What's new
  • Happy Birthday ICMag! Been 20 years since Gypsy Nirvana created the forum! We are celebrating with a 4/20 Giveaway and by launching a new Patreon tier called "420club". You can read more here.
  • Important notice: ICMag's T.O.U. has been updated. Please review it here. For your convenience, it is also available in the main forum menu, under 'Quick Links"!

Total internet and computer Security Tutorial!

Tokinwhiteguy

New member
TOR proxy download:

https://www.torproject.org/download/download.html.en



TORRENT DOWNLOAD SOFTWARE:


http://www.utorrent.com/


MALWAREBYTES PROGRAM DOWNLOAD:

http://torrentz.eu/search?q=MALWAREBYTES


COMMODO FIREWALL DOWNLOAD:


http://personalfirewall.comodo.com/free-download.html

ALSO SETUP SEPERATE "DEFINED PROGRAM" SETTINGS IN COMMODO FIREWALL. ONE SEPERATE FOR TOR: CORRECT SETTING IS ALLOW ONLY 0.0.0.0 TO 127.0.0.1 TO ANY PORT UDP AND TCP CONNECTION IN/OUT.

AFTER THAT NEW COMMAND BLOCK ALL THE REST

If you want to set up later you have your browser run of the TOR defined program setting, and you have all the TOR software run through your trusted defined setting using a VPN with instructions below using commodo.


iNSTRUCTIONS HOW TO SET UP FIREWALL CORRECTLY:

http://forum.hidemyass.com/showthread.php?tid=1298

http://forum.hidemyass.com/forumdisplay.php?fid=14


MAC ADDRESS CHANGER:

http://torrentz.eu/8b462658a680c7cf3a1afce4ccfd73c4fac3cf5e



VPN INTERNET PROVIDER LIST, plus site with lots of useful reading if bored:

http://www.privacylover.com/vpn-and-ssh-tunneling-providers-for-anonymous-internet-surfing/




FULL DISK ENCRYPTION

Insturctions for PGP install:

1. Install the appropriate install package (32 or 64 bit)
2. Start the keymaker as an administrator. Fill in the details. Click Patch. Turn off internet completely.
3. Restart your computer (without internet)
4. Start the keymaker, fill in the details. Click Generate.
5. Copy+paste first code (one row) you get and register PGP with it using the details filled in the keymakera
6 PGP says it cannot reach the internet. Choose to register with a customer care key manually.
7. Copy+paste the box with the longer serial.
8. Now your product should be registered.
9. Go into Options of PGP and turn off automatic updates.
10. Turn on internet Profit.


PGP Encryption for 32 bit OS

http://torrentz.eu/b48f733299e47bf54c7d83e3c27471251bf1801c

PGP Encryption for 64 bit OS

http://torrentz.eu/4e6be94c531f7f6b0d239bed4b70303c13da72ef


TRUCRYPT ENCRYPTION:


http://www.truecrypt.org/downloads

http://www.privacylover.com/encrypt...oor-in-truecrypt-is-truecrypt-a-cia-honeypot/

DISKCRYPTOR ENCRYPTION:

http://www.diskcryptor.net/wiki/Main_Page/en
 
T

TrichyTrichy

2 more that must have's, ESET Nod32 and MSE.

These two anti malware/viri proggies have saved my comp on more than one occasion.

Nod catches the newest keygen,adware,malware proggies it's unreal.
 

soulfly22583

Trust me.. I'm A Professional..
Veteran
If your going to suggest people use TOR make sure they know about the potential for a man in the middle attack. This has become a very large issue and is in the NetSec (Network Security) field a very serious issue that has in the last 5 months become more evident (some info that was obtained by wikileaks was found by using these kind of attacks)

read up - http://is.gd/qpd52i
 

Tokingham

Member
If you want to surf securely use portable applications. Get tor browser and if you want to really hide what you are talking about look up gpg4win.
 

Strainhunter

Tropical Outcast
Veteran
If your going to suggest people use TOR make sure they know about the potential for a man in the middle attack.

.........


I don't know much about internet security, just some common (sense) things so the "man in the middle attack" stuff was a bit hard for me to read up to.

Below is an easy to understand article for more average people like I am.

It explains in fairly plain language what mitm attacks are about:


http://www.wired.com/threatlevel/2010/03/packet-forensics/


At a recent wiretapping convention, however, security researcher Chris Soghoian discovered that a small company was marketing internet spying boxes to the feds. The boxes were designed to intercept those communications — without breaking the encryption — by using forged security certificates, instead of the real ones that websites use to verify secure connections. To use the appliance, the government would need to acquire a forged certificate from any one of more than 100 trusted Certificate Authorities.
The attack is a classic man-in-the-middle attack, where Alice thinks she is talking directly to Bob, but instead Mallory found a way to get in the middle and pass the messages back and forth without Alice or Bob knowing she was there.
 
Last edited:

Neuronaut

Active member
It would be nice if all this info was discussed/explained for us non-computer geeks out here. I'd live to know what exact security measures other icmaggers are using. I'm thinking of using a proxy/VPN but have no clue where to start.
 

Strainhunter

Tropical Outcast
Veteran
It would be nice if all this info was discussed/explained for us non-computer geeks out here.

........


Yes BUT that would not really help anyone since the situation is a bit more complex than just what is being discussed here.

In other words in order to know & understand how what works & how to set things one has to understand the process of doing so.

All that can be read up on Google etc, see my link in my post above for example.


Just like when one starts to grow...he/she can and does ask basic questions on here...but the actual growing process is more complex and is learned by experience and less on a forum.
 
P

Puddin'tane

https://www.icmag.com/ic/showthread.php?t=148861

Thread title
icon4.gif
Advanced Computer Security: How to Remove and Sever the Trail of Evidence

by IC member Crake
 

Latest posts

Latest posts

Top