Internet Privacy : How to Encrypt all your activities on the Internet

Internet Privacy

Internet Privacy : Internet use is very common in every one’s life at the same time Internet Privacy is also very important matter in our general life, Every one using Internet in various areas like Business, Communication (Email & Audio, Video Chating), Online Services, Online Shopping, Banking & many more services. While using Internet for various  services we must know Internet Privacy & How it Works. In this article we will talk about how to make a presence on the Internet invisible and how to prevent unauthorized access to information about you and your activities on the web.

1. Mask the IP Address (How To Hide IP Addres)

You can hide IP Address by using some Websites or online services to the outside world. It means if you browse or use any online service, that particular service owners will try to track their users. if you use they will track your IP. but you can hide your IP Address. For example, a service with the eloquent title Hide My Ass provides not only the possibility of free anonymous proxy server, but also features a secure connection Secure Sockets Layer (SSL), providing secure access to the requested page is not allowing you to view the data forwarded. There are other free services of anonymous proxy servers that support SSL, such as Proxy  Networks or Proximize.Me . But do not forget that the most noticeable drawback of surfing through the Web Proxy – a significant reduction in the speed of access and loading pages.

Also Read :

Private Browsing : Secure your information on the Web
Proxy Server – Work with a proxy server

2. Access the Internet through a VPN

A more efficient way to hide the traces of their activity on the Internet using the World Wide Web via a VPN(Virtual Private Network). These networks not only can encrypt all traffic, but also redirect it through a chain of servers, so keep track of your activities would be virtually impossible – the truth, except for the cases when the VPN provider undertakes to provide your logs at the official request of law enforcement authorities, which should separately specified in the user agreement. The most VPN providers provide paid services. but there are free simplified services available with minimum required functions. VPNBook provides completely free services to its virtual private network that supports cross-platform technologies or OpenVPN tunneling protocol PPTP (Point-to-Point Tunneling Protocol) such as “point to point”. It is well suitable service to anonymity your privacy on Internet.

3. Increased anonymity using Tor Browser

Want even more anonymity and security? Then you will come to the aid of technology called “onion routing”, patented by the Navy of the United States. The purpose behind this is that all the transmitted data is encrypted and decrypted many times, going through a sequence of “onion routers”, each of which forwards the data to random routers in the network. As a result lost need guaranteed reliability of each of these routers, it is impossible to determine where the data originally transmitted. Of course, like any other, this technology also has a vulnerability, but if used, it guarantees a very high level of security. Tor(The Onion Router) is a browser which is transmit data in the form of encryption to to protect any activity over the Internet.

4. The substitution of a real e-mail address.

The original plug Gliph for browsers Chrome and Firefox, as well as mobile devices running Android and iOS uses its unusual system of authentication in which the place of the usual letters and numbers take a combination of characters. But for us, it is another interesting feature that allows you to hide your real e-mail address – for example, when dealing with strangers or when placing different ads – and replace it specifically generated on the domain such addresses, you can send emails and receive answers to them, which will be forwarded to your real address.

Internet Privacy

Internet Privacy

5. Encryption of posts in social networks

It would seem that social networks are designed to ensure that your message saw as many potential friends, but in some cases, not only wants to limit the number of readers’ groups or Friend, but also to obtain additional guarantees that the message will not see an outsider. Browser plug Scrambls able to encrypt posts on social networks so that unauthorized groups or individual users, they will look like random characters. Scrambls is available as a plugin for Chrome, Firefox, Safari, Firefox for Android and Scrambls Social for iOS, allows you to encrypt and decrypt messages on Twitter. In addition, there is a separate application for Windows 7, 8, and XP, to encrypt files and folders to be sent later by email, post or in file storage on removable drives. To use the plugin Scrambls registration required. All text placed between the markers @ @ will be encrypted. By default, it will be able to see all of the user Scrambls, but you can create your own group by logging into your account, which, in fact, need to register.

6. Chat Encryption

Plug-in for browsers Chrome, Firefox and Safari called Cryptocat can create a private encrypted online chat rooms that are not available to casual users. To participate in the chat will be able to 10 people, who will introduce the key correctly, and all communication logs are deleted after 30 minutes of inactivity. To work with Cryptocat need to install a plugin to create a chat and a user name, and then will be automatically generated encryption key, re-created for each chat. Each participant must know which chat room you want to connect, and which key to enter. In this Cryptocat does not hide IP-address, so for increased anonymity creators chat recommend to run it in the browser Tor.

7. Email Encryption

E-mail the Web – one of the most frequently break open the applications to get virtually unlimited access to any network application used by the victim, as well as to all her contacts. In turn, the encryption can further protect your mail from prying eyes. In addition, online services themselves will not be able to read your mail – as, for example, Google, showing contextual ads based on the content of letters. This may help to plug Mailvelope , while working only with the browser Chrome; option for Firefox is still under development, although the pre-release version is already available. Mailvelope plugin integrates directly into the interface postal service is compatible with popular services Gmail, Yahoo Mail,, GMX and, according to the developers, can be used with any other similar site.

8. Encrypt files placed on cloud services

There are many Cloud Services available (Ex:Amazon Cloud Drive, Dropbox, Google Drive) to store files online. all the data stored on the Internet. To save your files from prying eyes, it makes sense to encrypt them. Extremely convenient service for encryption “on the fly” files that are placed in cloud storage. BoxCryptor available in versions for Windows, MacOS X, Linux, Android and iOS to Encrypt files placed on cloud services. After installation BoxCryptor allows you to create a folder on the local drive, when placed in that will automatically encrypt all files. This folder can also be a folder that automatically syncs with the cloud storage (eg, Dropbox), which makes the whole process as automated.

Article on “Internet Privacy”

32% off new products now at GoDaddy....!Click Here