the leave-no-trace method
thx yyy111 for yr explanations. to some this will be overly technical, but try this for an overview:
u have a Windows box plugged into the Net. is it safe? if it's YOURS and u've an idea of how it cd be compromised, that's one thing. let's say u know NOTHING about the machine. it's in a cybercafe in Lagos. whatever.
u pull out yr USB drive, which contains:
a Linux OS
a browser
whatever files u need
u plug it in and boot the machine FROM THE USB DRIVE. u can easily get all u need with an 8GB USB-stick, if u use Linux (the ppl i know who do this swear by Linux).
u then log on using YOUR system. browse the Net, do whatever (i haven't done this myself, others know FAR more about this than i do). when yr finished, u eject the disk, stick it in yr pocket, and reboot the machine.
have i got it about right, yyy111? thanks again for contributing to this discussion.
JtB | |