Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone
  • Android

Pour obtenir l'appli gratuite, saisissez votre numéro de téléphone mobile.

Prix Kindle : EUR 4,68

Économisez
EUR 5,14 (52%)

TVA incluse
<hza:string id="udp_accessibility_ku_badge"/>
Empruntez ce titre et accédez à plus d'un million d'ebooks, dont plus de 25 000 en français. En savoir plus. Le prix d'emprunt à la page est disponible ici. En savoir plus

Ces promotions seront appliquées à cet article :

Certaines promotions sont cumulables avec d'autres offres promotionnelles, d'autres non. Pour en savoir plus, veuillez vous référer aux conditions générales de ces promotions.

OU
Emprunter
avec l'Abonnement Kindle

Envoyer sur votre Kindle ou un autre appareil

Envoyer sur votre Kindle ou un autre appareil

Incognito Toolkit - Tools, Apps, and Creative Methods for Remaining Anonymous, Private, and Secure While Communicating, Publishing, Buying, and Researching Online (English Edition) par [Robideau, Rob]
Publicité sur l'appli Kindle

Incognito Toolkit - Tools, Apps, and Creative Methods for Remaining Anonymous, Private, and Secure While Communicating, Publishing, Buying, and Researching Online (English Edition) Format Kindle


Voir les formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
EUR 4,68

Longueur : 224 pages Word Wise: Activé Composition améliorée: Activé
Page Flip: Activé Langue : Anglais

Descriptions du produit

Présentation de l'éditeur

There are many books that will tell you what to do - use prepaid burner phones and anonymous email accounts, encrypt your communications and data, make your purchases anonymously - but Incognito Toolkit will show you how and give you the tools to actually do it. With laws getting stricter by the day and making it more and more difficult to properly protect your personal information, you need the most up-to-date information and tools available and that's what you will find in Incognito Toolkit!

Don't let snoopers, investigators, and scammers look over your shoulder or track you while you work and play on the internet!

Learn about the tools that will help you use the internet anonymously, privately, and securely to protect assets, avoid social stigmas, and make you safer. This book is full of information that large corporations, scammers, and nosy governments don't want you to find! You won't find a collection of techniques and creative methods like this anywhere else!

Covered in Incognito Toolkit:
- Making truly anonymous online purchases
- Shortcomings of Bitcoin
- Encrypting communications
- Encryption for online file storage solutions
- Locking down and monitoring your hardware
- Browser Fingerprinting
- Using TOR and VPNs
- Creative Text and File Steganography Techniques
- Critical Techniques for Publishing Anonymously
- Cleaning photo and video metadata
- Dealing with tracking cookies

Updated December 4th, 2013 with new information about credit card skimmers, TOR hardware devices, and more!

Scroll up and click the "Look Inside" feature on the top left hand side of the page!

Détails sur le produit

  • Format : Format Kindle
  • Taille du fichier : 8863 KB
  • Nombre de pages de l'édition imprimée : 224 pages
  • Utilisation simultanée de l'appareil : Illimité
  • Editeur : Pearne Publishing (4 décembre 2013)
  • Vendu par : Amazon Media EU S.à r.l.
  • Langue : Anglais
  • ASIN: B00G2A2A1O
  • Synthèse vocale : Activée
  • X-Ray :
  • Word Wise: Activé
  • Composition améliorée: Activé
  • Moyenne des commentaires client : Soyez la première personne à écrire un commentaire sur cet article
  • Classement des meilleures ventes d'Amazon: n°160.228 dans la Boutique Kindle (Voir le Top 100 dans la Boutique Kindle)
  •  Voulez-vous faire un commentaire sur des images ou nous signaler un prix inférieur ?


Quels sont les autres articles que les clients achètent après avoir regardé cet article?

click to open popover

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoile

Commentaires client les plus utiles sur Amazon.com (beta)

Amazon.com: HASH(0x975b5fd8) étoiles sur 5 57 commentaires
15 internautes sur 15 ont trouvé ce commentaire utile 
HASH(0x975ebbdc) étoiles sur 5 Offers More Information Than I'd Have Believed Possible 16 janvier 2014
Par Terry Sunday - Publié sur Amazon.com
Format: Format Kindle
When Rob Robideau offered me a review copy of his e-book "Incognito Toolkit: Tools, Apps and Creative Methods for Remaining Anonymous, Private and Secure While Communicating, Publishing, Buying and Researching Online" (whew--the title is long enough to be the whole review!), I really didn't know what to expect. As a casual Internet user, but not a computer or communications expert by any means, I thought I already knew enough about online security issues to at least use secure passwords, and to take certain obvious, rudimentary steps to protect my privacy and personal information whilst browsing the Web.

As it turns out, I knew nothing.

Mr. Robideau's book is an amazing resource that contains more detailed, useful, nuts-and-bolts information than I would have believed he could cram into it. It's chock-full of techniques, tips and tricks that any and all Internet users need to know in order to protect themselves online. Oh, I suppose the NSA could defeat many or all of them, but at least Mr. Robideau offers practical ways for users to control the hemorrhaging of their personal information onto the Internet, and its possible use by unscrupulous parties.

His book is much more than first meets the eye. It also features embedded links to websites to hit for more information on many of the topics, and from which you can obtain, mostly free, the software applications and browser extensions that he recommends to improve your privacy and anonymity. A couple of the links I tried produced the dreaded 404 error, but most of them are active and relevant, and thus enormously increase the book's interactivity, scope and usefulness. The Lastpass and Fake Name Generator applications, for example, especially interest me. Every Internet user should find these valuable. Some of his discussions are more technical than I could absorb completely on a first pass, and some seem intended for those with more paranoia and/or less regard for the law than I, and presumably most other readers, have. But his treatment of the subject is extremely thorough, and you can use as many or as few of his recommendations as you like. Even if you only adopt the minimum, you'll still be far better off--and far more anonymous online.

Before I read "Incognito Toolkit, etc., etc.," I didn't even know how much I didn't know about the subject. Now, armed with the valuable information and recommendations it contains, I will take steps to ensure my online privacy is protected to an appropriate degree. You should, too.
34 internautes sur 39 ont trouvé ce commentaire utile 
HASH(0x975ebc30) étoiles sur 5 A Valuable Resource For Implementing and Maintaining Security and Privacy On The Internet 19 novembre 2013
Par goldenb - Publié sur Amazon.com
Format: Format Kindle
If you think there is little to nothing you can do to maintain some sort of security and privacy when accessing the Internet, think again. The author of this book has provided information on a number of security products and strategies for the reader to choose from depending on his or her Internet activities and preferences. What I especially like about this book, even more than the many useful products and associated links, is the way the author expands on many of the products' descriptions and usage to help the reader establish a security "mindset". Having spent 20 years actively involved in the computer security field for a major financial institution, I consider this mindset to be critical for an Internet user if privacy and security are to be achieved and maintained.

There are many key topics covered in this book. First of all, the author provides considerable information on the highly effective Tor Project software, one of the most important tools for achieving privacy and anonymity on the Internet. Maybe you have a need for temporary e-mail addresses that forward mail to a "real" e-mail address? You will find out about products that do that too (I have made extensive use of one for years called GishPuppy). Or software for generating strong passwords, tactics for keeping your E-mails private, encrypting stored date, and tips on keeping financial transactions private including a nice section on Bitcoin. Plus there's more such as security considerations when using social networks, recommendations for Google Chrome and Mozilla Firefox extensions as well as mobile apps. There is much to like in this book.

I was provided with a copy of this book in exchange for my honest review and feel fortunate in receiving it. Some of the products and strategies mentioned I was familiar with but there were others that were completely new to me. Highly recommended - both for those new to computer security and privacy issues as well as more seasoned users.
13 internautes sur 14 ont trouvé ce commentaire utile 
HASH(0x975f1084) étoiles sur 5 Informative, concise, and comprehensive. 2 décembre 2013
Par Bruce - Publié sur Amazon.com
Format: Format Kindle
I found this book packed with information that is very helpful to anyone wanting to reduce their digital footprint.
I know that I have not taken the time to gather all of the information related to doing this, but the author of this book has put in extensive time and research that in turn will save me and others the time of doing so. I learned several things while reading this book and got new ideas on how to use my information. I think that one could use this as a manual and be able to reference it frequently in order to use the tools contained within this book. This book was written with simplicity, even when talking about some of the things that some of us have never worked with before. The explanations and examples were very clear so that one who has never implemented anything like some of the tools being taught could understand very easily.

In today's age, your information is being attacked and used by criminals, governments, and corporations alike. All have varied agendas, but you are the one who suffers. Everyone should take at least some of the steps listed in this book. I feel that the information is valuable and certainly usable. It is worth the price being paid and much more since it can further protect your identity and personal information. Why do people buy products such as life-lock? For one of the many same reasons that this book was written. If these issues are important to you, then you should take a look at this book.
5 internautes sur 5 ont trouvé ce commentaire utile 
HASH(0x975f1450) étoiles sur 5 skip this if you can google and use wikipedia 17 octobre 2015
Par Q - Publié sur Amazon.com
Format: Format Kindle Achat vérifié
Even though there is a number of different things to help one become incognito, it falls short of my expectations. It discusses various apps and programs, but not enough to effectively do it all myself without doing research outside of this book. It advertises services and programs rather than teaching you how to use them.
3 internautes sur 3 ont trouvé ce commentaire utile 
HASH(0x975f13fc) étoiles sur 5 but offers an excellent perspective on why it is so important to be ... 30 décembre 2015
Par sipy - Publié sur Amazon.com
Format: Broché Achat vérifié
I wish I could give it 3-1/2 stars, but I rounded it up. This book is a little long on the "hype", but offers an excellent perspective on why it is so important to be dilligent in your dealings as you try to secure your anonymity online. Some will probably be put off after the third or fourth time the author makes, then immediately repeats a point. But I challenge you to keep reading despite any distraction this may cause you. There is a good deal of pertinent information here, and you will miss out if you put the book down. It's a short read, but I recommend very strongly that you re-read it a few times if you're new to the subject. You'll be surprised at just how much good information there is in this book, and it's easy to miss a nugget due to the (perhaps) "simple" style of the author. The end of the book seems a bit rushed, but I liked it n onetheless.
Ces commentaires ont-ils été utiles ? Dites-le-nous