Safe work program – Some tips to protect your data


I will not go into phones and instant messengers, their privacy and anonymity is a big issue, more precisely, it is just a matter of time and money, as any of the messaging programs downloaded from the Appstore and Play Market give the entire history of your messages with all the attachments.

Today we will focus on the minimum set of programs for your PC. Many people believe that a VPN is more than anonymity, you can do whatever you want. this is not true. If the agent is not anonymous, you can see who is calling, that’s not much of an issue.

Big money sites sneak into your registry in order to find out information about your computer. So, with a VPN, you can simply change the IP address. After reviewing the IP address string, you can find out which central IP the requests are from (your IP) and then wait for the guests.

With a proxy, the picture is almost the same, especially since everything is free of charge from selling your data, you must understand this.

Safe work program

So, let’s move on to the program I recommend for safe work:




SMAC 2.0

Main menu for Privacy Suite

True crypt

Proxyfier (or any other proxy)



VMware Workstation – or just cooking.

O&O SafeErase


I will explain in general terms for each program:

  • STZBlaster – is a program to change Computer Name, Host, Processor ID, Hard Drive Size, MAC Address, and much more. Also, in the program, you can also change the regional settings. The only thing I want to point out is that you shouldn’t trust it to change IAS.
  • RMOSChange.exe – The program changes the HTTP headers for popular browsers (Mozilla, IE, Mozilla (old)). The essence of the program and why it is needed. Firstly, if scripts are enabled, data is transmitted such as browser version, browser language, user agent, and operating system. Wouldn’t it be strange if we went to the shell from a Russian browser, but through American socks \\ ssh? (Of course, you can put the English version of the browser, but there are fewer hemorrhoids. Second, if you use American or Dedicated \\ Soks \\ Vpn, then you need to change the IE settings, because it’s the most popular browser out there. It’s necessary, on ” What I think, is not worth mentioning.
  • SMAC 2.0 – The software impersonates the MAC addresses of the network card. You can change the MAC address once a month and everything will be fine.
  • Privacy group main menu – Encrypt and hide our container, already created by TrueCrypt, in jpg and wav files. You can also create a safe. Another indisputable feature of this program is that it irreversibly destroys files. You can also encrypt on a USB flash drive. We also open the encrypted container without the need to reinstall the program.
  • TrueCrypt – I think this is the best data encryption program.
  • Proxyfier is a simple proxy. It is possible to determine which application needs to be oxidized. (Looks like you can add an inappropriate app to this)
  • OpenVPN GUI – OpenVPN client, necessary to connect to vpn server.
  • VPSProxy – is a new program, so I’d like to say the main program in this list. The essence of the program is that we use submerged gates for shells \\ hosts \\ server like socks. The main feature of the program is that the incoming and outgoing gateway is constantly changing. Use only on vpn / ssh (c). I will not describe how to prepare. Everything is described in detail in the manual.
  • VMware – Workstation is the most popular system virtualization software. Why is it needed? Everything is very simple, again, if you have scripts enabled in your browser (which is essential for shells), then with IP and dns, etc. The operating system language is also transferred. The scheme is simple, we put in the cooker, then we buy a cooker tailgate patch, or we use one per year (if you find a patch without vir, you’re in luck). We take all the gray programs and throw them on the cook. If you feel something is wrong, use Privacy Suite three times and format it in NTFS with some software.
  • 10. O&O SafeErase – is a program you must trust to delete files permanently. Several operating methods.

This is the minimum set of software that, with TOR, should be available to everyone involved in debilitating affairs, even if it isn’t too dirty.

Leave A Reply

Your email address will not be published.