
- ALTERNATIVE TO MACDADDYX PORTABLE
- ALTERNATIVE TO MACDADDYX VERIFICATION
- ALTERNATIVE TO MACDADDYX MAC
Search Engines & Privacy – Search engine tracking, censorship & privacy, startpage, duckduckgo, disconnect search, searx, yacy, metager, private and anonymous searchingīrowser Security & Tracking Prevention – browser attack surface, isolation & compartmentalization, Spikes, maxthon, priv8, Switchy, multifox, Http filters, ad & track blockers, uBlock, uMatrix, Disconnect, Ghostery, Request policy, ABP, Privacy badger, WOT, No-script, Policeman, Purify, History, cookies, super cookies, JonDofox, Tor, Evercookie, http referrer, ref control, smart referrer, browser finger printing, jsrecon, firegloves, websocket leaks, canvas blocker, Certificates and encryption, RCC for windows, https everywhere, Calomel ssl validation, firefox hardening, certificate patrol, aboutconfig, ffprofile Tracking – IP Address, 3rd party connections, Http referrer, Cookies & scripts, Super Cookies, browser fingerprinting, panopticlick, ipleak, internet profiling, browserleaks, GCHQ Network Monitoring – Syslog, RSYSLOG, Link logger, PRTG, KIWI syslog, syslog watcher, wireshark, tcpdump, tshark, iptables, wincap, NST, Netminer, Networx WiFi Security – Wifi-Weaknesses – WEP, WPA, WPA2, TKIP, CCMP, WPS, Evil Twin, Rouge AP, wifipineapple, cowpatty, reaver, aircrackng, oswa live cd, fern wifi cracker, secure configuration and network isolation, RF Isolation and reduction, wifi inspector, airodump-ng, wireless network watcher, wifi network monitor, fing OS Network Attacks – Introduction & IOT, Arp spoofing & switches, network isolation, xarp, DHCP Snooping, netcut, sniffdet, Tuxcut, VLAN setup in Pfsense
ALTERNATIVE TO MACDADDYX MAC
Routers – Home Router, External Vulnerability Scanning, Shodan, Qualys, Nmap, mxlookup, shieldsup, pentest-tools, putty, Internal Vulnerability Scanning, MBSA, Nmap, Nessus, Fing, Superscan, OpenVAS, Metasploitable2, Custom Router Firmware, OpenWRT, DDWRT, Tomato Firmware, LibreCMC, R7000 Nighthawkįirewalls – Host based, stateful packet inspection, Virtual, Windows – WFC, Comodo, Tinywall, Privacyware, Linux- Iptables, UFW, gufw, nftables, Mac – pflist, icefloor, murus, vallum, littlesnitch, Network based, DD-WRT, Open-WRT, pfsense, Smoothwall, Vyos, novena, pcengines
ALTERNATIVE TO MACDADDYX PORTABLE
Security through Isolation and Compartmentalization – Security Domains, Hardware Isolation, Macdaddyx, Wifispoof, Tmac, dmidecode, cpuz, cupid, i-nex, Virtual Isolation, Maxthon, portable apps, pen drive apps, authentic8, apikes, aegis, dual boot, multiboot, application isolation, built-in sandboxes, f-sandbox, shadowdefender, returnil, deepfreeze, comodo, bufferzone, sandboxie, apparmour, firejail, buckleup, super-duper, Virtual Machines, hypervisor, openvpn, openVZ, virt, Virtual Machine weakness, hardening, WhonixOS, QubesOS, Librem 13

ALTERNATIVE TO MACDADDYX VERIFICATION
Social Engineering and Social Media Offence & Defense – Information disclosure, Identity Strategies, Identify Verification & Registration, Behavioral Security Controls, Technical Security Controls

Security Bugs and Vulnerabilities – Win7/8/8.1/10 – Patching/Autopatching, Autoupdate, LinuxDebian Patching, Mac – patching, Browser & Extension updates – Firefox/Chrome/IE/Edge, Reducing Threat Privilege – NoAdmin OS Security and Privacy – Security Features & Functionality, Usage Share, Win -10 privacy & tracking, Disable tracking, Cortana, Wifisense, Mac – privacy & tracking, Linux like OS, Debian, OpenBSD, Archlinux, Ubuntu Know Your Enemy – Vulnerability Landscape, Exploit Kit, Hackers, Crackers, Cyber Criminals, Malware, Viruses, Rootkits, RATs, Spyware, Adware, Scareware, PUPs, Browser Hijacking, Phishing, Vishing, SMShing, Spamming, Doxing, CPU Hijackers, Darknets, Dark Markets, Governments, spies, secret stuff, Trust and backdoors, Censorship, CTIĮncryption – Symmetric, Asymmetric, Hashes, Digital Signatures, SSL, TLS, SSL Strip,Sniffers, ArpWatch, Cain & Abel, HTTPS, Digital Certificates, CA, E2EE, Steganography, Openpuff.


Know Yourself – Assets, Vulnerabilities, Threats, Adversaries, Defense in Depth, Zero Trust Model Introduction – Setting up Lab, Kali Linux, VMWare, Virtual Box, Canary Tokens, Norse, ANT Product Data, Intelligence Agencies, InSpectre, Kanguru, CIA, Security, Privacy, Anonymity, Pseudonymity
