<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Stories by Hackertistic on Medium]]></title>
        <description><![CDATA[Stories by Hackertistic on Medium]]></description>
        <link>https://medium.com/@hackertistic?source=rss-c577a31eafdd------2</link>
        <image>
            <url>https://cdn-images-1.medium.com/fit/c/150/150/1*uLxsBNCMrWVtnJEekuMQtw.jpeg</url>
            <title>Stories by Hackertistic on Medium</title>
            <link>https://medium.com/@hackertistic?source=rss-c577a31eafdd------2</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Thu, 16 Apr 2026 07:16:30 GMT</lastBuildDate>
        <atom:link href="https://medium.com/@hackertistic/feed" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[Make Yourself Secure on the Internet]]></title>
            <link>https://hackertistic.medium.com/make-yourself-secure-on-the-internet-632d1a716229?source=rss-c577a31eafdd------2</link>
            <guid isPermaLink="false">https://medium.com/p/632d1a716229</guid>
            <category><![CDATA[online-security]]></category>
            <category><![CDATA[digital-hygiene]]></category>
            <category><![CDATA[privacy]]></category>
            <category><![CDATA[internet-safety]]></category>
            <dc:creator><![CDATA[Hackertistic]]></dc:creator>
            <pubDate>Mon, 16 Sep 2024 10:43:52 GMT</pubDate>
            <atom:updated>2024-09-16T10:43:52.307Z</atom:updated>
            <content:encoded><![CDATA[<p>Information Security is Everyone’s responsibility.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*wpy3T2r_oXg_2NebnAzpQA.jpeg" /></figure><p><strong>Now let’s start to make yourself secure or strengthen your internet security by reading this article. I will try to cover all the crucial parts to make your surfing more secure than before. This article will be updated from time to time.</strong></p><h3>General Security Measures to secure yourself on the internet:</h3><p>Online tools alone can’t ensure your privacy unless you take general security measures. Let’s briefly go over these essentials before diving into specific tools.</p><ul><li>Use multi-factor authentication.</li><li>Avoid using the same password across multiple platforms.</li><li>Keep your software up to date.</li><li>Be mindful of how much personal information you post online.</li><li>Exercise caution when sharing personal details.</li></ul><p><strong>Check out the video for more details on the points mentioned above.</strong></p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2F-ni_PWxrsNo%3Ffeature%3Doembed&amp;display_name=YouTube&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D-ni_PWxrsNo&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2F-ni_PWxrsNo%2Fhqdefault.jpg&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/64566bb99a8fda2743b502be91cd90f7/href">https://medium.com/media/64566bb99a8fda2743b502be91cd90f7/href</a></iframe><h4>How much will it harm you to share info about yourself online?</h4><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FQklRDzNujE8%3Ffeature%3Doembed&amp;display_name=YouTube&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DQklRDzNujE8&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FQklRDzNujE8%2Fhqdefault.jpg&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/44377c2c806a07ecdceabfa7504f890f/href">https://medium.com/media/44377c2c806a07ecdceabfa7504f890f/href</a></iframe><h4>Safety measures that should be taken by you to protect yourself from identity thefts</h4><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FkDFeSUUwRnA%3Ffeature%3Doembed&amp;display_name=YouTube&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DkDFeSUUwRnA&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FkDFeSUUwRnA%2Fhqdefault.jpg&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/7f8a550798527dceebfeae68f1d98173/href">https://medium.com/media/7f8a550798527dceebfeae68f1d98173/href</a></iframe><p>Finally, never fully trust anyone online, even if you’re speaking with friends — someone could have compromised their account to deceive you.</p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FVo1urF6S4u0%3Ffeature%3Doembed&amp;display_name=YouTube&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DVo1urF6S4u0&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FVo1urF6S4u0%2Fhqdefault.jpg&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/4c830c4a5a5e4265b93c4c196185e732/href">https://medium.com/media/4c830c4a5a5e4265b93c4c196185e732/href</a></iframe><p>As technology advances rapidly, it’s becoming easier to create fake videos through a technique called “Deepfake.” Stay informed and cautious about this emerging threat.</p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FgLoI9hAX9dw%3Ffeature%3Doembed&amp;display_name=YouTube&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DgLoI9hAX9dw&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FgLoI9hAX9dw%2Fhqdefault.jpg&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/f1f951dacfd97b5a4a133a342212c704/href">https://medium.com/media/f1f951dacfd97b5a4a133a342212c704/href</a></iframe><p>By now, you should have a better understanding of the potential security risks and how to address them. Let’s move on to websites and tools that can help secure your online presence.</p><h3>Websites to Make Yourself Secure On the Internet</h3><ol><li>Adblock Plus — free ad blocker</li><li>WhereGoes.com</li><li>VirusTotal.com</li><li>ScamAdviser.com</li><li>The terms of Service didn’t read</li><li>JustDelete.me</li><li>Temp-mail.org</li><li>HaveIbeenPwned.com</li><li>SquareX Extension</li></ol><p>Now let’s discuss the important part to enhance your internet privacy.</p><h3>1. Adblock Plus — free ad blocker</h3><p><a href="https://chromewebstore.google.com/detail/adblock-plus-free-ad-bloc/cfhdojbkjhnklbpkdaibdccddilifddb">Chrome Extension</a></p><p>Phishing attacks are a common method used to compromise accounts, and one way they operate is by displaying ads that lure victims into clicking. Prevent these annoying and potentially harmful ads by installing the Adblock Plus extension on your browser.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/858/1*xiWzaaxHK35DMsl6nGUczQ.png" /></figure><h3>2. WhereGoes.com</h3><p><a href="https://wheregoes.com/">https://wheregoes.com/</a></p><p>This tool lets you trace URL redirects, helping you identify whether a link is leading to a trusted or malicious site. Attackers often use legitimate URLs to disguise redirection to harmful pages.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*SEmSnkKJGd6OzlmyWWbxpA.png" /></figure><h3>3. VirusTotal.com</h3><p><a href="https://www.virustotal.com/">VirusTotal</a></p><p>If you have any files or links that seem suspicious, upload them to VirusTotal. This service analyzes and detects malware to help you decide whether they’re safe.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*eRxUnbSK8_DMVhXXHpoZ8Q.png" /></figure><h3>4. ScamAdviser.com</h3><p><a href="https://www.scamadviser.com/">ScamAdviser.com | Check a website for risk | Check if fraudulent | Website trust reviews |Check website is fake or a scam</a></p><p>Before using services from an unfamiliar website, check its trust rating and user reviews on ScamAdviser. Keep in mind that newer websites may not have high trust scores initially, as they need time to accumulate reviews.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/862/1*pRhziF-ElR0kekJtIayu4w.png" /></figure><h3>5. TOSDR.org (Terms of Service didn’t read)</h3><p><a href="https://tosdr.org/">Frontpage -- Terms of Service; Didn&#39;t Read</a></p><p>Always review a website’s terms of service before using it. Many users overlook these agreements, but they often contain clauses about sharing personal data. TOSDR.org simplifies these lengthy terms into a user-friendly format so you can understand them easily.</p><p>As one security expert put it, “If something online is free, you’re not the customer — you’re the product.”</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/860/1*aqoDZaO9PJ31tgNKBQM8Aw.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/863/1*RIQ0XbJaCg1B-BPDmmVZsQ.png" /></figure><h3>6. JustDelete.me</h3><p><a href="https://justdelete.me/">Just Delete Me | A directory of direct links to delete your account from web services.</a></p><p>When you need to delete your account from a website, it can be time-consuming and confusing, as each site has its own process. Some are easy to delete, others require contacting customer service, and some never allow full deletion. JustDelete.me provides a guide to the account deletion procedures for various websites and rates the difficulty level of each.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/855/1*lH4pQOAyaD1qBxUPjle-GQ.png" /></figure><p>Scroll down to the footer side of the website to check the meaning of symbols.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/640/1*6-IztCJxhI7eJQiRTUYvVQ.png" /></figure><h3>7. Temp-mail.org</h3><p><a href="https://temp-mail.org/">https://temp-mail.org</a></p><p>Many websites require your email before offering services. If you only need temporary access and don’t want to provide your personal email, use a disposable email from Temp-mail.org. However, avoid using these temporary emails for official work.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/851/1*ZEPidrXLWPHYTy7EoNoWuQ.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/853/1*k-oEQgyY8tDPEZ4N5o9f_g.png" /></figure><h3>8. HaveIbeenPwned.com</h3><p><a href="https://haveibeenpwned.com/">Have I Been Pwned: Check if your email address has been exposed in a data breach</a></p><p>Breached data from a website is a goldmine for hackers. If a website’s database is leaked, it may contain personal information, including user passwords, which can lead to account hijacking. Whenever your data is involved in a breach, you should change your passwords immediately to prevent further compromise. But how can you know if your data has been exposed in a breach? HaveIBeenPwned.com helps you find out.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/849/1*ycUELtIM4uEF27D_zBoEYA.png" /></figure><p>You can also use the site to check if a specific password has been leaked in any data breaches. If the answer is yes, that password is vulnerable and can easily be guessed by hackers.</p><p>For example, I tested the password “12345” and found it had appeared in multiple data breaches, meaning it’s highly insecure and should never be used!</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/857/1*HUN6gfsr86MJUXwAaWzKnQ.png" /></figure><h3>9. SquareX Extension</h3><p><a href="https://chromewebstore.google.com/detail/squarex-be-secure-anonymo/kapjaoifikajdcdehfdlmojlepfpkpoe">Chrome Extension</a></p><p>SquareX is a Chrome extension designed to enhance web browsing security by providing users with a safe environment to interact with potentially harmful content. It allows users to open links, attachments, or downloads in isolated cloud-based environments, ensuring that malware, spyware, or other threats do not affect their local machine. By leveraging cloud technology, SquareX adds an extra layer of protection, making it ideal for cybersecurity-conscious users who regularly deal with suspicious or untrusted web content.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*-ZhiXf-Q5yB2A41rfGpbeg.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*lnde__m4o_EM6ZE0PC1-pA.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/965/1*gqJ1_3iZ6l70otAm4G_gjw.png" /></figure><h3>10. Browser Leaks</h3><p><a href="https://browserleaks.com/">Browserleaks - Check your browser for privacy leaks</a></p><p>This provides detailed tools and tests to reveal the kind of information that web browsers inadvertently leak while browsing the internet. It offers insights into IP addresses, geolocation, WebRTC leaks, canvas fingerprinting, and other browser-based vulnerabilities. By using this site, users can better understand how much data is exposed during online activities and take steps to enhance their privacy and security, making it a valuable resource for privacy-conscious individuals and cybersecurity professionals alike.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*8PbB1017UHfddqENS4Fj5g.png" /></figure><h3>11. Tails OS</h3><p><a href="https://tails.net/">Home</a></p><p>Tails (The Amnesic Incognito Live System) is a security-focused Linux-based operating system designed to preserve privacy and anonymity. It runs from a USB drive or DVD, leaving no trace on the computer it’s used on. Tails routes all internet traffic through the Tor network, effectively concealing the user’s location and online activity. It comes pre-configured with encryption tools for emails, files, and messaging, making it ideal for users who prioritize digital security, such as journalists, activists, or those working in hostile environments.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/617/1*vg2wD3dFH5nPshBapmILvw.png" /></figure><p>I hope this article helps you enhance your internet security and expands your knowledge of useful online tools.</p><p>If you have suggestions for additional tools, feel free to comment below. I appreciate your input!</p><p>Follow me on social media for more informative content:<br><strong>LinkedIn</strong>: <a href="https://www.linkedin.com/in/hackertistic/">Hackertistic</a><br><strong>Instagram</strong>: <a href="https://www.instagram.com/hackertistic">Hackertistic</a></p><h4><a href="https://hackertistic.com">Hackertistic.com</a></h4><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=632d1a716229" width="1" height="1" alt="">]]></content:encoded>
        </item>
    </channel>
</rss>