Linux Distro: Tails - You Can Never Be Too Paranoid
" Tails is a live media Linux distro designed boot into a highly secure desktop environment. You may remember that we looked at a US government distro with similar aims a few months ago, but Tails is different because it is aimed at the privacy conscious “normal user” rather than government workers.
Tails takes the form of a bootable live image that can be used from a CD ROM, a USB stick or via a network boot. Once booted, it executes from RAM, taking care not to make use of a swap partition. The desktop is Gnome 2.0 and the applications are a fairly standard selection. The web browser is an old, but usable, version of Iceweasel 3.5 (Debian Firefox). There are other applications to handle graphics work, audio editing, media playback, text editing, instant messaging and a email client - basically, everything you need when you’re on the run from enemy agents. Extra software can be added via the Synaptic package manager which pulls directly from the Debian repositories. So far, so similar to most other live desktop distros. Security and limited footprint on the the host machine are the areas in which the distro differs from the run of the mill.
All interactions with the Internet are passed through Tor an anonymization system. Using Tor, Tails pipes all Internet traffic emanating from your computer through a constantly shifting set of relays that are operated by a network of volunteers. " Continued: http://goo.gl/rAZaa
....
Tails project page
Tails is a live CD or live USB that aims at preserving your privacy and anonymity.
It helps you to: http://goo.gl/LFdmX
....
Other:
Tor Browser - portable ( highly recommended )
http://goo.gl/DpkMu
Tor Wiki - liveCD/Usb, info, how to, etc.
http://goo.gl/jc9ty
OperaTor - Opera + Tor. Surf anonymously
http://goo.gl/jbOfD
Privatix Live-System
http://goo.gl/4sDzQ
Portable Tor Apps
http://goo.gl/vEV51
Portable Apps
http://goo.gl/ZUBZ
Portable Freeware
http://goo.gl/reGX
Electronic Frontier Foundation ( EFF )
http://goo.gl/xtnN
Distro Watch
http://goo.gl/SrEy
....
Related blog post:
TOR and SSH Tunnels - privacy on the Internet
http://goo.gl/UM567
Tor..Anonymous Web Surfing - for Journalist and general privacy
http://goo.gl/2fzeb
Anti-malware - Security - General Free Solutions
http://goo.gl/tOk1g
....
Intrusion Detection FAQ: What is a Honeypot?
"..A Honey Pot system is setup to be easier prey for intruders than true production systems but with minor system modifications so that their activity can be logged of traced. The general thought is that once an intruder breaks into a system, they will come back for subsequent visits. During these subsequent visits, additional information can be gathered and additional attempts at file, security and system access on the Honey can be monitored and saved...." Continued: http://goo.gl/kG6MG