtn.com) website; [How to disable unnecessary 'Windows services'](http://www.marksanborn.net/howto/turn-off-unnecessary-windows-services); [Malware Removal Guide for Windows](http://www.selectrealsecurity.com/malware-removal-guide) 8 | Group: Solution 9 | Title: Further steps 10 | Language: EN 11 | 12 | 13 | * See the chapter on *Malicious Software and Spam* and the *Appendix on Internet Program Settings* in the [Digital Security and Privacy for Human Rights Defenders](http://www.frontlinedefenders.org/esecman) book 14 | 15 | * Keep up to-date with news about viruses on the [Virus Bulletin](http://www.virusbtn.com) website 16 | 17 | * Learn how to determine which 'Windows services' are unnecessary and [disable those you do not need](http://www.marksanborn.net/howto/turn-off-unnecessary-windows-services) 18 | 19 | * Other toolkits from the [Tactical Technology Collective](http://tacticaltech.org) can help you switch to using *FOSS* and *Freeware* tools for all of your software needs 20 | 21 | * [Download free bootable rescue CDs](http://www.askvg.com/download-free-bootable-rescue-cds-from-kaspersky-bitdefender-avira-f-secure-and-others/) to scan your computer and remove the viruses, without starting Windows on your computer 22 | 23 | * If you think your computer is infected with a virus or some other malicious software read [Malware Removal Guide for Windows](http://www.selectrealsecurity.com/malware-removal-guide) 24 | 25 | * [LibreOffice](https://www.libreoffice.org) is the power-packed free, libre and open-source personal productivity suite for Windows, Macintosh and GNU/Linux 26 | 27 | * See [Ubuntu](http://www.ubuntu.com) which is a fast, free and incredibly easy to use operating system. Ubuntu will work with your existing PC files, printers, cameras, music players and smartphones - and it comes with thousands of free apps 28 | -------------------------------------------------------------------------------- /howtos/passwords/01-passwords-scenario.txt: -------------------------------------------------------------------------------- 1 | Object_type: Issue 2 | Issue: Create and maintain secure passwords 3 | Platform: Computer; Mobile devices 4 | Need: Digital Security Fundamentals 5 | Connected_tools: [KeePassX](https://siabnext.ttc.io/how-to-guide/keepassx) 6 | Comment: 7 | Further_reading: 2.2 Password Protection and Appendix D. How long should my password be? in [Digital Security and Privacy for Human rights Defenders](https://www.frontlinedefenders.org/esecman); Wikipedia articles on [Passwords](https://en.wikipedia.org/wiki/Password), [Guidelines for password strength](https://en.wikipedia.org/wiki/Password_strength), and [password cracking](https://en.wikipedia.org/wiki/Password_cracking) 8 | Group: Synthesis 9 | Title: Scenario 10 | Language: EN 11 | 12 | 13 | Many of the secure services that allow us to feel comfortable using digital technology to conduct important business, from signing in to our computers and sending email to encrypting and hiding sensitive data, require that we remember a password. These secret words, phrases or strings of gibberish often provide the first, and sometimes the only, barrier between your information and anyone who might want to read, copy, modify or destroy it without your permission. There are many ways in which someone could learn your passwords, but you can defend against most of them by applying a few specific tactics and by using a secure password database tool, such as KeePassX. 14 | -------------------------------------------------------------------------------- /howtos/passwords/02-passwords-wyg.txt: -------------------------------------------------------------------------------- 1 | Object_type: Issue 2 | Issue: Create and maintain secure passwords 3 | Platform: Computer; Mobile devices 4 | Need: Digital Security Fundamentals 5 | Connected_tools: [KeePassX](https://siabnext.ttc.io/how-to-guide/keepassx) 6 | Comment:This file should only be used in connection with the whole hands-on guide 7 | Further_reading: 2.2 Password Protection and Appendix D. How long should my password be? in [Digital Security and Privacy for Human rights Defenders](https://www.frontlinedefenders.org/esecman); Wikipedia articles on [Passwords](https://en.wikipedia.org/wiki/Password), [Guidelines for password strength](https://en.wikipedia.org/wiki/Password_strength), and [password cracking](https://en.wikipedia.org/wiki/Password_cracking) 8 | Group: Synthesis 9 | Title: What you can learn from this chapter 10 | Language: EN 11 | 12 | 13 | * The elements of a secure password 14 | * A few tricks for remembering long, complicated passwords 15 | * How to use the KeePass secure password database to store passwords instead of remembering them 16 | -------------------------------------------------------------------------------- /howtos/passwords/03-passwords-description.txt: -------------------------------------------------------------------------------- 1 | Object_type: Issue 2 | Issue: Create and maintain secure passwords 3 | Platform: Computer; Mobile devices 4 | Need: Digital Security Fundamentals 5 | Connected_tools: [KeePassX](https://siabnext.ttc.io/how-to-guide/keepassx) 6 | Comment: 7 | Further_reading: 2.2 Password Protection and Appendix D. How long should my password be? in [Digital Security and Privacy for Human rights Defenders](https://www.frontlinedefenders.org/esecman); Wikipedia articles on [Passwords](https://en.wikipedia.org/wiki/Password), [Guidelines for password strength](https://en.wikipedia.org/wiki/Password_strength), and [password cracking](https://en.wikipedia.org/wiki/Password_cracking) 8 | Group: Main issue 9 | Title: Description 10 | Language: EN 11 | 12 | 13 | In general, when you want to protect something, you lock it up with a key. Houses, cars and bicycle locks all have physical keys; protected files have encryption keys; bank cards have PIN numbers; and email accounts have passwords. All of these keys, physical and electronic, have one thing in common: they open their respective locks just as effectively in the hands of somebody else. You can install advanced firewalls, secure email accounts, and encrypted disks, but if your password is weak, or if you allow it to fall into the wrong hands, they will not do you much good. 14 | -------------------------------------------------------------------------------- /howtos/passwords/07-passwords-furthersteps.txt: -------------------------------------------------------------------------------- 1 | Object_type: Issue 2 | Issue: Create and maintain secure passwords 3 | Platform: Computer; Mobile devices 4 | Need: Digital Security Fundamentals 5 | Connected_tools: [KeePassX](https://siabnext.ttc.io/how-to-guide/keepassx) 6 | Comment: 7 | Further_reading: 2.2 Password Protection and Appendix D. How long should my password be? in [Digital Security and Privacy for Human rights Defenders](https://www.frontlinedefenders.org/esecman); Wikipedia articles on [Passwords](https://en.wikipedia.org/wiki/Password), [Guidelines for password strength](https://en.wikipedia.org/wiki/Password_strength), and [password cracking](https://en.wikipedia.org/wiki/Password_cracking) 8 | Group: Solution 9 | Title: Further steps 10 | Language: EN 11 | 12 | 13 | * To learn more about secure passwords, see the *2.2 Password Protection* chapter and the Appendix D. How long should my password be? in the [Digital Security and Privacy for Human rights Defenders](https://www.frontlinedefenders.org/esecman) book 14 | * Wikipedia has informative articles on [Passwords](https://en.wikipedia.org/wiki/Password), [Guidelines for password strength](https://en.wikipedia.org/wiki/Password_strength), and [password cracking](https://en.wikipedia.org/wiki/Password_cracking). 15 | -------------------------------------------------------------------------------- /howtos/physical/01-physical-scenario.txt: -------------------------------------------------------------------------------- 1 | Object_type: Issue 2 | Issue: Protect your information from physical threats 3 | Platform: Computer; Storage devices; Physical environment; LANs; Mobile devices 4 | Need: Digital Security Fundamentals 5 | Connected_tools: 6 | Comment: 7 | Further_reading: *1.2 Security Awareness*, *1.3 Threat Assessment*, *2.1 Windows Security*, and *4. Case Study 1* in the [Digital Security and Privacy for Human Rights Defenders](http://www.frontlinedefenders.org/esecman) book; [Protection Manual](http://www.frontlinedefenders.org/manuals/protection) and [Protection Handbook](http://www.frontlinedefenders.org/security-training) for Human Rights Defenders 8 | Group: Synthesis 9 | Title: Scenario 10 | Language: EN 11 | 12 | 13 | No matter how much effort you have put into building a digital barrier around your computer, you could still wake up one morning to find that it, or a copy of the information on it, has been lost, stolen, or damaged by any number of unfortunate accidents or malicious acts. Anything from a power surge to an open window to a spilt cup of coffee might lead to a situation in which all of your data are lost and you are no longer able to use your computer. A careful risk assessment, a consistent effort to maintain a healthy computing environment and a written [*security policy*](/en/glossary#Security_policy) can help avoid this type of disaster. 14 | -------------------------------------------------------------------------------- /howtos/physical/02-physical-wyg.txt: -------------------------------------------------------------------------------- 1 | Object_type: Issue 2 | Issue: Protect your information from physical threats 3 | Platform: Computer; Storage devices; Physical environment; LANs; Mobile devices 4 | Need: Digital Security Fundamentals 5 | Connected_tools: 6 | Comment:This file should only be used in connection with the whole hands-on guide 7 | Further_reading: *1.2 Security Awareness*, *1.3 Threat Assessment*, *2.1 Windows Security*, and *4. Case Study 1* in the [Digital Security and Privacy for Human Rights Defenders](http://www.frontlinedefenders.org/esecman) book; [Protection Manual](http://www.frontlinedefenders.org/manuals/protection) and [Protection Handbook](http://www.frontlinedefenders.org/security-training) for Human Rights Defenders 8 | Group: Synthesis 9 | Title: What you can learn from this chapter 10 | Language: EN 11 | 12 | 13 | * More about a few of the [*physical threats*](/en/glossary#Physical_threats) to your computer and to the information stored on it 14 | * How best to secure computer equipment against some of these threats 15 | * How to create a healthy operating environment for computers and network equipment 16 | * What to consider when creating a security plan for the computers in your office 17 | -------------------------------------------------------------------------------- /howtos/physical/07-physical-mobile.txt: -------------------------------------------------------------------------------- 1 | Object_type: Issue 2 | Issue: 3 | Platform: 4 | Need: 5 | Connected_tools: 6 | Comment: 7 | Further_reading: 8 | Group: Solution 9 | Title: Mobile devices 10 | Language: EN 11 | 12 | 13 | # Portable devices 14 | 15 | - Keep your laptop, your mobile phone and other portable devices that contain sensitive information with you at all times, especially if you are travelling or staying at a hotel. Travelling with a laptop [*security cable*](/en/glossary#Security_cable) is a good idea, although it is sometimes difficult to find an appropriate object to which you can attach one. Remember that meal times are often exploited by thieves, many of whom have learnt to check hotel rooms for laptops during hours of the day when they are likely to be unattended. 16 | 17 | - If you have a laptop, tablet or other mobile device, try to avoid putting them on display. There is no need to show thieves that you are carrying such valuable hardware or to show individuals who might want access to your data that your shoulder bag contains a hard drive full of information. Avoid using your portable devices in public areas, and consider carrying your laptop in something that does not look like a laptop bag. 18 | -------------------------------------------------------------------------------- /howtos/physical/08-physical-furthersteps.txt: -------------------------------------------------------------------------------- 1 | Object_type: Issue 2 | Issue: Protect your information from physical threats 3 | Platform: Computer; Storage devices; Physical environment; LANs; Mobile devices 4 | Need: Digital Security Fundamentals 5 | Connected_tools: 6 | Comment: 7 | Further_reading: *1.2 Security Awareness*, *1.3 Threat Assessment*, *2.1 Windows Security*, and *4. Case Study 1* in the [Digital Security and Privacy for Human Rights Defenders](http://www.frontlinedefenders.org/esecman) book; [Protection Manual](http://www.frontlinedefenders.org/manuals/protection) and [Protection Handbook](http://www.frontlinedefenders.org/security-training) for Human Rights Defenders 8 | Group: Solution 9 | Title: Further steps 10 | Language: EN 11 | 12 | 13 | * For additional information on assessing risks, see the *1.2 Security Awareness*, and *1.3 Threat Assessment* sections of the [Digital Security and Privacy for Human Rights Defenders](http://www.frontlinedefenders.org/esecman) book. 14 | 15 | * For a more detailed explanation of how to set a BIOS password, see the *2.1 Windows Security* chapter in the [Digital Security and Privacy for Human Rights Defenders](http://www.frontlinedefenders.org/esecman) book. 16 | 17 | For guidelines on creating a security policy, see *4. Case Study 1* in the [Digital Security and Privacy for Human Rights Defenders](http://www.frontlinedefenders.org/esecman) book. 18 | 19 | See also the [Protection Manual](http://www.frontlinedefenders.org/manuals/protection) and [Protection Handbook](http://www.frontlinedefenders.org/security-training) for Human Rights Defenders. 20 | -------------------------------------------------------------------------------- /howtos/secure-communication/02-secure-communication-wyg.txt: -------------------------------------------------------------------------------- 1 | Object_type: Issue 2 | Issue: Keep your online communication private 3 | Platform: Email; Instant messaging; VoIP 4 | Need: Secure Communication 5 | Connected_tools: [RiseUp](https://siabnext.ttc.io/en/glossary#RiseUp) email service; [Pidgin with OTR](https://siabnext.ttc.io/hands-on-guide/pidgin-windows); [Jitsi](https://siabnext.ttc.io/hands-on-guide/jitsi-windows); [Thunderbird with Enigmail and GPG](https://siabnext.ttc.io/hands-on-guide/thunderbird-windows) 6 | Comment: This file should only be used in connection with the whole hands-on guide 7 | Further_reading: 2.5 Spoofing section in [Digital Security and Privacy for Human Rights Defenders](http://www.frontlinedefenders.org/esecman); [On Riseup Email](https://help.riseup.net/en/email); [Instructions on using Gmail](https://mail.google.com/support/bin/topic.py?topic=12769); [How to import your gmail contacts into Thunderbird](http://email.about.com/od/mozillathunderbirdtips/qt/et_gmail_addr.htm) 8 | Group: Synthesis 9 | Title: What you can learn from this chapter 10 | Language: EN 11 | 12 | 13 | * Why most webmail and instant messaging services are not secure 14 | * How to create a new and more secure email account 15 | * How to improve the security in your current email account 16 | * How to use a secure instant messaging service 17 | * What to do if you think someone might be accessing your email 18 | * How to verify the identity of an email correspondent 19 | -------------------------------------------------------------------------------- /howtos/secure-file-storage/01-secure-file-storage-scenario.txt: -------------------------------------------------------------------------------- 1 | Object_type: Issue 2 | Issue: Protect the sensitive files on your computer 3 | Platform: Computer; Mobile devices; Storage devices 4 | Need: Secure Data Storage 5 | Connected_tools: [Truecrypt](https://siabnext.ttc.io/hands-on-guide/truecrypt-windows) 6 | Comment: 7 | Further_reading: 2.4 Cryptology chapter, 2.8 Steganography Chapter and 4.2 Case Study 3 in [Digital Security and Privacy for Human Rights Defenders](http://www.frontlinedefenders.org/esecman); [TrueCrypt Documentation](http://andryou.com/truecrypt/docs/index.php); [TrueCrypt FAQ](http://andryou.com/truecrypt/faq.php) 8 | Group: Synthesis 9 | Title: Scenario 10 | Language: EN 11 | 12 | 13 | Unauthorised access to the information on your computer or portable storage devices can be carried out remotely, if the 'intruder' is able to read or modify your data over the Internet; or physically, if he manages to get hold of your hardware. You can protect yourself against either type of threat by improving the physical and network security of your data, as discussed in [***Chapter 1: How to protect your computer from malware and hackers***](/en/chapter-1) and [***Chapter 2: How to protect your information from physical threats***](/en/chapter-2). It is always best to have several layers of defence, however, which is why you should also protect the files themselves. That way, your sensitive information is likely to remain safe even if your other security efforts prove inadequate. 14 | 15 | There are two general approaches to the challenge of securing your data in this way. **You can *[encrypt](/en/glossary#Encryption)* your files**, making them unreadable to anyone but you, or **you can hide them** in the hope that an intruder will be unable to find your sensitive information. There are tools to help you with either approach, including a [*FOSS*](/en/glossary#FOSS) application called [*TrueCrypt*](/en/glossary#TrueCrypt), which can both *[encrypt](/en/glossary#Encryption)* and hide your files. 16 | -------------------------------------------------------------------------------- /howtos/secure-file-storage/02-secure-file-storage-wyg.txt: -------------------------------------------------------------------------------- 1 | Object_type: Issue 2 | Issue: Protect the sensitive files on your computer 3 | Platform: Computer; Mobile devices; Storage devices 4 | Need: Secure Data Storage 5 | Connected_tools: [Truecrypt](https://siabnext.ttc.io/hands-on-guide/truecrypt-windows) 6 | Comment: This file should only be used in connection with the whole hands-on guide 7 | Further_reading: 2.4 Cryptology chapter, 2.8 Steganography Chapter and 4.2 Case Study 3 in [Digital Security and Privacy for Human Rights Defenders](http://www.frontlinedefenders.org/esecman); [TrueCrypt Documentation](http://andryou.com/truecrypt/docs/index.php); [TrueCrypt FAQ](http://andryou.com/truecrypt/faq.php) 8 | Group: Synthesis 9 | Title: What you can learn from this chapter 10 | Language: EN 11 | 12 | 13 | * How to [*encrypt*](/en/glossary#Encryption) information on your computer 14 | * What risks you might face by keeping your data [encrypted](/en/glossary#Encryption) 15 | * How to protect data on USB memory sticks, in case they are lost or stolen 16 | * What steps you can take to hide information from physical or remote intruders 17 | -------------------------------------------------------------------------------- /howtos/secure-file-storage/03-secure-file-storage-description.txt: -------------------------------------------------------------------------------- 1 | Object_type: Issue 2 | Issue: Protect the sensitive files on your computer 3 | Platform: Computer; Mobile devices; Storage devices 4 | Need: Secure Data Storage 5 | Connected_tools: [Truecrypt](https://siabnext.ttc.io/hands-on-guide/truecrypt-windows) 6 | Comment: 7 | Further_reading: 2.4 Cryptology chapter, 2.8 Steganography Chapter and 4.2 Case Study 3 in [Digital Security and Privacy for Human Rights Defenders](http://www.frontlinedefenders.org/esecman); [TrueCrypt Documentation](http://andryou.com/truecrypt/docs/index.php); [TrueCrypt FAQ](http://andryou.com/truecrypt/faq.php) 8 | Group: Main issue 9 | Title: Description 10 | Language: EN 11 | 12 | 13 | # Encrypting your information 14 | 15 | [*Encrypting*](/en/glossary#Encryption) your information is a bit like keeping it in a locked safe. Only those who have a key or know the lock's combination (an [*encryption*](/en/glossary#Encryption) key or password, in this case) can access it. The analogy is particularly appropriate for [*TrueCrypt*](/en/glossary#TrueCrypt) and tools like it, which create secure containers called 'encrypted volumes' rather than simply protecting one file at a time. You can put a large number of files into an [*encrypted*](/en/glossary#Encryption) volume, but these tools will not protect anything that is stored elsewhere on your computer or USB memory stick. 16 | 17 | While other software can provide similar strength *[encryption](/en/glossary#Encryption)*, [*TrueCrypt*](/en/glossary#TrueCrypt) contains several important features to allow you to design your information security strategy. It offers the possibility of permanently **encrypting the whole disk of your computer** including all your files, all temporary files created during your work, all programs you have installed and all Windows operating system files. TrueCrypt supports *[encrypted](/en/glossary#Encryption)* volumes on portable storage devices. It provides 'deniability' features described in the [***Hiding your sensitive information***](/en/chapter_4_2) section below. In addition TrueCrypt is a [*free and open source*](/en/glossary#FOSS) program. 18 | -------------------------------------------------------------------------------- /howtos/secure-file-storage/06-secure-file-storage-furthersteps.txt: -------------------------------------------------------------------------------- 1 | Object_type: Issue 2 | Issue: Protect the sensitive files on your computer 3 | Platform: Computer; Mobile devices; Storage devices 4 | Need: Secure Data Storage 5 | Connected_tools: [Truecrypt](https://siabnext.ttc.io/hands-on-guide/truecrypt-windows) 6 | Comment: 7 | Further_reading: 2.4 Cryptology chapter, 2.8 Steganography Chapter and 4.2 Case Study 3 in [Digital Security and Privacy for Human Rights Defenders](http://www.frontlinedefenders.org/esecman); [TrueCrypt Documentation](http://andryou.com/truecrypt/docs/index.php); [TrueCrypt FAQ](http://andryou.com/truecrypt/faq.php) 8 | Group: Solution 9 | Title: Further steps 10 | Language: EN 11 | 12 | 13 | * For additional information on securing your files, see the *2.4 Cryptology* chapter, the *2.8 Steganography* Chapter and *4.2 Case Study 3* from the [Digital Security and Privacy for Human Rights Defenders](http://www.frontlinedefenders.org/esecman) book. 14 | * The [TrueCrypt Documentation](http://andryou.com/truecrypt/docs/index.php) discusses in details many aspects of information encryption and [TrueCrypt FAQ](http://andryou.com/truecrypt/faq.php) provides answers to some common questions about TrueCrypt. 15 | -------------------------------------------------------------------------------- /howtos/template-issues/01-siab-scenario.txt: -------------------------------------------------------------------------------- 1 | Object_type: Issue 2 | Howto: Keep your online communication private 3 | Need: Secure Communication 4 | Connected_tools: RiseUp email service; Pidgin with OTR; Jitsi; Thunderbird with Enigmail and GPG 5 | Comment: 6 | Chapter: 7 | Title: 8 | Language: EN 9 | 10 | 11 | 12 | -------------------------------------------------------------------------------- /howtos/template-issues/02-siab-wyg.txt: -------------------------------------------------------------------------------- 1 | Object_type: Issue 2 | Issue: 3 | Platform: 4 | Need: 5 | Connected_tools: 6 | Comment: This file should only be used in connection with the whole hands-on guide 7 | Further_reading: 8 | Group: Synthesis 9 | Title: What you can learn from this chapter 10 | Language: EN 11 | 12 | 13 | 14 | -------------------------------------------------------------------------------- /howtos/template-issues/03-siab-description.txt: -------------------------------------------------------------------------------- 1 | Object_type: Issue 2 | Issue: 3 | Platform: 4 | Need: 5 | Connected_tools: 6 | Comment: 7 | Further_reading: 8 | Group: Main issue 9 | Title: Description 10 | Language: EN 11 | 12 | 13 | 14 | -------------------------------------------------------------------------------- /howtos/template-issues/04-siab-bestpractices.txt: -------------------------------------------------------------------------------- 1 | Object_type: Issue 2 | Issue: 3 | Platform: 4 | Need: 5 | Connected_tools: 6 | Comment: 7 | Further_reading: 8 | Group: Solution 9 | Title: Best practices 10 | Language: EN 11 | 12 | 13 | 14 | -------------------------------------------------------------------------------- /howtos/template-issues/05-siab-prevention.txt: -------------------------------------------------------------------------------- 1 | Object_type: Issue 2 | Issue: 3 | Platform: 4 | Need: 5 | Connected_tools: 6 | Comment: 7 | Further_reading: 8 | Group: Solution 9 | Title: Prevention 10 | Language: EN 11 | 12 | 13 | 14 | -------------------------------------------------------------------------------- /howtos/template-issues/06-siab-tools.txt: -------------------------------------------------------------------------------- 1 | Object_type: Issue 2 | Issue: 3 | Platform: 4 | Need: 5 | Connected_tools: 6 | Comment: 7 | Further_reading: 8 | Group: Solution 9 | Title: Tools 10 | Language: EN 11 | 12 | 13 | 14 | -------------------------------------------------------------------------------- /howtos/template-issues/07-siab-tips.txt: -------------------------------------------------------------------------------- 1 | Object_type: Issue 2 | Issue: 3 | Platform: 4 | Need: 5 | Connected_tools: 6 | Comment: 7 | Further_reading: 8 | Group: Solution 9 | Title: Tips 10 | Language: EN 11 | 12 | 13 | 14 | -------------------------------------------------------------------------------- /howtos/template-issues/08-siab-risks.txt: -------------------------------------------------------------------------------- 1 | Object_type: Issue 2 | Issue: 3 | Platform: 4 | Need: 5 | Connected_tools: 6 | Comment: 7 | Further_reading: 8 | Group: Solution 9 | Title: Implied risks 10 | Language: EN 11 | 12 | 13 | 14 | -------------------------------------------------------------------------------- /howtos/template-issues/09-siab-advanced.txt: -------------------------------------------------------------------------------- 1 | Object_type: Issue 2 | Issue: 3 | Platform: 4 | Need: 5 | Connected_tools: 6 | Comment: 7 | Further_reading: 8 | Group: Solution 9 | Title: Advanced 10 | Language: EN 11 | 12 | -------------------------------------------------------------------------------- /howtos/template-issues/10-siab-mobile.txt: -------------------------------------------------------------------------------- 1 | Object_type: Issue 2 | Issue: 3 | Platform: 4 | Need: 5 | Connected_tools: 6 | Comment: 7 | Further_reading: 8 | Group: Solution 9 | Title: Mobile devices 10 | Language: EN 11 | 12 | 13 | 14 | -------------------------------------------------------------------------------- /howtos/template-issues/11-siab-faq.txt: -------------------------------------------------------------------------------- 1 | Object_type: Issue 2 | Issue: 3 | Platform: 4 | Need: 5 | Connected_tools: 6 | Comment: 7 | Further_reading: 8 | Group: Background scenario 9 | Title: FAQ 10 | Language: EN 11 | 12 | 13 | 14 | -------------------------------------------------------------------------------- /howtos/template-issues/12-siab-furthersteps.txt: -------------------------------------------------------------------------------- 1 | Object_type: Issue 2 | Issue: 3 | Platform: 4 | Need: 5 | Connected_tools: 6 | Comment: 7 | Further_reading: 8 | Group: Solution 9 | Title: Further steps 10 | Language: EN 11 | 12 | 13 | 14 | --------------------------------------------------------------------------------