in:
|
||
| Forums > Talk About It! > Security & Legal Issues > ICMag Security Do's and Don'ts! | ||
| Thread Tools | Search this Thread |
|
#31
|
|||||||||
|
|||||||||
|
We all know in the physical world, our fingerprints/d.n.a are an identifying mark we leave behind. In the digital world, we have these as well
// These list of links (below) need to be used everyday. Some programs dont need to be ran all the time with the others, logically you should determine when/what you need on your own accord. // https://www.peerblock.com/ ^ i use this when d/loading torrents. But, you see how much traffic your network receives. Believe me, it is amazing. Russia/China/Korea/Taiwan and every other IP will try and bounce packets of data around via your network. You can go as far as blocking all your country's IP, then only allowing chosen websites that you have to manually enter. Follow forums and faq for install. Very easy to use/update/etc. just an example.. i have over 4,000,000,000 ip's blocked using this service (ips go all the way from 000.000.000.000 to 255.255.255.255 so just imagine the possibilities!!!!!!!!!) // https://www.torproject.org/ similar to previous link, but hides/switches/bounces your ip all over the world via set up relay and networks set up. read up and use forums/faq if need be. very easy install/set up/use // https://www.technitium.com/tmac/index.html MAC address changer // https://www.youtube.com/watch?v=E5Z_Y...os=xsmcQqFuk4E https://www.youtube.com/watch?v=oiuEz...eature=related ^advanced https://www.youtube.com/user/mushroom...26/rS13EMF3M3o https://www.youtube.com/user/mushroom...27/1b80UKCDgi4 many more videos supporting various applications insides users playlist channel. check em out! // and lastly, use "spybot - search and destroy" and AVG weekly. defrag weekly or monthly if need be. // if anyone has anything to add, PLZ be my guest! id love to learn and employ other security functions on my comp/network // KM |
|||||||||
|
#32
|
|||||||||
|
|||||||||
|
thanks for the useful info kind
__________________
|
|||||||||
|
#33
|
|||||||||
|
|||||||||
|
Fingerprint deadbolts, and notifying your local police about your grow is two really unnecessary things. Ahh yes and for the home security alarm.. Look up Jason Wilcox to see how that backfired real quick. Strike three for Cateros
|
|||||||||
|
#34
|
|||||||||
|
|||||||||
|
Great advice skip.
|
|||||||||
|
#35
|
|||||||||
|
|||||||||
|
U can try JAP https://anon.inf.tu-dresden.de/download_de.html
or look ike that https://proxify.co.uk/ https://www.inetprivacy.com/ My english is not very well Sorry Best regards |
|||||||||
|
#36
|
|||||||||
|
|||||||||
|
Computer & Internet Security!
I've noticed a few threads lately about internet security and computer security and so on. I decided to take a little time to share with you some methods I have been using to make my pc and internet browsing more secure.
I've noticed in just about every grow related bust they usually confiscate computers, Well this is a bad thing if your not keeping your pc secure and your browsing history secure. If they come bust you take your pc in and start going through it and you have not taken proper precautions to secure it from the authority then you may find yourself in a pickle. Say they take your pc and you have lot's and lot's of pictures of plants or gardens you've grown over the years or they dig into your internet browser and your history, Say you even have icmag set to auto login without needing to manually login and they are able to check your pm's and post history and gain more evidence against you. What can we as growers do to protect our security as far as browsing sites like icmag and storing our pictures without fear these pictures and this browsing history may one day be used against you in court. There is a multitude of ways to secure your pc to prevent any of this evidence from ever being used against you. 1. Setup a proxy server, This allows you to use your internet to connect to a remote server (can be located anywhere in the world) and then connect to the internet through the remote server thus making your ip appear to come from the remote server. Giving you an ip address which would lead back to the remote server not the end user. The above method is great for preventing anyone from getting your real ip address and provides the security needed to browse this site and related sites without fear of your ip address leading back to you. 2.Setup a encrypted container to store all your pictures and pot related literature hidden and secure, So if the law was ever to confiscate your pc they will not be accessing your pics and such. 3. Setup and install a secondary Operating system inside this encrypted container, using a virtual machine emulator, This can be a multitude of operating systems, windows/linux or os of choice. This will insure that your cookies and your browsing history will be contained inside an encrypted container thus insuring if your pc is confiscated you will have no worries of them obtaining your browser history. In short if you set up this type of system you will be close to 100% protected and can relax knowing if they ever do confiscate your pc they will get no evidence to use against you. There is more to the encrypted container, Because the coppers can see that there is an encrypted container of whatever size it is, You have to setup a hidden encrypted container, What this is is a encrypted container with 2 layers one layer is the primary and the other layer is the hidden, When you setup this type of container it allows you to have 2 passwords one which will access the first layer of the container, This is where you can put a crapload of porn video's for them to find if they make you allow them access to the container. In short, You can browse the web without worry of your ip being obtained. Using the 2nd layer of your encrypted container to store pics and such, as well as for the secondary operating system which loads through virtual machine emulator inside your operating system, Thus keeping your browsing history safe and secure as well. You can set all this up for free, You boot into your normal operating system then mount your encrypted container and then launch the virtual machine emulator which boots your secondary os inside your running operating system, which is stored inside your encrypted container. I personally use truecrypt for my encrypted container, and virtualbox for my machine emulator. Both of these are free and truecrypt works well, I have mine setup to use 256bit aes encryption. I am running windows 7 64bit for my standard os and I use windows xp for my virtual machine emulator. I will finish this thread up a bit later with a guide on how to set everything up from the proxy server to the encrypted container and secondary operating system install using a virtual machine emulator. I need a smoke break and have some runs to make.
__________________
Perpetual Grow with 2 1k Bloom Rooms! 205w LED vs 400w HID let the battle begin!(Check it out) Recirculating Dwc Tutorial! Blazeoneup hits the dirt! The best dam grow show! 4,000w 64 plants ready set grow! 4,200w 3 rooms rdwc! 3,200w organic soil 2004 Old Harvest Old RDWC GROW Motivation Test Grow Overgrow will live on through it's members. If there's ever anything I can help with,feel free to pm me! |
|||||||||
|
#37
|
|||||||||
|
|||||||||
|
Be extra careful if crossing international borders with computers, or cameras, or flash drives with incriminating data etc.
Customs and TSA type people in many countries (including the US) have the right to inspect your computer, pictures, data, etc. I think they're looking mostly for kiddie porn, but they might be interested in anything that looks illegal. Personally, when not crossing borders, I don't worry too much about computer security. I'm just growing a few for personal. I DO know a great deal about computer security though; it's my field (Software development). But good computer security is a lot of work and an inconvenient pain, so I don't bother when I'm only growing for personal. Over the years I've seen TONS of bugs in computer security code, including some systems I played a part in that transfer billions around the planet every day (SWIFT). So my point is this: If you are a high value target, like a major drug lord, there are MANY ways your security could be compromised, even though you have many very good security measures, given the resources of the likes of the NSA, CIA. etc. For the guy growing with 10-20k watts though, you likely won't be facing CSI style on your computers, perhaps "Joe Shmoe Cop" who took a few simple courses. JS Cop would likely be stuck if you take decent measures like using true-crypt with hidden volumes. You can't be too lazy with security though. Leaving a laptop in standby with encrypted volumes unencrypted and your browser at ICMag is convenient, but a big potential problem for JS Cop who simply un-standby's the laptop. Once again though, for me, for personal, pffft. I don't need no stinking security, just so long as I don't go spreading my real name and pics all over the net. And I keep my illicit activities to a username that no page on the web is associatable to my real identity. And internet security is not just about legal issues. It's also about privacy and freedom from harrassment. Sometimes some internet nut (or even a neighbor) will take it upon themselves to out you, your name, address, family members, sexual habits, drug issues. etc. So keep your confidential internet identities unconnectable to yourself. Just one post, or web page, and your secrets may be out forever. The Internet Wayback machine, and other archivers of data, can and do keep some information forever, long after the original pages are gone.
__________________
Four & twenty blackbirds, baked into a pi. |
|||||||||
|
#38
|
||||||||||
|
||||||||||
|
Quote:
With desktops its unlikely that they will be going through your pc at your home they will likely unhook and confiscate and once the desktop is unplugged the container will need mounted and activated with the password before accessing the secured information. I'll finish up my post soon when I do I will be sure to add all the details....
__________________
Perpetual Grow with 2 1k Bloom Rooms! 205w LED vs 400w HID let the battle begin!(Check it out) Recirculating Dwc Tutorial! Blazeoneup hits the dirt! The best dam grow show! 4,000w 64 plants ready set grow! 4,200w 3 rooms rdwc! 3,200w organic soil 2004 Old Harvest Old RDWC GROW Motivation Test Grow Overgrow will live on through it's members. If there's ever anything I can help with,feel free to pm me! |
||||||||||
|
#39
|
|||||||||
|
|||||||||
|
Hey blazeoneup it seems like you have a pretty good idea of what I want/need to do so I'm anxious to follow this and see exactly how you set up the encrypted container and all because I'm not super skilled with computers and need a more detailed directions lol...
can't wait to see you finish up the details
|
|||||||||
|
#40
|
|||||||||
|
|||||||||
|
Use a unique registration email addy too.
So don't use the same email address for other sites as well? |
|||||||||
|
|