|
in:
|
|
| Forums > Talk About It! > Hobbies and Interests > Computers > Total internet and computer Security Tutorial! | ||
| Total internet and computer Security Tutorial! | Thread Tools | Search this Thread |
|
|
#1 |
|
New Member
Join Date: Dec 2007
Posts: 9
![]() |
Total internet and computer Security Tutorial!
TOR proxy download:
https://www.torproject.org/download/download.html.en TORRENT DOWNLOAD SOFTWARE: https://www.utorrent.com/ MALWAREBYTES PROGRAM DOWNLOAD: https://torrentz.eu/search?q=MALWAREBYTES COMMODO FIREWALL DOWNLOAD: https://personalfirewall.comodo.com/free-download.html ALSO SETUP SEPERATE "DEFINED PROGRAM" SETTINGS IN COMMODO FIREWALL. ONE SEPERATE FOR TOR: CORRECT SETTING IS ALLOW ONLY 0.0.0.0 TO 127.0.0.1 TO ANY PORT UDP AND TCP CONNECTION IN/OUT. AFTER THAT NEW COMMAND BLOCK ALL THE REST If you want to set up later you have your browser run of the TOR defined program setting, and you have all the TOR software run through your trusted defined setting using a VPN with instructions below using commodo. iNSTRUCTIONS HOW TO SET UP FIREWALL CORRECTLY: https://forum.hidemyass.com/showthread.php?tid=1298 https://forum.hidemyass.com/forumdisplay.php?fid=14 MAC ADDRESS CHANGER: https://torrentz.eu/8b462658a680c7cf3...fd73c4fac3cf5e VPN INTERNET PROVIDER LIST, plus site with lots of useful reading if bored: https://www.privacylover.com/vpn-and-...ernet-surfing/ FULL DISK ENCRYPTION Insturctions for PGP install: 1. Install the appropriate install package (32 or 64 bit) 2. Start the keymaker as an administrator. Fill in the details. Click Patch. Turn off internet completely. 3. Restart your computer (without internet) 4. Start the keymaker, fill in the details. Click Generate. 5. Copy+paste first code (one row) you get and register PGP with it using the details filled in the keymakera 6 PGP says it cannot reach the internet. Choose to register with a customer care key manually. 7. Copy+paste the box with the longer serial. 8. Now your product should be registered. 9. Go into Options of PGP and turn off automatic updates. 10. Turn on internet Profit. PGP Encryption for 32 bit OS https://torrentz.eu/b48f733299e47bf54...7471251bf1801c PGP Encryption for 64 bit OS https://torrentz.eu/4e6be94c531f7f6b0...70303c13da72ef TRUCRYPT ENCRYPTION: https://www.truecrypt.org/downloads https://www.privacylover.com/encrypti...-cia-honeypot/ DISKCRYPTOR ENCRYPTION: https://www.diskcryptor.net/wiki/Main_Page/en |
|
|
1 members found this post helpful. |
|
|
#2 |
|
Edge Member
Join Date: Mar 2006
Posts: 336
![]() ![]() ![]() ![]() ![]() |
Nice man.... this is a new subject of research for me thanks for the info...K+
__________________
"Security is never convenient." "A nation of sheep, led by pigs, and guarded by wolves." |
|
|
|
|
|
#3 |
|
Guest
Posts: n/a
|
2 more that must have's, ESET Nod32 and MSE.
These two anti malware/viri proggies have saved my comp on more than one occasion. Nod catches the newest keygen,adware,malware proggies it's unreal. |
|
|
|
|
#4 |
|
Trust me.. I'm A Professional..
Join Date: Aug 2007
Location: that one spot
Posts: 1,223
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
If your going to suggest people use TOR make sure they know about the potential for a man in the middle attack. This has become a very large issue and is in the NetSec (Network Security) field a very serious issue that has in the last 5 months become more evident (some info that was obtained by wikileaks was found by using these kind of attacks)
read up - https://is.gd/qpd52i
__________________
"My dads been stealing my weed since i was eleven."-chubbynugs fire it up... Comedy and herb - two of my favorite pasttimes in one place... I <3 IC Mag The fact that I pay taxes and contribute to society should be more than enough reason to allow me to smoke marijuana - denying me that right is cruel and unusual, and damn close to being a controlling government, not a controlled government. - j. "Man is Obsolete" - every day I watch the news and I feel this is more and more true... (Fear Factory) i'm the one without a soul i'm the one with this big fcuking hole - no new tale to tell twenty-six years on my way to hell - - - [Wish - NIN] |
|
|
2 members found this post helpful. |
|
|
#5 |
|
Member
Join Date: Apr 2011
Posts: 125
![]() |
If you want to surf securely use portable applications. Get tor browser and if you want to really hide what you are talking about look up gpg4win.
|
|
|
|
|
|
#6 | |
|
Tropical Outcast
Join Date: Oct 2009
Location: Tropical Island
Posts: 2,937
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
Quote:
I don't know much about internet security, just some common (sense) things so the "man in the middle attack" stuff was a bit hard for me to read up to. Below is an easy to understand article for more average people like I am. It explains in fairly plain language what mitm attacks are about: https://www.wired.com/threatlevel/201...ket-forensics/ At a recent wiretapping convention, however, security researcher Chris Soghoian discovered that a small company was marketing internet spying boxes to the feds. The boxes were designed to intercept those communications — without breaking the encryption — by using forged security certificates, instead of the real ones that websites use to verify secure connections. To use the appliance, the government would need to acquire a forged certificate from any one of more than 100 trusted Certificate Authorities. The attack is a classic man-in-the-middle attack, where Alice thinks she is talking directly to Bob, but instead Mallory found a way to get in the middle and pass the messages back and forth without Alice or Bob knowing she was there.
__________________
.
Something every grower "on the grid" should be aware of: Smart Meters - a few common misconceptions cleared up here. ![]() ![]() ![]() ![]() ![]() Last edited by Strainhunter; 05-01-2011 at 05:45 PM.. |
|
|
|
|
|
|
#7 |
|
poppin' outta control
|
Thanks everyone for this! Bump bump
|
|
|
|
|
|
#8 |
|
All we have is now.
Join Date: Jun 2005
Posts: 785
![]() ![]() ![]() |
It would be nice if all this info was discussed/explained for us non-computer geeks out here. I'd live to know what exact security measures other icmaggers are using. I'm thinking of using a proxy/VPN but have no clue where to start.
|
|
|
|
|
|
#9 | |
|
Tropical Outcast
Join Date: Oct 2009
Location: Tropical Island
Posts: 2,937
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
Quote:
Yes BUT that would not really help anyone since the situation is a bit more complex than just what is being discussed here. In other words in order to know & understand how what works & how to set things one has to understand the process of doing so. All that can be read up on Google etc, see my link in my post above for example. Just like when one starts to grow...he/she can and does ask basic questions on here...but the actual growing process is more complex and is learned by experience and less on a forum.
__________________
.
Something every grower "on the grid" should be aware of: Smart Meters - a few common misconceptions cleared up here. ![]() ![]() ![]() ![]() ![]() |
|
|
|
|
|
|
#10 |
|
Guest
Posts: n/a
|
https://www.icmag.com/ic/showthread.php?t=148861
Thread title by IC member Crake |
|
1 members found this post helpful. |
|
|
|
|