Explains and demonstrates how a computer should be set-up and made safe for effective investigation processing and how the on-line footprint and fingerprint can be identified and obfuscated for safe processing.
Introducing and explaining the reliable and safe set-up of a computer for III (OSINT) processing so that the system is safe to perform III (OSINT) investigations. Inherent vulnerabilities are addressed with recommended solutions.
The practitioner will have learned how to set-up a computer for safe and effective III (OSINT) processing and will understand how their online presence can be detected by other people.
Module 3 does not differentiate between the public and private sectors.
PREPARING THE COMPUTER
THE COMPUTING ENVIRONMENT: ON PREM - v - CLOUD
OPERATING SYSTEMS
LINUX
MICROSOFT WINDOWS
MacOS
BROWSER SELECTION
BLINK & GECKO
GOOGLE Inc
Google and Artificial Intelligence
Implications for III (OSINT) Practitioners
MICROSOFT CORPORATION
APPLE Inc
BRAVE
OPERA
THE MOZILLA FOUNDATION & THE FIREFOX BROWSER
Firefox Enterprise (ESR) Warning
Disadvantages of Firefox
BROWSER MANAGEMENT CAPABILITIES
BOOKMARKS
INTERNET SEARCH
BROWSER SYNC
BROWSER EXTENSIONS
BROWSER VULNERABILITIES
BROWSER COOKIES
COOKIES & THE III (OSINT) PRACTITIONER
BROWSER CONCLUSIONS
VIRTUALISATION & EMULATION
VIRTUALBOX
EMULATORS FOR MOBILE APPS
NoxPlayer
PRACTITIONER ATTACK SURFACE
ANTI-VIRUS SOFTWARE
SPYWARE, MALWARE & RANSOMWARE
DESKTOP FIREWALL
PASSWORDS
PASSWORD MANAGERS
FOOTPRINTS & FINGERPRINTS
COMPUTER FOOTPRINT
COMPUTER FINGERPRINT
DEVICE DIAGNOSTICS & IMPLEMENTING SECURITY
STILL USING INTERNET EXPLORER?
VPN’S & ANONYMIZERS
VIRTUAL PRIVATE NETWORKS
VPN SECURITY
ANONYMIZERS
USEFUL BROWSER EXTENSIONS
A FREE VPN
AN ANONYMIZER
USER-AGENT SWITCHER
A PASSWORD MANAGER
WEB PAGE TRANSLATOR