1.Use Bootable DVD's Linux has plenty.
Ubuntu,Fedora,others.
Create a Bootable Windows 10 DVD.
Stay away from HD,USB Drives or Pen drives,
as Malware can be inserted in them.
2.Use branded Hardware and Software.
3.Use Windows 10. Most secure OS.
Create a Windows 10 Bootable DISC immediately after
purchase and before you install any other software
or connect to the Internet.
4.Flash the BIOS,eliminate firmware BIOS Malware.
5.Use Opera Developer version with built in VPN.
6.Use TOR.
7.Use PGP.Easy setup with Mozilla Thunderbird ,enigmail.
8.Use strong passwords.
9.Create strong passwords and use that to encrypt the email.
Share this password with the recipient.Use an offline
computer or HD specifically to read this encrypted email.
Ubuntu,Fedora,others.
Create a Bootable Windows 10 DVD.
Stay away from HD,USB Drives or Pen drives,
as Malware can be inserted in them.
2.Use branded Hardware and Software.
3.Use Windows 10. Most secure OS.
Create a Windows 10 Bootable DISC immediately after
purchase and before you install any other software
or connect to the Internet.
4.Flash the BIOS,eliminate firmware BIOS Malware.
5.Use Opera Developer version with built in VPN.
6.Use TOR.
7.Use PGP.Easy setup with Mozilla Thunderbird ,enigmail.
8.Use strong passwords.
9.Create strong passwords and use that to encrypt the email.
Share this password with the recipient.Use an offline
computer or HD specifically to read this encrypted email.
No comments:
Post a Comment