Ethical Softwares Home
Slideshow of our services
The meaning of our logo is that source code of the softwares provided by us at Ethical Softwares is not locked.
{LOGO CREDITS – Gurpreet Singh Sethi}
The meaning of Ethical softwares is freedom softwares or स्वतंत्र softwares . The meaning of freedom softwares or स्वतंत्र softwares means that the source code of the softwares we use and provide to our customers is not locked.
Free software provides 4 essential software freedoms to our customers :
1. run the software for any purpose,
2. study the source code of the software,
3. modify the source code and
4. sell the modified version of the software. These four essential freedoms are provided to our customers according to philosophy/ideology created by Richard Stallman sir who is the inventor GNU project.
https://www.gnu.org/philosophy/philosophy.html
GNU PROJECT:
GNU is a Unix-like operating system. That means it is a collection of many programs: applications, libraries, developer tools, even games. The development of GNU, started in January 1984, is known as the GNU Project. Many of the programs in GNU are released under the auspices of the GNU Project; those we call GNU packages. The name “GNU” is a recursive acronym for “GNU’s Not Unix.” “GNU” is pronounced g’noo, as one syllable, like saying “grew” but replacing the r with n. The program in a Unix-like system that allocates machine resources and talks to the hardware is called the “kernel.” GNU is typically used with a kernel called Linux. This combination is the GNU/Linux operating system. GNU/Linux is used by millions, though many call it “Linux” by mistake. Both Richard Stallman sir and Linux Trovalds are the inventors of GNU-Linux Operating system. Linux Trovalds invented the Linux kernel. Richard Stallman sir is the owner of Free Software Foundation located in Boston, USA.
Website of Free software foundation, USA :
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
9 Steps of Cyber-security :
1. Cyber-security gadgets, operating system and web-browser for viewing and managing your business website – Mostly Harmless, Bengaluru sells Liberated laptops/desktops, Liberated mobile phones and Liberated Routers. The Operating system installed on these Laptops/Desktops is Debian or Trisquel. The Operating system installed on these mobile phones is Replicant or Lineage. Please purchase cyber-security laptops, cyber-security mobile phone and cyber-security routers from Mostly Harmless, Bangaluru.
This is the online shop of Mostly Harmless for cyber-security gadgets :
https://mostlyharmless.io/phones/
https://mostlyharmless.io/computers/
https://mostlyharmless.io/routers/
Please use GNU Icecat or Epiphany browser on GNU-linux operating system (Trisquel or Debian) installed on your Mostly Harmless laptop and desktops. Please use Icecat Mobile browser on Replicant operating system installed on Mostly Harmless mobile phones.
2. Cyber-security of Website –
a) The operating system installed on the server that hosts your website should be GNU-Linux. We provide the source code of the website that we create for our customers. Example of Source code for the website of Prav app : Prav Website – https://prav.app Source code of Prav app website : https://codeberg.org/prav
b) We provide 2-factor authentication or web authentication for login of website to the customers. The customer can login their website only after entering One-time password received on the connected mobile no.
c) The Electronic Frontier Foundation offers several free software security projects, including HTTPS Everywhere, a browser extension that encrypts your communications with many Web sites. https://directory.fsf.org/wiki/HTTPS_Everywhere https://www.eff.org/ d) Let’s Encrypt is a free, automated, and open certificate authority (CA), run for the public’s benefit. It is a service provided by the Internet Security Research Group (ISRG). We give people the digital certificates they need in order to enable HTTPS (SSL/TLS) for websites, for free, in the most user-friendly way we can. We do this because we want to create a more secure and privacy-respecting Web. https://letsencrypt.org/about/
e) To improve security of our customer’s website, you can request us for a code audit from a security expert. This security audit will be a proof that the source code of the website provided to you by us is safe. With cutting-edge AI and the largest community of security researchers, HackerOne helps the world’s top brands eliminate vulnerabilities and outsmart attackers. https://www.hackerone.com/why-hackerone
f) When looking to ensure that our computers are running freedom software, we usually turn our attention to the operating system and programs we install. Increasingly, we also need to look at the Web sites we visit and us. Simply visiting many sites loads software onto your computer, primarily JavaScript, that carry proprietary licenses. Web sites should work without requiring that users run any proprietary software. The JavaScript programs in question create menus, buttons, text editors, music players, and many other features of Web sites, so browsers generally come configured to download and run them without ever making users aware of it. Contrary to popular perception, almost no JavaScript runs “on the Web site” — even though these JavaScript programs are hidden from view, they are still non-freedom code being executed on your computer, and they can abuse your trust. Examples of proprietary JavaScript abuses : JavaScript can identify you by the way you type More on fingerprinting Capturing user input before submitting a form Resources for safe viewing of websites you visit : GNU Icecat web-browser – Please install and use GNU Icecat web-browser which has these 2 browser extensions : GNU LibreJS, a browser extension to identify nonfree JavaScript. This extension allows the user to identify and run only freely licensed scripts. JShelter, a browser extension meant to combat threats arising from nonfree JavaScript. This browser add-on will limit the potential for JavaScript programs to do harmful actions by restricting default behavior and adding a layer of control.
g) Security and Firewall plugin for your WordPress website – FIREWALL & FILE PROTECTION SECURITY SUITE A Web Application Firewall (WAF) is your website’s first line of defence, protecting your site by monitoring traffic and blocking malicious requests. In essence, a security plugin will help you maintain the security and integrity of your website.
– Progressively activate firewall settings: These range from basic, intermediate and advanced.
– Automatic protection from the latest threats: Our team maintains a list of known exploits, actively building protections against them which are then released as new firewall rules to free and paying customers. – 6G blacklist: All-In-One Security incorporates ‘6G Blacklist’ firewall rules, protecting your site against a known list of malicious URL requests, bots, spam referrers and other attacks (courtesy of Perishable Press).
– Protect against fake Google bots: Bots presenting as Google crawlers can steal your content and litter your webpage with comment spam. Protect against it with the All-In-One Security Web Application Firewall. – Blacklist functionality: Ban users by IP address, IP address range or by specifying user agents.
– Prevent DDOS attacks: Prevent malicious users from performing DDOS attacks through a known vulnerability in WordPress XML-RPC pingback functionality.
– Prevent image hotlinking: Protect server bandwidth and your website’s content by preventing other sites from using your imagery via hotlinking.
– Cross site scripting (XSS) protection: All-In-One Security prevents attackers from injecting malicious script into your website via a special cookie.
– File change detection: Security scanners alert you to file changes in your WordPress system, so you can see if a change is legitimate or suspicious, and investigate as appropriate.
– Disable PHP file editing: Protect your PHP code by disabling the ability to edit files in the WordPress administration area.
– Permission setting alerts: Identify files or folders where the permission settings are not secure and correct with one-click.
– Ability to create custom rules: Advanced users can add custom rules to block access to various resources on your site.
– Access prevention: Prevent external users from accessing the readme.html, license.txt and wp-config-sample.php files of your WordPress site.
CONTENT PROTECTION SECURITY SUITE Eliminate spam, protect your WordPress content, and your search engine rankings with these important security features from All-In-One-Security.
– Comment SPAM prevention : Webpages littered with spam comments damage your brand, effect the user experience and impact SEO. All-In-One Security stops SPAM at the source by preventing comments that originate from other domains. AIOS automatically and permanently blocks spammers’ IP addresses. Site owners can use Cloudflare Turnstile or Google reCAPTCHA to reduce comment spam and block malicious users with just one click.
– iFrame protection: Preventing other websites from reproducing your content via an ‘iFrame’ is a useful security feature that protects your intellectual property and your website visitors.
– Copywriting protection: Stop users from stealing your content by disabling the right-click, select and copy text function.
– Disable RSS and Atom Feeds: RSS and Atom Feeds can be used by bots to ‘scrape’ your website content and present it as their own. This feature prevents that by disabling RSS and Atom Feeds on your website.
3. Cyber-security Search Engine : https://search.sapti.me
4. Cyber-security platform for Video streaming : https://peertube.bgzashtita.es/
5. Cyber-security platform for Social Media : a) Mastadon – https://mastodon.social/@ethicalsoftwares b) Pixelfed – https://pixelfed.org/
6. Cyber-security App store and safe Instant messaging app for mobile phones :
F-droid – https://f-droid.org/
Prav app – https://prav.app/
7. Cyber-security payment platform :
Please do not use UPI payment apps like Googlepay, PhonePe, Paytm on your Google Android phone. Please use net-banking service provided by your banks.
What is Liberapay?
Liberapay is a way to donate money recurrently to people whose work you appreciate.
Payments come with no strings attached. By default, recipients don’t know who their patrons are, and donations are capped at ₹10,000.00 per week per donor to dampen undue influence.
By default, the total amount you give and the total amount you receive are public (you can opt out of sharing this info).
Liberapay does not take a cut of payments, the service is funded by the donations to its own account. However there are payment processing fees.
Liberapay is an open project, you can help us translate it, improve its code, and manage its legal entity. If you do so, you’ll be able to join the Liberapay teamand receive a share of the money that our users donate to keep the service running.
8. Email service with GNUpg email encryption for communication – Please use paid email service for personal use or professional brand email service provided by Ethical Softwares :
Email service for personal use – http://safe-mail.net/
Gnu gpg (Gnu Privacy Guard) is a command line tool for encryption and decryption of emails. Without end to end encryption, the contents of emails are easily exposed to email service provider and to mass surveillance. Technically, OpenPGP (Pretty Good Privacy) is the encryption standard, and GNU Privacy Guard (often shortened to GPG or GnuPG) is the program that implements the standard. Most email programs like Icedove (created by Debian) provide an interface of Gnupg manager for storing GnuPG keys.
9. Report cyber attack or cyber crime – If their is any incident of cyber attack or cyber crime, then please send an email to the following cyber crime branch of your country. This is the website of India’s cyber crime branch :
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~