Anonymizing UNIX Systems
http://www.thehackerschoice.com/pape...mous-unix.html
IV. USER DATA
>1. Sensitive user data
>2. Protecting /home directories
>3. Traceable user activity
>4. Protecting /var/spool/mail/user files
V. SYSTEM DATA
>1. Sensitive system data
>2. Traceable system activity
>3. Logging - important and dangerous
>4. Protecting system configs
>5. Computer Memory and sensitive /proc interfaces
VI. DELETE(D) DATA AND SWAP
>1. How to delete files in a secure way
>2. How to wipe free disk space
>3. How to handle swap data
>4. How to handle RAM
>5. Temporary data - it is evil
VII. NETWORK CONNECTIONS

VIII. HIDING PRIVACY SETTINGS
>1. Mount is your friend
>2. Removable Medias
>3. ???
IX. EXAMPLE CONFIGURATION AND SCRIPTS
X. FINAL COMMENTS
>1. Where to get the tools mentioned in this text
>2. Additional thoughts
>3. Greetings (what would the world be without greets?)
>4. How to contact me for updates or comments
I found this some-what informative... a good read for newbies like me