Since the first release many thins has been changed on BleachBit. I perfectly remind its first version that I uninstalled because I didn’t feel comfortable with the possible disaster I could do on my Ubuntu computer. Now BleachBit is very different: more powerful and easy to use! This software can be used on Linux (in my test I used Ubuntu 10.04 LTS) and Windows. To install it on Ubuntu you have to use Synaptics ( System —> Administration —> Synaptics) and search for bleachbit in the search bar. For the Windows installation please, download the .exe file and install it. After the installation on Ubuntu, open BleachBit going to Applications —> System Tools —> BleachBit. Now, you have a very understandable menu bar in the left side of your screen. If you click on the main sub-menus you can automatically read some information about what every option will delete on tour PC. Moreover, if the delete options you choose are potentially dangerous, a pop up mini alert will inform you about the risks. We recommend to use the Preview option before bleaching your PS. In this way you can have a final picture of what you are doing and how many bytes are you deleting. On the preference menu you can decide to overwrite files to hide contents or to run BleachBit every time you start your computer. Last but not least, BleachBit supports many languages that you can select from Edit —> Preferences —> Languages.

Category Archives: Privacy
I2P a real versatile anonymizing network for Linux and Windows
This week for our Freeware Page, we tested I2P a freeware which let you to surf internet without revealing your IP and encrypt your data. As described on the I2P Homepage, this freeware is a “anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties”. During out test we used bothXP and Ubuntu because I2P is a java file even is it seems to be a exe file and it could be used on all the Linux OS. On Windows XP it is very simple to use I2P but at the beginning it is really slow and for this reason we suggest to keep it run for about twelve hours because this freeware needs to build its own network and for this it takes some hours. When ready you have to setup all the software you want to filter through it. For this reason, we setted Firefox (Preferences-> Advanced -> Network -> Settings) Manual Proxy Configuration to HTTP Proxy as localhost, port 4444. Then we put a tick on “Use this proxy server for all protocols” and we finished indicating “No proxy for” as localhost, 127.0.0.1. After some seconds we discovered that our IP was now in the northern part of the France (far away from our real location). To setup I2P it is necessary to point Firefox on http://localhost:7657/index.jsp because, by default, I2P tries to launch Internet Explorer also when it works on Linux. After a week of tests we can say that I2P is a little bit slower than TOR but it can easily be integrated on your browser, mail client, chat and others programs. For our (limited) experience I2P is the most complete anonymizing network we know. To conclude, as already discussed also on this post none or nothing can create a perfectly anonymous software but I2P can help to better improve our privacy. Recommended!

Use chkrootkit to fight against rare (but always possible) rootkits on your Linux PCs!
This week, in our Linux Page (in Spanish), we would like to focus your attention on chkrootkit, an interesting software for Linux which can really help you to detect malicious rootkits on your Linux PC. Unfortunately, the last update we have found on the chkrootkit homepage is dated December 2007 but we hope to see a new release during the 2009. To check if you have chkrootkit already installed, type chkrootkit on you Terminal:
desktop:~$ chkrootkit
and you certainly will receive this message:
The program ‘chkrootkit’ is currently not installed. You can install it by typing:
sudo apt-get install chkrootkit
Follow the above instructions and you will be ready to execute the software just typing:
sudo chkrootkit
Please, note that, at our first scan on Ubuntu 8.10, we found a false positive:
Checking `sniffer’… lo: not promisc and no packet sniffer sockets
eth0: PACKET SNIFFER(/sbin/dhclient3[4835])
Do not worry! This (unfortunately frequent) false positive has already been discussed by the community at
http://ubuntuforums.org/showthread.php?t=556517
and
http://ubuntuforums.org/showthread.php?t=270340
If you know other good anti-rootkits, please be so kind, to add a comment on this post. We are really interested to discover new “security software” (especially anti-rootkit) for Linux machines!

Google Chrome: how to neutralize the unique ID tracker and partially preserve your privacy
Today, in our Freeware Page we added a post about two useful freeware which are able to remove the ID tracker contained in this new browser. Using them you will able to defend your privacy a little more effectively your navigation when using Google applications. The first is Chrome Privacy Guard (CPG), a useful tool, whose icon you will click on to activate Google Chrome. When using CPG you have to remember not to run directly the Google Chrome icon. Moreover, this software contains also a command which allows you to disable the CPG option inside Google Chrome, so your browser will send again statistical data to Google. The second one is UnChrome, an Abelssoft creation which definitively remove the unique ID contained in Google Chrome. Last but not least, I want to focus your attention on the fact that these two freeware run only in Windows PCs but we hope that a MAC and Linux version will be released in the next months. Useful!!

NoteCase: a simple multiplatform (Linux, Windows, OS X) freeware to preserve the privacy of your notes!
Today in our Freeware Page we added a brief post about NoteCase a powerful note editor for Linux. In our tests we installed NoteCase on a Ubuntu 8.04 with positive results. This free software allows you to write complex notes dividing them between “nodes” and, if you need, it is also possible to easily create child notes at each level. Moreover, using NoteCase you can insert images and links to your text. Using NoteCase, for complex projects, you can decide to insert tag in each node and find them in just few clicks with the “Find” feature. Last, but not least, when you save your notes, you can decide to save them into an encrypted file. In few wordsNoteCase is one of the best freeware to manage notes using different OS without risks. Recommended!

Security package (Rev. 1.2) for Ubuntu: antivirus, firewall and P2P stealth
Last May, in our Linux Page (in Spanish), we posted some suggestions about a basic security package for Linux. After less than one year we are back on this topic also because more than something has changed. As you know, Linux is the safer OS you can use today: specific Linux viruses are few and malware is rare but with the increasing of users some threads are becoming real. For this reason, I strongly believe that nowadays a firewall, like Firestarter, is not enough and we all need also a good antivirus and Moblock: the program which allows to use the Peer Guardian lists on Ubuntu protecting your privacy. Today, in our Linux package we’ve posted a short updated manual where we explain how to install a firewall (Firestarter), an antivirus (ClamAV) and a P2P stealth (Moblock). We have tested all this software on a Ubuntu 7.10 without relevant problems; the combined use of this triplet is strongly recommended for people who desire to preserve their data and privacy. Read us! 

