CYBER 101

  • Alerts
  • Blog
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Domains
  • FAQ
  • Incidents
  • Tutorials

Subscribe to our newsletter

FOLLOW US

No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
  • Jobs
  • Vendors
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
  • Jobs
  • Vendors
Get Help
CyberMaterial
Home Book

How to Disappear: Erase Your Digital Footprint, Leave False Trails, And Vanish Without A Trace

Frank Ahearn, Eileen Horan 

Reading Time: 2 mins read
in Book, College Students

For the first time in paperback, we bring you the authoritative and comprehensive guide for people who seek to protect their privacy as well as for anyone who’s ever entertained the fantasy of disappearing–whether actually dropping out of sight or by eliminating the traceable evidence of their existence.

Written by the world’s leading expert on finding people and helping people avoid being found, How to Disappear covers everything from tools for disappearing to discovering and eliminating the nearly invisible tracks and clues we tend to leave wherever we go. Learn the three keys to disappearing, all about your electronic footprints, the dangers and opportunities of social networking sites, and how to disappear from a stalker.

Frank Ahearn provides field-tested methods for maintaining privacy, as well as tactics and strategies for protecting personal information and preventing identity theft. They explain and illustrate key tactics such as misinformation (destroying all the data known about you); disinformation (creating fake trails); and, finally, reformation–the act of getting you from point A to point B without leaving clues.

Ahearn illustrates every step with real-life stories of his fascinating career, from undercover work to nab thieving department store employees to a stint as a private investigator; and, later, as a career “skip tracer” who finds people who don’t want to be found. When Oscar statuettes were stolen in Beverly Hills, Ahearn pinpointed a principal in the caper to help solve the case.

An indispensable resource not just for those determined to become utterly anonymous, but also for just about anyone in the brave new world of on-line information, How to Disappear sums up Ahearn’s dual philosophy: Don’t break the law but know how to protect yourself.

 

GET BOOK

Tags: BooksCollege StudentsCollege Students BooksCyber ProfessionalsCyber Professionals BooksDigital FootprintDigital Footprint BooksHow to DisappearPrivacyPrivacy Books
ADVERTISEMENT

Related Posts

Countering Cyber Threats to Financial Institutions

Countering Cyber Threats to Financial Institutions

January 29, 2023
Hands-On Cybersecurity for Finance

Hands-On Cybersecurity for Finance

January 28, 2023
The Essential Cybersecurity Guide for Accounting/Tax Practices and Financial Firms

The Essential Cybersecurity Guide for Accounting/Tax Practices and Financial Firms

January 28, 2023
Cybersecurity and Financial System Resilience Report: Report To Congress

Cybersecurity and Financial System Resilience Report: Report To Congress

January 28, 2023

More Articles

Nexpose Certified Administrator

November 22, 2021
Alerts

CISA Releases Eight Industrial Control Systems Advisories

October 25, 2022
Alerts

Trend Micro addresses actively exploited Apex One zero-day flaw

September 14, 2022
Entertainment

ThinkCast Podcast: Episode 117

February 4, 2022
Alerts

F5 security advisory (AV22-618)

November 1, 2022

Cyber Snacks: Episode 4: Prepping For Cyber Insurance Applications

June 6, 2022
Alerts

[Control Systems] WECON Security Advisory

December 9, 2021
Document

HIPAA Fundamentals

April 4, 2022
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.