Home » Security Tutorials
Click Here To Hide Tor

Security Tutorials

This page will serve as a compilation of the various security tutorials that can be found on several different forums. It has been hard to find and credit the people who originally created these guides, so let us know if you have written any of them! A good place to start is the Jolly Roger’s Security Guide for Beginners.

>>>Click here to find the VPN’s Who Respect Your privacy<<<

Miscellaneous Tutorials:

  1. Encrypting Your Hard Drive With Truecrypt
  2. How to chain socks with Tor
  3. Securing Firefox
  4. Word of Warning — All versions of PGP are NOT created equally!
  5. Let’s talk about security
  6. Needle in a Haystack ~ Tor Relays
  7. How to use Tor as a Socks5 proxy
  8. Simple Whonix Installation tutorial
  9. Simple TAILS installation
  10. Secure Data Wiping on GNU/Linux
  11. Veracrypt Tutorial: How To Encrypt A USB Drive?
  12. Basic Guide to PGP On Linux
  13. PGP Tutorial for OSX
  14. High Security Virtual Machines
  15. Tutorial: XMPP/Jabber OTR
  16. In-depth Guide to Tails + Persistence
  17. Guide: Anonymity and Privacy for Advanced Linux Users
  18. Tutorial: Installing Tor With Privoxy


  1. thank’s

  2. The captchas never work for me. I do them perfectly but they don’t work.

    • Ouch

      Could be blocked, e. g. Noscript. Consider to captcha serveral times. In my case it worked. Captchas as they are configured are time consuming.

  3. An error occured:
    You must enter the captcha correctly. always showing this when im trying to regisster help me!!

  4. thanks friends

  5. What’s The Best program to use these days?
    It says on the TrueCrypt section that the program might contain security issues. Though we don’t know when that Edit took place and if TrueCrypt is fine to use these days (2018).
    I’ve always thought that TrueCrypt and VeraCrypt were the best to use, but there’s a reason why I’m asking this question Here Today.
    So which Hard Drive Encryption Program is the best to use today in terms of security, so no-one, including LE, can ever penetrate the encryption so to speak?

Leave a Reply

Your email address will not be published. Required fields are marked *


Captcha: *