Navigator
Facebook
Search
Ads & Recent Photos
Recent Images
Random images
Welcome To Roj Bash Kurdistan 

Internet security HA HA HA this will help protect you :)

Share information about Computer , Internet, Websites ,Programming and other new technologies

Re: Internet security HA HA HA this will help protect you :)

PostAuthor: Anthea » Sat Jan 31, 2015 2:54 pm

Today I will return to basic:

Passwords: The first step to safety

Most people don't put a lot of thought into creating a password. It's usually easiest just to create a short, easy-to-remember password, or even just to use the same password for every account you have. After all, the average person probably won't be able to guess your password.

However, hackers often use password-cracking software that can keep testing many different passwords until they find the correct one, and they can easily crack weak passwords. By creating strong passwords, you can greatly reduce the chance that your personal or financial information will be stolen.

Common password mistakes

Many people create passwords based on their spouse's names, a hobby, or a simple pattern, since those types of passwords are easy to remember. Unfortunately, they are also very easy for hackers to guess. To create a strong password, you will need to avoid these types of common mistakes.

Image

The Top 25 passwords are:

password
123456
12345678
qwerty
abc123
monkey
1234567
letmein
trustno1
dragon
baseball
111111
iloveyou
master
sunshine
ashley
bailey
passw0rd
shadow
123123
654321
superman
qazwsx
michael
football

:lol: =)) :))

Tips for creating strong passwords:

Never use personal information such as your name, birthday, or spouse's name. Personal information is often publicly available, which makes it much easier for someone to guess your password.

Use a longer password. Your password should be at least six characters long, and for extra security it should ideally be at least 12 characters (if the site allows it).

If you need to write down your passwords, keep them in a secure place. It's even better if you encrypt your passwords, or just write down hints for them that others won't be able to understand.

Don't use the same password for each account. If someone does discover your password for one account, all of your other accounts will be vulnerable.

Try to include numbers, symbols, and both uppercase and lowercase letters (if the site allows it).

Avoid using words that can be found in the dictionary. For example, "swimming1" would be a weak password.

Random passwords are the strongest. Use a password generator instead of trying to think of one your own.

Random passwords are harder to remember, so create a mnemonic device. For example, "H=jNp2#" can be remembered as "HARRY = jessica NOKIA paris 2 #." This may still seem random, but with a bit of practice it becomes relatively easy to memorize. You can also choose a sentence that you know you'll remember and then use the first letter of each word in the sentence, plus a few symbols or numbers, as your password.

Using password managers

Instead of writing your passwords on paper where others can easily see them, you can use a password manager to encrypt and store them online. Some password managers can also generate random passwords, making your information even more secure. Examples of password managers include LastPass, KeePass, Firefox's password manager, and Chrome's password manager.

For example, when using LastPass you will first need to install the LastPass browser plugin. Whenever you type a password on a website, the browser plugin will ask you whether you want to save it. The next time you go to the website, LastPass can automatically enter the password for you. If someone else wants to use your computer, you can simply log out of LastPass to prevent the other person from accessing your information.

Personally I would NEVER use a password manager
My Name Is KURDISTAN And I Will Be FREE
User avatar
Anthea
Shaswar
Shaswar
Donator
Donator
 
Posts: 31601
Images: 1151
Joined: Thu Oct 18, 2012 2:13 pm
Location: Sitting in front of computer
Highscores: 3
Arcade winning challenges: 6
Has thanked: 6019 times
Been thanked: 746 times
Nationality: Kurd by heart

Re: Internet security HA HA HA this will help protect you :)

Sponsor

Sponsor
 

Re: Internet security HA HA HA this will help protect you :)

PostAuthor: Anthea » Sun Feb 01, 2015 4:24 pm

I hope that you have been following my hints - info - links

Now is the time to get even more serious about online security

In the past I have suggested people use Linux Mint - my personal favourite and an excellent opening into the world of the Mighty Penguin

Due to increased security risks I now suggest people go for something even more secure and I take pleasure in recommending the new release of :ymparty:

Image

backbox = take back control of your box (computer)

This is a distro for the tec savvy NOT a distro for those Microsoft (forgive use of the disgusting 'M' word) users who want to use big people's toys

Pro-actively protect your IT infrastructure with BackBox. It is the perfect security solution; providing pen-testing, incident response, computer forensics, and intelligence gathering tools. The most current release of BackBox Linux includes the latest software solutions for vulnerability analysis/assessment and pen-testing. It is one of the lightest/fastest Linux distros available on the Internet.

Today IT infrastructures are way too complex. Simplify security in your IT infrastructure with BackBox Linux. Easily manage large security assessments throughout your organization. With few resources and minimal time test your whole network. See how BackBox Linux simplifies security.

If you'd like to make any change/modification, in order to suite to your purposes, or maybe add additional tools that is not present in the repositories, nothing could be easier in doing that with BackBox. The software packaging process, the configuration and the tweaking of the system follows up the Ubuntu/Debian standard guide lines.

http://www.backbox.org/

Image

Remember you will need to get used to using Linux software before using backbox

I suggest Linux MATE 17.1 :-B
My Name Is KURDISTAN And I Will Be FREE
User avatar
Anthea
Shaswar
Shaswar
Donator
Donator
 
Posts: 31601
Images: 1151
Joined: Thu Oct 18, 2012 2:13 pm
Location: Sitting in front of computer
Highscores: 3
Arcade winning challenges: 6
Has thanked: 6019 times
Been thanked: 746 times
Nationality: Kurd by heart

Re: Internet security HA HA HA this will help protect you :)

PostAuthor: Anthea » Wed Feb 04, 2015 2:47 pm

Here are the 10 best add-ons to make everyone’s favorite opensource web browser even more secure.

1. Web of Trust (WOT) – You pretty much can’t read a Firefox security article without learning about the Web of Trust (WOT) add-on — and there’s good reason. WOT rates every site on the Internet for its security risk: green equals safe, amber equals worrisome and red means avoid like the plague. Simple, easy, and a must-have security measure. If you prefer a brand name, McAfee’s SiteAdvisor Firefox add-on offers similar functionality.

2. AdBlock Plus – The AdBlock Plus Firefox add-on says what it does, does what. AdBlock prevents most advertisements from loading — especially Flash ads and those layered takeover ads that slow your page loads down — including all the tracking cookies most ads slip into your system. Even if you aren’t paranoid about data-snooping, AdBlock will noticeably speed up your surfing.

3. LastPass – The LastPass Firefox add-on is the granddaddy of password managers. Create one master logon for LastPass itself and it will log you in to every other online service you’ve got an account with. Moreover, LastPass stops storing your passwords locally in the browser — where they can be hacked — and encrypts them into an online account you (and you alone) can access from anywhere. It also has some nice password generation and form auto-completion features, which makes account signups even safer and simpler.

4. BetterPrivacy – The BetterPrivacy Firefox add-on is designed to scrape away the most persistent tracking cookies that websites (and, especially, advertisers) use to profile your online activity. In particular, BetterPrivacy blows away Local Shared Objects (LSOs), the pernicious cookies left behind by Flash applications, videos and websites that most other extensions simply can’t erase.

5. NoScript – JavaScript makes a lot of interesting functionality possible on the Web — including nefarious clickjacking attacks. The NoScript Firefox add-on permits only JavaScript from trusted domains to run in your browser, preventing any unsavory functions from occurring behind the scenes.

6. BugMeNot – It seems every site on Earth wants you to create an account to view their content these days — mostly so they can track your surfing (even offsite) and sell your data to advertisers (as in spammers). The easiest way to avoid this constraint is the BugMeNot add-on, which provides anonymous credentials for most major sites, allowing you to login without creating or using a “real” account.

7. SpamAvert.com – Where BugMeNot stops, the SpamAvert Firefox add-on picks up. SpamAvert creates quick, disposable e-mail addresses you can use to enroll at sites you don’t intend to visit again. The fake e-mail accounts allow you to complete registration, but they also take the hit for follow-up spam, keeping your real accounts clear of the clutter.

8. Beef TACO – The Beef Targeted Advertising Cookie Opt-out (TACO) blocks almost every type of tracking object from settling into your browser. If it’s designed to report your web activity to dataminers or advertisers — including the big dogs like Google, Facebook and Yahoo — the Beef TACO swats it away. Combine this with BetterPrivacy and you’ll be an ad-free phantom in no time.

9. Torbutton – For those that don’t know, Tor is a proxy surfing service that prevents even your ISP (or employer) from knowing exactly what web sites you’re visiting. The Torbutton Firefox add-on makes using the Tor service dead simple, which is a good thing given how easy it is to turn proxy-configuration a tangle of confusing options. If you want absolutely nobody to know where you’ve been online, the Torbutton is the place to start.

10. hideBad – Sometimes the biggest security or privacy threat is the one that’s right over your shoulder — literally. The hideBad Firefox add-on offers a browsing panic button that instantly closes every open tab in your browser (while saving the data so you can restore the session later) and replaces them with your homepage. It stops snooping eavesdroppers (and dangerously curious bosses) from knowing which web pages you were just surfing, which may be the most important security measure of them all.
My Name Is KURDISTAN And I Will Be FREE
User avatar
Anthea
Shaswar
Shaswar
Donator
Donator
 
Posts: 31601
Images: 1151
Joined: Thu Oct 18, 2012 2:13 pm
Location: Sitting in front of computer
Highscores: 3
Arcade winning challenges: 6
Has thanked: 6019 times
Been thanked: 746 times
Nationality: Kurd by heart

Re: Internet security HA HA HA this will help protect you :)

PostAuthor: Anthea » Sun Feb 08, 2015 4:03 pm

Do YOU really think you are secure online?

Think again

Port Knocking :-B

In other words there is ALWAYS someone out there who knows more than you do

And much as I hate to admit it - there is always someone out there who knows more than I do :-s
My Name Is KURDISTAN And I Will Be FREE
User avatar
Anthea
Shaswar
Shaswar
Donator
Donator
 
Posts: 31601
Images: 1151
Joined: Thu Oct 18, 2012 2:13 pm
Location: Sitting in front of computer
Highscores: 3
Arcade winning challenges: 6
Has thanked: 6019 times
Been thanked: 746 times
Nationality: Kurd by heart

Re: Internet security HA HA HA this will help protect you :)

PostAuthor: Anthea » Sat Feb 14, 2015 12:46 am

Are you fed-up with seeing adverts everywhere you go online?

Thought you might like to know how to get ride of them :-B

Adblock Plus :ymparty:

Surf the web without annoying ads!

Blocks banners, pop-ups and video ads - even on Facebook and YouTube
Unobtrusive ads aren't being blocked in order to support websites (configurable)
It's free!

Image

Adblock Plus blocks annoying ads on the web. It can block other things, like tracking, as well. With more than 50 million users, it is the world's most popular browser extension. Adblock Plus is an open source project created by Wladimir Palant in 2006. Eyeo was founded in 2011 by Wladimir Palant and Till Faida to make its development sustainable.

Link to Full Details on Adblock Plus Website:

https://adblockplus.org/en/about
My Name Is KURDISTAN And I Will Be FREE
User avatar
Anthea
Shaswar
Shaswar
Donator
Donator
 
Posts: 31601
Images: 1151
Joined: Thu Oct 18, 2012 2:13 pm
Location: Sitting in front of computer
Highscores: 3
Arcade winning challenges: 6
Has thanked: 6019 times
Been thanked: 746 times
Nationality: Kurd by heart

Re: Internet security HA HA HA this will help protect you :)

PostAuthor: Anthea » Thu Feb 19, 2015 9:49 pm

Are YOUR emails secure?

I will answer for you :D

No YOUR emails are NOT secure

Unless YOU are using

Image

https://tutanota.de/#!home
My Name Is KURDISTAN And I Will Be FREE
User avatar
Anthea
Shaswar
Shaswar
Donator
Donator
 
Posts: 31601
Images: 1151
Joined: Thu Oct 18, 2012 2:13 pm
Location: Sitting in front of computer
Highscores: 3
Arcade winning challenges: 6
Has thanked: 6019 times
Been thanked: 746 times
Nationality: Kurd by heart

Re: Internet security HA HA HA this will help protect you :)

PostAuthor: Anthea » Sat Feb 21, 2015 10:56 am

Understanding encryption

phpBB [video]


phpBB [video]


phpBB [video]


phpBB [video]
My Name Is KURDISTAN And I Will Be FREE
User avatar
Anthea
Shaswar
Shaswar
Donator
Donator
 
Posts: 31601
Images: 1151
Joined: Thu Oct 18, 2012 2:13 pm
Location: Sitting in front of computer
Highscores: 3
Arcade winning challenges: 6
Has thanked: 6019 times
Been thanked: 746 times
Nationality: Kurd by heart

Re: Internet security HA HA HA this will help protect you :)

PostAuthor: Anthea » Sat Feb 21, 2015 12:26 pm

Security on the Web

phpBB [video]


You will see that the password most widely used is

123456

next is

123456789

unbelievably the third most widely used password is

password

I am well and truly SHOCKED :shock:

phpBB [video]


phpBB [video]


phpBB [video]
My Name Is KURDISTAN And I Will Be FREE
User avatar
Anthea
Shaswar
Shaswar
Donator
Donator
 
Posts: 31601
Images: 1151
Joined: Thu Oct 18, 2012 2:13 pm
Location: Sitting in front of computer
Highscores: 3
Arcade winning challenges: 6
Has thanked: 6019 times
Been thanked: 746 times
Nationality: Kurd by heart

Re: Internet security HA HA HA this will help protect you :)

PostAuthor: Anthea » Thu Mar 19, 2015 10:03 pm

Bruteforce to open an iPhone Lock Screen

Not having an iPhone password is just as secure as having one. :shock:

That alarming revelation comes from a video, which shows a device called an “IP box” that guesses random four-digit number combinations until it successfully gains access into an iPhone. It’s a called a brute-force attack, and it’s apparently common in phone repair markets, reveals security​ blog MDSec.

Although set-up to execute this is likely complicated for normals, it’s relatively easy for those who know their way around an iPhone. The IP box costs around $200​ on eBay and is connected to the iPhone though a $30 a​daptor kit.

The box guesses every possible numerical combination between 0000 and 9999 until it’s successful—even if the “Erase data after 10 attempts” option is configured. The video shows orange numbers flashing its guesses like it’s a cruel game on the Price Is Right.

How? The IP box is connected to the iPhone’s power source, cutting the power off before the attempt is recorded. “As such, each PIN entry takes approximately 40 seconds, meaning that it would take up to ~111 hours to bruteforce a 4 digit PIN,” the researchers write.

The problem was reveale​d last November. Apple has released a patch to fix the bug in iOS 8.1.1., however old versions are still vulnerable.

If you’re still concerned, a simple workaround is unselecting the “Simple Passcode” option and making your PIN more than four numbers because the box is too stupid to figure that out. :-B
My Name Is KURDISTAN And I Will Be FREE
User avatar
Anthea
Shaswar
Shaswar
Donator
Donator
 
Posts: 31601
Images: 1151
Joined: Thu Oct 18, 2012 2:13 pm
Location: Sitting in front of computer
Highscores: 3
Arcade winning challenges: 6
Has thanked: 6019 times
Been thanked: 746 times
Nationality: Kurd by heart

Re: Internet security HA HA HA this will help protect you :)

PostAuthor: Anthea » Tue Apr 14, 2015 7:28 pm

The first and most important tip is to not mix your dark web identity with your real one.

You shouldn’t work “from your mother’s bas​ement, or any location normally associated with you,” and “don’t talk about the same subjects across identities and take counter-measures to alter your writing style,” Nachash writes.

This practice of keeping identities separate is known as “compartmentation”, and is often where cybercri​minals fail.

The alleged Silk Road 2 creator arrested as part of Operation Onymous registered the server space of his site with his personal em​ail address. This is similar to a mistake that Ross Ulbricht, the recently convicted owner of the first Silk Road made: he sign​ed off a message advertising the site with a Gmail address which included his real name.

Next, Nachash writes, “Don’t log any communications, ever. If you get busted and have logs of conversations, the feds will use them to bust other people.” It’s also likely that these logs, if incriminating, could be used against you in court. This is exactly what happened to Ulbricht: he had reams of chat logs between him and his associates stored on his laptop, and he also kept a diary of many of his illegal actions.

When chatting, try to give out snippets of disinformation, Nachash continues. “Make sure that if you're caught making small talk, you inject false details about yourself and your life.” This is so a profile cannot be constructed of you, and help to track you down.

This is advice that hacktivist Jeremy Hammond didn’t follow: while talking to "Sabu," a member of hacker group LulzSec who at this point was working as an FBI informant, Hammond gave indications o​n his lifestyle, such as that he went dumpster diving. ​Records suggest this information helped the FBI to track him down.

Even if you get this far, and happen to start actually making money on the dark web, you shouldn’t then start flaunting your cash. “Living beyond your means is a key red flag that triggers financial and fraud investigations,” Nachash writes.

In all, “If you rely only on Tor to protect yourself, you're going to get owned and people like me are going to laugh at you.”

Or in other words, technology is not a fail-safe: if you want to remain pseudonymous online, you have to separate your multiple lives entirely, and follow some other, non-technical rules too. If you don’t do that, you are going to get caught, no matter how much fancy encryption you layer on your communications.
;) :ymdevil:
My Name Is KURDISTAN And I Will Be FREE
User avatar
Anthea
Shaswar
Shaswar
Donator
Donator
 
Posts: 31601
Images: 1151
Joined: Thu Oct 18, 2012 2:13 pm
Location: Sitting in front of computer
Highscores: 3
Arcade winning challenges: 6
Has thanked: 6019 times
Been thanked: 746 times
Nationality: Kurd by heart

Re: Internet security HA HA HA this will help protect you :)

PostAuthor: Anthea » Wed Apr 15, 2015 7:40 am

The Best Free Ways to Send Encrypted Email and Secure Messages

Link to site providing details of several securely encrypted email services :-B

http://www.howtogeek.com/135638/the-bes ... -messages/

Remember do NOT link your emails to your home location/computer

Read previous post ;)
My Name Is KURDISTAN And I Will Be FREE
User avatar
Anthea
Shaswar
Shaswar
Donator
Donator
 
Posts: 31601
Images: 1151
Joined: Thu Oct 18, 2012 2:13 pm
Location: Sitting in front of computer
Highscores: 3
Arcade winning challenges: 6
Has thanked: 6019 times
Been thanked: 746 times
Nationality: Kurd by heart

Re: Internet security HA HA HA this will help protect you :)

PostAuthor: Anthea » Wed Apr 22, 2015 12:53 am

Reminder: Google Remembers Everything You’ve Ever Searched For

My earliest Google search—the earliest one Google remembers, at least—was for "tetanus shot." My most recent was for "Tracy Morgan." In between, there are 52,493 searches, and Google remembers them all.

This shouldn’t come as a surprise. I know Google knows essentially everything there is to know about me—and you probably do, too. With its algorithms and analytics tools, it probably knows more about me than I know about myself (statistically, I most frequently search Google at 10 AM on Tuesdays in March). But presented in its totality, it's still a bit creepy to look at a history of every single Google search you've ever done.

​The company has now made it possible for you to export that history and download it from its servers. In one ZIP file, you can have a ​timestamped history of every random bit of trivia or thought you've ever had; of every restaurant you've ever cared to Yelp; of the times you looked up whether that movie you wanted to see was actually any good.

Image

It has a record of the times you've looked up hangover cures and searched weird symptoms to perform a self diagnosis. It knows that you looked up the address to the hospital to visit a loved one and it knows that you didn't know the address to the funeral home a week later. And it knows every time you didn't turn on Incognito mode to search for porn.

Again, this is not necessarily surprising, but it is striking. We know Google uses its connected products and the information it has on you to help target ads and to personalize your experience, which makes using Google feel seamless. Maybe you’re fine with that—lots of people are willing to trade privacy for convenience, or for something that costs them no money. But what if you’re not?

​It’s possible to change your settings so that Google doesn’t link your search history to your account. That’s a start, but Google still logs searches according to IP addresses, which can still be potentially tied back to you. You can also consider using a company like Duck Duck Go, which runs a “search engine that doesn’t track you.”

Google’s not the only one who uses your search history, of course. The record it has can be and often is ​subpoenaed by the government or by law enforcement.

In the first half of last year (more recent data is not yet available), the US requested user information, including search history, from Google 12,539 times. Google complied in 84 percent of cases. There are concerns that the NSA can tap the data as well. Google says that “only you can see your history,” but how true is that, really?


I strongly suggest you use DuckDuckGo

https://duckduckgo.com/
My Name Is KURDISTAN And I Will Be FREE
User avatar
Anthea
Shaswar
Shaswar
Donator
Donator
 
Posts: 31601
Images: 1151
Joined: Thu Oct 18, 2012 2:13 pm
Location: Sitting in front of computer
Highscores: 3
Arcade winning challenges: 6
Has thanked: 6019 times
Been thanked: 746 times
Nationality: Kurd by heart

Re: Internet security HA HA HA this will help protect you :)

PostAuthor: Anthea » Fri May 01, 2015 10:51 am

Encrypting Your Laptop Like You Mean It

Image

Time and again, people are told there is one obvious way to mitigate privacy threats of all sorts, from mass government surveillance to pervasive online tracking to cybercriminals: Encryption. As President Obama put it earlier this year, speaking in between his administration’s attacks on encryption, “There’s no scenario in which we don’t want really strong encryption.” Even after helping expose all the ways the government can get its hands on your data, NSA whistleblower Edward Snowden still maintained, “Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on.”

But how can ordinary people get started using encryption? Encryption comes in many forms and is used at many different stages in the handling of digital information (you’re using it right now, perhaps without even realizing it, because your connection to this website is encrypted). When you’re trying to protect your privacy, it’s totally unclear how, exactly, to start using encryption. One obvious place to start, where the privacy benefits are high and the technical learning curve is low, is something called full disk encryption. Full disk encryption not only provides the type of strong encryption Snowden and Obama reference, but it’s built-in to all major operating systems, it’s the only way to protect your data in case your laptop gets lost or stolen, and it takes minimal effort to get started and use.

If you want to encrypt your hard disk and have it truly help protect your data, you shouldn’t just flip it on; you should know the basics of what disk encryption protects, what it doesn’t protect, and how to avoid common mistakes that could let an attacker easily bypass your encryption.

If you’re in a hurry, go ahead and skip to the bottom, where I explain, step-by-step, how to encrypt your disk for Windows, Mac OS X, and Linux. Then, when you have time, come back and read the important caveats preceding those instructions.

What disk encryption guards against

If someone gets physical access to your computer and you aren’t using disk encryption, they can very easily steal all of your files.

It doesn’t matter if you have a good password because the attacker can simply boot to a new operating system off of a USB stick, bypassing your password, to look at your files. Or they can remove your hard disk and put it in a different computer to gain access. All they need is a screwdriver, a second computer, and a $10 USB enclosure.

Computers have become an extension of our lives and private information continually piles up on our hard disks. Your computer probably contains work documents, photos and videos, password databases, web browser histories, and other scattered bits of information that doesn’t belong to anyone but you. Everyone should be running full-disk encryption on their laptops.

Encrypting your disk will protect you and your data in case your laptop falls into the wrong hands, whether because you accidentally left it somewhere, because your home or office was burglarized, or because it was seized by government agents at home or abroad.

It’s worth noting that no one has privacy rights when crossing borders. Even if you’re a U.S. citizen entering the United States, your Constitutional rights do not apply at the border, and border agents reserve the right to copy all of the files off of your computer or phone if they choose to. This is also true in Canada, and in other countries around the world. If you plan on traveling with electronic devices, disk encryption is the only way you have a chance at protecting your data if border agents insist on searching you. In some situations it might be in your best interest to cooperate and unlock your device, but in others it might not. Without disk encryption, the choice is made for you: the border agents get all your data.

What disk encryption is useless against

There’s a common misconception that encrypting your hard disk makes your computer secure, but this isn’t entirely true. In fact, disk encryption is only useful against attackers that have physical access to your computer. It doesn’t make your computer any harder to attack over a network.

All of the common ways people get hacked still apply. Attackers can still trick you into installing malware. You can still visit malicious websites that exploit bugs in Flash, or in your web browser, or in your operating system’s font or image rendering engines, or countless other ways. When you visit benevolent websites, network attackers can still secretly make them malicious by modifying them in transit. Attackers can still exploit services running on your computer, such as network file sharing, iTunes playlist sharing, or your BitTorrent client, to name a few.

And of course, disk encryption doesn’t do anything to stop internet surveillance. Spy agencies like NSA, who tap into the fiber optic cables that make up the backbone of the internet, will still be able to spy on nearly everything you do online. An entirely different category of encryption is needed to fix that systemic problem.

The different ways you can get hacked or surveilled are too numerous to list in full. In future posts I’ll explain how to reduce the size of your probably-vast attack surface. But for now it’s important to know that disk encryption only protects against a single flavor of attack: physical access.

How it works

The goal of disk encryption is to make it so that if someone who isn’t you has access to your computer they won’t be able to access any of your files, but instead will only see scrambled, useless ciphertext.

Most disk encryption works like this. When you first power your computer on, before your operating system can even boot up, you must unlock your disk by supplying the correct encryption key. The files that make up your operating system are on your encrypted disk, after all, so there’s no way for your computer to work with them until the disk is unlocked.

In most cases, typing your passphrase doesn’t unlock the whole disk, it unlocks an encryption key, which in turn unlocks everything on the disk. This indirection allows you to change your passphrase without having to re-encrypt your disk with a new key, and also makes it possible to have multiple passphrases that can unlock the disk, for example if you add another user account to your laptop.

This means that your disk encryption passphrase is potentially one of the weakest security links. If your passphrase is “letmein”, a competent attacker will get past your disk encryption immediately. But if you use a properly generated high-entropy passphrase like “runge wall brave punch tick zesty pier”, it’s likely that no attacker, not even the NSA or Chinese intelligence, will ever be able to guess it.

You have to be extremely careful with strong disk encryption that can only be unlocked with a passphrase you’ve memorized. If you forget the passphrase, you get locked out of your own computer, losing your data forever. No data recovery service can help you, and if you give your machine to the FBI they won’t be able to access your files either. Because that’s kind of the point of disk encryption.

Once your computer is on and you’ve entered your passphrase, your disk encryption is completely transparent to you and to the applications on your computer. Files open and close as they normally would, and programs work just as they would on an unencrypted machine. You won’t notice any performance impact.

This means, however, that when your computer is powered on and unlocked, whomever is sitting at it has access to all your files and data, unencumbered by encryption. So if you want your disk encryption to work to its full potential, you need to lock your screen when your computer is going to be on while you’re away, and, for those times when you forget to lock it, to set it to lock automatically after, say, 10 minutes of idling.

It’s also important that you don’t have any other users on your system that have weak passwords or no passwords, and that you disable the guest account. If someone grabs your laptop, you don’t want them to be able to login at all.

Attacks against disk encryption

There are a few attacks against disk encryption that are tricky to defend against. Here are some precautions you can take.

Power off your computer completely (don’t just suspend it) when you think it’s at risk of falling into someone else’s hands, like right before going through customs when entering a new country. This defends against memory-based attacks.

Computers have temporary storage called RAM (otherwise known as memory) which you can think of as scratch paper for all of your software. When your computer is powered on, your software is constantly writing to and deleting from parts of your RAM. If you use disk encryption, as soon as you successfully unlock your encrypted disk the encryption key is stored in RAM until you power your computer off. It needs to be—otherwise there would be no way to encrypt and decrypt files on the fly as you use your computer.

But unfortunately, laptops have ports that have direct memory access, or DMA, including FireWire, ExpressCard, Thunderbolt, PCI, PCI Express, and others. If an attacker has access to your computer and your disk is unlocked (this is true even if your laptop is suspended), they can simply plug a malicious device into your computer to be able to manipulate your RAM. This could include directly reading your encryption keys or injecting commands into your operating system, such as closing the screen lock program. There is open source software called Inception that does just this using a FireWire cable and a second laptop, and there’s plenty of commercial hardware available too, like this one, or this one. It’s worth noting that new versions of Mac OS X uses a cool virtualization technology called VT-d to thwart this type of DMA attack.

But there are other ways for an attacker to learn what’s in your RAM. When you power your computer off, everything in RAM fades into nothingness. But this doesn’t happen immediately; it takes a few minutes, and an attacker can make it take even longer by physically freezing the RAM. An attacker with physical access to your powered-on computer can use a screwdriver to open the case of your computer and then use an upside-down can of compressed air to freeze your RAM (as in the image above). Then they can quickly cut the power to your computer, unplug your RAM, plug the RAM into a different computer, and dump all of the data from RAM to a disk. By sifting through that data, they can find a copy of your encryption key, which can then be used to decrypt all of the files on your hard disk. This is called the cold boot attack, and you can see a video of it in action here.

The key takeaway is that while your encrypted disk is unlocked, disk encryption doesn’t fully protect your data. Because of this, you may consider closing all your work and completely shutting down your computer at the end of the day rather than just suspending it.

It’s also important to make sure your laptop is always physically secure so that only people you trust ever have access to it. You should consider carrying your laptop with you wherever you go, as inconvenient as that may be, if your data is extremely important to you. When traveling, bring it with you in a carry-on bag instead of checking it in your luggage, and carry it with you rather than leaving it in a hotel room. Keep it with a trusted friend or locked in a safe when you can’t babysit it yourself.

This is all to defend against a different type of disk encryption attack known, in somewhat archaic language, as the “evil maid” attack. People often leave their laptops in their hotel room while traveling, and all it takes is one hotel housekeeper/elite hacker to foil your disk encryption.

Even when you use full disk encryption you normally don’t encrypt 100% of your disk. There’s a tiny part of it that remains in plaintext. The program that runs as soon as you power on your computer, that asks you to type in your passphrase and unlocks your encrypted disk, isn’t encrypted itself. An attacker with physical access to your computer could modify that program on the tiny part of your disk that isn’t encrypted to secretly do something malicious, like wait for you to type your passphrase and then install malware in your operating system as soon as you successfully unlock the disk.

Microsoft BitLocker does some cool tricks to make software-based evil maid attacks considerably harder by storing your encryption key in a special tamper-resistant chip in your computer called a Trusted Platform Module, or TPM. It’s designed to only release your encryption key after confirming that your bootloader hasn’t been modified to be malicious, thwarting evil maid attacks. Of course, there are other attacks against TPMs. Last month The Intercept published a document about the CIA’s research into stealing keys from TPMs, with the explicit aim of attacking BitLocker. They have successfully done it, both by monitoring electricity usage of a computer while the TPM is being used and by “measuring electromagnetic signals emanating from the TPM while it remains on the motherboard.”

You can set up your Linux laptop to always boot off of a USB stick that you carry around with you, which also mitigates against evil maid attacks (in this case, 100% of your disk actually is encrypted, and you carry the tiny unencrypted part around with you). But attackers with temporary access to your laptop can do more than modify your boot code. They could install a hardware keylogger, for example, that you would have no way of knowing is in your computer.

The important thing about evil maid attacks is that they work by tampering with a computer without the owner’s knowledge, but they still rely on the legitimate user to unlock the encrypted disk. If someone steals your laptop they can’t do an evil maid attack against you. Rather than stealing it, the attacker needs to secretly tamper with it and return it to you without raising your suspicions.

You can try using bleeding-edge tamper-evidence technology such as glitter nail polish to detect if someone has tampered with your computer. This is quite difficult to do in practice. If you have reason to believe that someone might have maliciously tampered with your computer, don’t type your passphrase into it.

Defending against these attacks might sound intimidating, but the good news is that most people don’t need to worry about it. It all depends on your threat model, which basically is an assessment of your situation to determine how paranoid you really need to be. Only the most high-risk users need to worry about memory-dumping or evil maid attacks. The rest of you can simply turn on disk encryption and forget about it.

What about TrueCrypt?

TrueCrypt is popular disk encryption software used by millions of people. In May of 2014, the security community went into shock when the software’s anonymous developers shut down the project, replacing the homepage with a warning that, “Using TrueCrypt is not secure as it may contain unfixed security issues.”

TrueCrypt recently underwent a thorough security audit showing that it doesn’t have any backdoors or major security issues. Despite this, I don’t recommend that people use TrueCrypt simply because it isn’t maintained anymore. As soon as a security bug is discovered in TrueCrypt (all software contains bugs), it will never get fixed. You’re safer using actively developed encryption software.

How to encrypt your disk in Windows :smile: :o :-D :lol: :)) =))

BitLocker, which is Microsoft’s disk encryption technology, is only included in the Ultimate, Enterprise, and Pro versions of Windows Vista, 7, 8, and 8.1, but not the Home version which is what often comes pre-installed on Windows laptops. To see if BitLocker is supported on your version of Windows, open up Windows Explorer, right-click on C drive, and see if you have a “Turn on BitLocker” option (if you see a “Manage BitLocker” option, then congratulations, your disk is already encrypted, though you may want to finish reading this section anyway).

If BitLocker isn’t supported in your version of Windows, you can choose to upgrade to a version of Windows that is supported by buying a license (open Control Panel, System and Security, System, and click “Get more features with a new edition of Windows”). You can also choose to use different full disk encryption software, such as the open source program DiskCryptor.

BitLocker is designed to be used with a Trusted Platform Module (TPM), a tamper-resistent chip that is built into new PCs that can store your disk encryption key. Because BitLocker keys are stored in the TPM, by default it doesn’t require users to enter a passphrase when booting up. If your computer doesn’t have a TPM (BitLocker will tell you as soon as you try enabling it), it’s possible to use BitLocker without a TPM and to use a passphrase or USB stick instead.

If you only rely on your TPM to protect your encryption key, your disk will get automatically unlocked just by powering on the computer. This means an attacker who steals your computer while it’s fully powered off can simply power it on in order to do a DMA or cold boot attack to extract the key. If you want your disk encryption to be much more secure, in addition to using your TPM you should also set a PIN to unlock your disk or require inserting a USB stick on boot. This is more complicated, but worth it for the extra security.

Whenever you’re ready, try enabling BitLocker on your hard disk by right-clicking on C drive and choosing the “Turn on BitLocker” option. First you’ll be prompted to make a backup of your recovery key, which can be used to unlock your disk in case you ever get locked out.

I recommend that you don’t save a copy of your recovery key to your Microsoft account. If you do, Microsoft—and by extension anyone Microsoft is compelled to share data with, such as law enforcement or intelligence agencies, or anyone that hacks into Microsoft’s servers and can steal their data—will have the ability to unlock your encrypted disk. Instead, you should save your recovery key to a file on another drive or print it. The recovery key can unlock your disk, so it’s important that it doesn’t fall into the wrong hands.

Follow the rest of the simple instructions and reboot your computer. When it boots up again, your disk will begin encrypting. You can continue to work on your computer while it’s encrypting in the background.

Once your disk is done encrypting, the next step is to set a PIN. This requires tweaking some internal Windows settings, but it shouldn’t be too hard if you follow the instructions to the dot.

Click Start and type “gpedit.msc” and press enter to open the Local Group Policy Editor. In the pane to the left, navigate to Local Computer Policy > Computer Configuration > Administrative Templates > Windows Components > BitLocker Drive Encryption > Operating System Drives.

In the pane to the right, double-click on “Require additional authentication at startup.” Change it from “Not Configured” to “Enabled”, and click OK. You can close the Local Group Policy Editor.

Now open Windows Explorer, right-click on drive C, and click “Manage BitLocker”.

In the BitLocker Drive Encryption page, click “Change how drive is unlocked at startup”. Now you can choose to either require a PIN while starting up, or requiring that you insert a USB flash drive. Both work well, but I suggest you use a PIN because it’s something that you memorize. So if you get detained while crossing a border, for example, you can choose not to type your PIN to unlock your drive, however you can’t help it if border agents confiscate your USB flash drive and use that to boot your computer.

If you choose to require a PIN, it must be between 4 and 20 numbers long. The longer you make it the more secure it is, but make sure you choose one that you can memorize. It’s best if you pick this PIN entirely at random rather than basing it on something in your life, so avoid easily guessable PINs like birthdates of loved ones or phone numbers. Whatever you choose make sure you don’t forget it, because otherwise you’ll be locked out of your computer. After entering your PIN twice, click Set PIN.

Now reboot your computer. Before Windows starts booting this time, you should be promped to type your PIN.

Finally, open User Accounts to see all of the users on your computer, confirm that they all have passwords set and change them to be stronger if necessary. Disable the guest account if it’s enabled.

How to encrypt your disk in Mac OS X

FileVault, Apple’s disk encryption technology for Macs, is simple to enable. Open System Preferences, click on the Security & Privacy icon, and switch to the FileVault tab. If you see a button that says “Turn Off FileVault…”, then congratulations, your disk is already encrypted. Otherwise, click the lock icon in the bottom left so you can make changes, and click “Turn On FileVault…”.

Next you will be asked if you want to store a copy of your disk encryption recovery key in your iCloud account.

I recommend that you don’t allow your iCloud account to unlock your disk. If you do, Apple — and by extension anyone Apple is compelled to share data with, such as law enforcement or intelligence agencies, or anyone that hacks into Apple’s servers and can steal their data — will have the ability to unlock your encrypted disk. If you do store your recovery key in your iCloud account, Apple encrypts it using your answers to a series of secret questions as an encryption key itself, offering little real security.

Instead, choose “Create a recovery key and do not use my iCloud account” and click Continue. The next window will show you your recovery key, which is twenty-four random letters and numbers. You can write this down if you wish. The recovery key can unlock your disk, so it’s important that it doesn’t fall into the wrong hands.

Once you click Continue you will be prompted to reboot your computer. After rebooting, FileVault will begin encrypting your hard disk. You can continue to work on your computer while it’s encrypting in the background.

With FileVault, Mac OS X user passwords double as passphrases to unlock your encrypted disk. If you want your passphrase to survive guessing attempts by even the most well-funded spy agencies in the world, you should follow the instructions here to generate a high-entropy passphrase to use to login to your Mac.

Go back to System Preferences and this time click on the Users & Groups icon. From there you should disable the guest account, remove any users that you don’t use, and update any weak passwords to be strong passphrases.

How to encrypt your disk in Linux

Unlike in Windows and Mac OS X, you can only encrypt your disk when you first install Linux. If you already have Linux installed without disk encryption, you’re going to need to backup your data and reinstall Linux. While there’s a huge variety of Linux distributions, I’m going to use Ubuntu as an example, but setting up disk encryption in all major distributions is similar.

Start by booting to your Ubuntu DVD or USB stick and follow the simple instructions to install Ubuntu. When you get to the “Installation type” page, check the box “Encrypt the new Ubuntu installation for security,” and then click Install Now.

On the next page, “Choose a security key,” you must type your encryption passphrase. You’ll have to type this each time you power on your computer to unlock your encrypted disk. If you want your passphrase to survive guessing attempts by even the most well-funded spy agencies in the world, you should follow the instructions here.

Then click Install Now, and follow the rest of the instructions until you get to the “Who are you?” page. Make sure to choose a strong password—if someone steals your laptop while it’s suspended, this password is all that comes between the attacker and your data. And make sure that “Require my password to log in” is checked, and that “Log in automatically” is not checked. There is no reason to check “Encrypt my home folder” here, because you’re already encrypting your entire disk.

And that’s it.

Correction: This post originally gave an incorrect date for when the TrueCrypt project was shut down. April 27 12:35 pm ET.

Correction: This post originally said that USB ports have direct memory access (DMA), but this isn’t true. FireWire, ExpressCard, Thunderbolt, PCI, and PCI Express all have DMA. April 29 6:17 pm ET.

Email the author: micah.lee@theintercept.com
My Name Is KURDISTAN And I Will Be FREE
User avatar
Anthea
Shaswar
Shaswar
Donator
Donator
 
Posts: 31601
Images: 1151
Joined: Thu Oct 18, 2012 2:13 pm
Location: Sitting in front of computer
Highscores: 3
Arcade winning challenges: 6
Has thanked: 6019 times
Been thanked: 746 times
Nationality: Kurd by heart

Re: Internet security HA HA HA this will help protect you :)

PostAuthor: Anthea » Fri May 01, 2015 12:03 pm

Mozilla Working to Provide Tracking Protection in Firefox

How to Enable It

The feature is available now in the Nightly build

Mozilla is working on a new feature called Tracking Protection that is helping users identify and block websites that collect personal data despite the fact that the browser has the "Do Not Track" policy enabled.

Browsers come with an incognito feature for a few years now, and you would think that it would be sufficient, but it's not. Some websites still gather information, and that happens even if the user enables the "Do Not Track" options that are present in most browsers today. In a world very much concerned with privacy, having websites get data from your computer without your consent is a problem, even if it's only cookies or other metadata.

Developers can't stop websites from collecting data, but that doesn't mean that they can't do something proactively that can help the user filter out the bad "apples." Mozilla is now working on a feature called Tracking Protection that uses a third-party service, Disconnect's blocklist. This is a list of websites presenting this kind of behavior, and users are now informed when that happens so they can block it or stay away from the website.
Nothing is really secure

It's quite possible that a website has some embedded malware installed on your system when you access it. Tracking Protection does not offer protection against that kind of aggression; it's only an informative tool. You still need other apps to protect your system, but hopefully the websites that misbehave might not want to get on a list that filters out users.

"Tracking is the collection of a person’s browsing data across multiple sites, usually via included content. Tracking domains attempt to uniquely identify a person through the use of cookies or other technologies such as fingerprinting. While Firefox has a Do Not Track feature that tells websites not to monitor your behavior, companies are not required to honor it. Firefox's Tracking Protection feature puts the control back in your hands by actively blocking domains and sites that are known to track users," reads the official website.
How to activate Tracking Protection in Firefox

Tracking Protection is a very new feature, and it's only available in the Nightly builds of the browser, which means that it will take a few months until it reaches the stable branch. In any case, if you are using this built, you can follow a few easy steps:

- Open a new tab and type about:config and press Enter

- Agree not to ruin anything by pressing the "I'll be careful, I promise!" button

- Search for privacy.trackingprotection.enabled and change its value to "true" with a simple double-click.

It's as simple as that and disabling the feature is just as easy, just switch the latest setting to "false."
My Name Is KURDISTAN And I Will Be FREE
User avatar
Anthea
Shaswar
Shaswar
Donator
Donator
 
Posts: 31601
Images: 1151
Joined: Thu Oct 18, 2012 2:13 pm
Location: Sitting in front of computer
Highscores: 3
Arcade winning challenges: 6
Has thanked: 6019 times
Been thanked: 746 times
Nationality: Kurd by heart

Re: Internet security HA HA HA this will help protect you :)

PostAuthor: Anthea » Sun May 03, 2015 7:27 pm

The Linux Security Summit (LSS) is a technical forum for collaboration between Linux developers, researchers, and end users

August 20 - 21, 2015
Sheraton Seattle, Seattle

Anyone lucky enough to be in or anywhere near Seattle I would STRONGLY
recommend you taking part :-B

http://events.linuxfoundation.org/event ... ity-summit

Sadly I am in England and unable to go :(( :(( :(( :(( :(( :((
My Name Is KURDISTAN And I Will Be FREE
User avatar
Anthea
Shaswar
Shaswar
Donator
Donator
 
Posts: 31601
Images: 1151
Joined: Thu Oct 18, 2012 2:13 pm
Location: Sitting in front of computer
Highscores: 3
Arcade winning challenges: 6
Has thanked: 6019 times
Been thanked: 746 times
Nationality: Kurd by heart

PreviousNext

Return to Computer & Technology

Who is online

Registered users: Bing [Bot]

x

#{title}

#{text}