|
|
| Author |
Message |
MistaMiyagi
Dream Team
|
| Joined: 06 Feb 2005 |
| Posts: 50 |
|
19.22 Points
|
|
|
General Rules of Anonymity
Sat Feb 12, 2005 6:22 am |
|
|
Bees,
Be smart. Protect your identity and your files, especially if you are using an always-on broadband such as cable, DSL, or school network.
Always keep your OS updated
Always run an antivirus program.
Always run an antispyware program.
Always run a software - or better yet, hardware - firewall.
If you want secure communications, use PGP.
If you don't want to be tracked, use an anonymous remailer.
If you want to truly avoid problems, shy away from instant messengers and peer-to-peer (P2P) filesharing or use a P2P client that is known to not contain spyware.
Micro$oft updates --
Windows Update - http://windowsupdate.microsoft.com
Free antivirus programs --
Downloadable avast! Antivirus http://www.avast.com
Online virus scan - http://housecall.trendmicro.com/
Free firewall program --
ZoneAlarm - http://www.zonelabs.com/store/content/company/products/znalm/freeDownload.jsp?lid=zaskulist_download
Windows XP SP2 is not enough alone! You have been warned...
Last edited by MistaMiyagi on Wed Feb 23, 2005 11:00 am; edited 1 time in total |
|
| Back to top |
|
 |
|
|
|
True
Sat Feb 12, 2005 6:56 am |
|
|
Yes, I dream with a 1.5mb connection, and I have all those things installed,
God, but if I go on without protection,
I get 30 virii per session,
I use A good antivirus/firewall, and anonyminity proggy, Jap,
It protects me well,
syn |
|
| Back to top |
|
 |
jackoozzi
specialist
|
| Joined: 10 Feb 2005 |
| Posts: 135 |
| Location: Australia |
39384.40 Points
|
|
|
Sat Feb 12, 2005 7:23 am |
|
|
You have to have them i use
Adware for spyware
Avg for virus
Outpost for firewall
And i used to use Anonymizer till i found out the hard way that the people i most wanted to avoid just intercepted everything at your isp and it was of no help at all |
|
| Back to top |
|
 |
mind
|
| Joined: 10 Feb 2005 |
| Posts: 39 |
|
362.48 Points
|
|
|
Sat Feb 12, 2005 9:15 am |
|
|
| jackoozzi wrote: |
And i used to use Anonymizer till i found out the hard way that the people i most wanted to avoid just intercepted everything at your isp and it was of no help at all
|
if you have an SSL session via a proxy it will be very hard to see what site's you are visiting and what info you posting/reading..
you can easily see if you have an SSL connection enabled, the URL wil begin with HTTPS: instead of HTTP:
free proxy's: (not all will work)
http://www.stayinvisible.com/index.pl/proxy_list
http://www.atomintersoft.com/products/alive-proxy/proxy-list/
Also be sure NOT to use Internet Explorer, a great, free, open-source and more secure alternative is Firefox.
You can get free encrypted mail via https://hushmail.com/ , they also have an IM messenger.
stay safe!  |
|
| Back to top |
|
 |
squidippy
|
| Joined: 13 Feb 2005 |
| Posts: 3 |
| Location: pacific northwest |
0.00 Points
|
|
|
well
Mon Feb 21, 2005 1:33 am |
|
|
Well look at it like this, if they really really want you they've got "green lantern" or whatever they hell it's called. Fortunatly the people that have it CIA, FBI, ect, only hunt really, really big fish. And S/D is guppy, completely by design.
But anti-virus, anti spyware, is a must to maintain your computers integrity and potential. |
|
| Back to top |
|
 |
nubee
Master Archiver
|
| Joined: 18 Feb 2005 |
| Posts: 214 |
| Location: homeless |
18618.86 Points
|
|
|
| Back to top |
|
 |
weedar
|
| Joined: 21 Feb 2005 |
| Posts: 11 |
| Location: Norway |
53.60 Points
|
|
|
Mon Feb 21, 2005 5:07 pm |
|
|
Of course a truly paranoid person would boot from a CD-ROM that either
ran the OS off the disc or re-installed it on the hard-drive every time (like
some Internet Cafes do) - that way they would not bee able install the
keylogging software. A good example that comes to mind is booting from a
Knoppix (llinux) disc. |
|
| Back to top |
|
 |
malatesta
|
| Joined: 17 Feb 2005 |
| Posts: 8 |
|
218.64 Points
|
|
|
This is also an option
Tue Feb 22, 2005 2:00 am |
|
|
..its an OS that runs on a usb stick drive, flashcard and even from an ipod apparently, bypassing the host machines OS just like knoppix.
http://www.metropipe.net/ProductsPVPM.shtml
From what I'm told (I have never used it) it requires a pretty up to date CPU to run this at a reasonable speed. |
|
| Back to top |
|
 |
|
|
|
Wed Feb 23, 2005 8:07 am |
|
|
here are some links i found elsewhere:
|
|
| Back to top |
|
 |
|
|
|
Fri Mar 04, 2005 6:41 am |
|
|
The above metropipe virtual machine works but is pretty slow. It uses the QEMU virtual machine to run a cut down version of Linux. It will run on Windows and Linux and seems to do a good job of automating to connection to the host's network - i.e. run it, and it just works.
QEMU has just released an accelerator module for the virtual machine so it runs at almost native speed, but this needs to be installed on the host, making the thing less portable.
The other problem I can see is the host operating system paging virtual machine memory to disk, leaving traces.
If they can solve the speed and paging issues, this would be an excellent tool. |
|
| Back to top |
|
 |
nubee
Master Archiver
|
| Joined: 18 Feb 2005 |
| Posts: 214 |
| Location: homeless |
18618.86 Points
|
|
|
Fri Mar 04, 2005 10:43 am |
|
|
| i found bootable livecd's the best, as there may be issues with embedded linux (within windows) still beingable to be keyloggeed by something runnning in windows...? |
|
| Back to top |
|
 |
|
|
|
Security flows in Java and IE 6
Mon Mar 07, 2005 3:57 am |
|
|
If you grab a anonymous proxie, and turn off java, and still do a whois on yourself, showing that your ip is cloaked, then be careful,
Because your still not safe,
You must completely remove Java, which may mean, changing browsers, to something say like firefox,
Because of a security lookphole in Java, Your identity can easily be given away, even though you are completey anonymous, on a who-is find,
Here's an example:
http://www.stayinvisible.com/images/scheme.gif
syn |
|
| Back to top |
|
 |
|
|
|
| Back to top |
|
 |
brixtonj
|
| Joined: 29 Mar 2005 |
| Posts: 24 |
| Location: Brixton , London SW9 |
902.26 Points
|
|
|
about Anonymizer
Tue Mar 29, 2005 9:09 pm |
|
|
| jackoozzi wrote: |
You have to have them i use
And i used to use Anonymizer till i found out the hard way that the people i most wanted to avoid just intercepted everything at your isp and it was of no help at all
|
Hi !! . OBviously , If *they* are upon /after you .. then any resistance is futile.
But if you use Anonymizer (the premium edition ) at the High-security settings , then you can be assured ,that -in principle - they don't have any means to know which webs were you browsing.
->For example . The bassic (default) settings from anonymizer , just use a proxy to forward web pages. In this web's page .. www.synthetical.com gets the IP of the anonymizer's proxy (and not mine ) .
In this setting , even that the target web (Synthetikal can not locate you ) ... the lawEnforcementAgents can still peek trhought your connection (if your ISP allows them to do so) to see "www.anonymizer.com/request/www.synthetical.com"
and they see which webs are you accessing to.
BUT , and that's a big difference , if you use the premium (=paying) option of Double High Security , then your web=requests are SSL encrrypted aswell , with a public key , so .. these lawEnforcementAgents only see www.anonymyzer.com/requestEncrypted/fhjasdklfdsksdfha
and then .. tha'ts really dificult to intercept. It can be done (ITs a 256 bit key) but that would take them lots of money and time ... just to realize you are just browsing yahoo.com or whatever !!. They will simply be unable to know which pages are you accessing.
If someones still thinks that is not enough (well ,there is a even higher level of security , in which the incoming TCP packets (i.e. the ones sent from your target web to Anonymizer.com and from there to your computer are ALSO ENCRYPTED !! , definitely top-notch securituy level.
Assuming that we trust the people in anonymizer -and I do- .. and that you use the premium security level... ITs virtually impossible to get caught by solely internet use.
Well , hope this helps .
Have fun.Take care.
BrixtonJ. |
|
| Back to top |
|
 |
|
|
|
Wed Mar 30, 2005 6:43 am |
|
|
Why do you trust the people in Anonymizer?
You should never trust anyone by choice, trust is what you have to do when you have no choice. For example, I don't trust my friend - I don't need to. I've known him for years. I now how he behaves. I let him in my house whenever he wants and I have a pretty good idea that he is reliable and won't steal anything. I know him and therefore I don't need to trust him. I know my girlfriend well and don't trust her - I don't need to, I know her and think it is unlikely that she would cheat on me. Trust is what you do when you can't quantify the chance of the other party cheating on you and have no security to guarantee their behaviour. Never trust anyone if you have the choice: to do so is foolish.
If you use Anonymizer, this is exactly what you have to do. Who runs them or does anyone else have a tap into their servers? You don't know. Is there anything to stop them doing this? No. The situation is the same with all commercial anonymizing services. JAP was compromised and were decent enough to let on. The others may not be.
You say we should trust them. Why?
If you want an anonymizing proxy, use TOR. The source code is open and the setup makes it very difficult to snoop. |
|
| Back to top |
|
 |
|
|
|
Powered by phpBB 2.0.11 © 2001, 2002 phpBB Group
Igloo Theme Version 1.0 :: Created By: Andrew Charron
|