Linux is a very secure system, but maybe you want more privacy. Even though Linux is very secure, users can take extra precautions for more privacy. Maybe you work for a very large company and want to ensure that particular files are not easily accessed. Maybe you keep your diary on your computer (bad idea but some people still do it) and you want additional security for that particular file. Maybe you go to naughty websites and do not want to be traced (shame on you ). Well, this is the article for you. Locking Compressed Files: One obvious and easy way to protect files is by compressing them using a compression algorithm that supports password protection/locking. Many compression/archive applications exist for Linux. The one that I highly recommend for most Linux systems is "Archive Manager". To get support for some of the compression formats I am about to suggest, you may need to install some special libraries and packages like "zip", "libunrar0", "p7zip-*", "rar", etc. NOTE: Some of these compression formats (like RAR) are non-open-source software. Some examples of compression formats with password protection abilities include 7z, arj, cbr, cbz, exe, rar, and zip (others may exist). I have “Archive Manager” installed on my system and many compression libraries. Depending on what compression/archive software you prefer, compress your file using one of the suggested formats and make a password. Once the file is created, make sure it has successfully locked and that the password works before you delete the uncompressed file. For extra privacy, compress as an "EXE". This makes the file appear as an executable. Who would expect it to be a compressed PDF with a company's secret plans? For even more privacy, after compression (what ever format you choose), rename the file extension to ".ko" and (with Root privileges) place the file somewhere in /lib/. No one would ever try (or want) to open each library file with a compression utility hoping to find secret files. Encryption: Make an encrypted partition to store files that most people should not see. Or, encrypt a directory. Instructions on encrypting partitions, filesystems, and directories is out of the scope of this article. Steganography: Files can be hidden in other files. For example, compress some of your files using zip and then get a JPEG that will be used to hold the zip. Use this command - "cat IMAGE.jpg HIDE.zip > SOME_PIC.jpg". The image file "SOME_PIC.jpg" will appear as a typical and viewable image. To retrieve the zip, use this command - "unzip SOME_PIC.jpg". To test the possibility of an image containing a zip, use this command - "unzip -t IMAGE.jpg". If the output contains information about "extra bytes at beginning or within zipfile", then the file most likely contains a file. Divide: A compressed file (or any file) can be divided into multiple files. If the split file is an image, then the image cannot be viewed. Also, each piece can be hidden in another file if needed. To split/divide a file, use this command - "split --number=NUM ./FILE" where "NUM" is the number of pieces to make and "FILE" is the file to be split. The pieces will be titled "xaa", "xab", "xac", "xad", "xae", ...... To put the pieces back together, use this command with the files/pieces list alphabetically - "cat ./xaa ./xab > ./NEW_FILE". Web Browser Privacy: Obviously, remember to clear/delete your cache and history. Alternately, set up the browser to not keep history or any other temporary files. Some add-ons for Firefox offer extra privacy tools and features. Check out https://addons.mozilla.org/en-US/firefox/extensions/privacy-security/ to get some privacy addons for Firefox. Tor can help protect your identity while you surf the Internet. Setting up Tor is a subject all its own, but here are some links to get started with Tor: Tor: Part 1 - http://www.linux.org/threads/tor-part-1-is-it-for-me.4532/ Tor: Part 2 - http://www.linux.org/threads/tor-part-2-installing-and-using.4533/ Tor: Part 3 - http://www.linux.org/threads/tor-part-3-becoming-an-onion.4543/ Proxy Server: Individual web browsers can be set up to use proxy instead of the whole system. For some browsers, the proxy settings can be set in the options. Some browsers require a special addon to handle proxies itself rather than the system as a whole. Chrome and Chromium can use "Falcon Proxy" to utilize the benefits of proxies. Firefox can use "FoxyProxy" or "One Click Proxy IP". Other addons exist for these browsers, so do some research to find the one that best suits your needs. To find a list of proxy servers, go to hidemyass.com. Recommended reading: Undelete Files on Linux Systems (http://www.linux.org/threads/undelete-files-on-linux-systems.4316/). This article not only explains how to undelete files, but also how to make sure they are never recovered when they are deleted. These are only some of the many ways Linux can secure the privacy of its users. Can you suggest others?