WRAM - We dedicate our hearts,minds and bodies to protecting our great Republic!
Hey folks! As I have noticed some of our members have problems with their computers and electronic devices. In this day and age, they are not gonna go away. They are just going to get more complex and harder to understand.
I would like the Administrators to keep this up, if-they-could, to help folks out. I'll be posting alot of what I know, and have picked up over the years....also, our resident computer security specialist and IT Person, Donald Wolf, is gonna be posting info here, as well.
Donald Wolf, who is in the IT Field, makes his living doing such stuff......thats all I'm gonna say. Me....I build things, I mess with things......I'm, for a better lack of terms here, a Geek. I keep on top of all the gizmos out there.
Anyway....He will be posting some 'White Paper' and the real techno stuff as it comes into his cranium. And I will add stuff as it becomes avail., and whenever I need straightening out....Don will slap me around some....
--A Special Heart Felt Thanks go out to everyone that Contribute here, especially when I'm Away, Especially to NoCo Patriot and Donald Wolf, Thank You Brothers!--
I will use this to suppliment our efforts at secure comms for radio and communications. Check back often for new things coming out!
IT IS OUR RIGHT TO USE SECURE COMMUNICATIONS!
AND TO DEVELOPE IT OPENLY!
That's not really how they are doing things in this computer era. There are programs (like ECHELON) that monitor all communications no matter what method is used. There is a data base filled with "key" words and if any of those words is used in relative conjunction with another, the communication is further sorted with other algorithms(structural patterns)by other computers. This refinement is continued until certain patterns are produced and provided to an analyst monitors the communication. If required, a search is done so that traffic analysis can be done on the communication. Person hours are valuable, so they let the computers do most of the heavy lifting and leave the nuances to people to assess.
When you go thru a body scanner, its like looking at you naked. There was a big stink this past week where the scanners don't work properly....there are some views avail. there that lets you see what they see....
The government wants to know everything it can about everybody it can. Facial recognition is alive and well on the British streets. Look at everyplace there are cameras now, here in the USA. In WalMarts, at intersections, out on the highways, in subways, courthouses, at gas stations, malls. And you know what....If they don't know about you, they'll make it a top priority to find out soon.
I know how the weasels work....
depends, many browsers now have a sandboxed tab capability. Google chrome calls it "incognito mode" and cookies and other things are forgotten when that tab is closed. Additionally other cookies are not shared, nor is browser history written.
That does not prevent you from being spied on, and you can always link accounts such as email or whatever to some other site giving up who you are. Your IP will also have session logs at your ISP which lets them identify you.
There are more than HTTP cookies, there are also flash cookies and things like http://panopticlick.eff.org/ which profile your browser and often can uniquely identify you despite any cookies being shared.
If you really want security from that type of tracking then you should look at virtual machines and have one VM for each set of activity that you do. That also means that it is easier to purge your system of any related activity merely by deleting the virtual machine drive file (securely as most deletes are partially or completely recoverable). This way it would appear to any tracker that completely separate computers are being used.
Security and usability conflict with each other. The more usable you make the system the more you are compromising security. Defining "secure from whom and for how long" lets you know where an acceptable level of compromise exists.
Security is not abosolute, it is mostly "risk mitigation".
WEP is inherently insecure, WPA is not much better. Even with mac filtering it is not hard for someone to connect. The best way I have seen is kinda complex for the average user. Not only use wpa and mac filtering but also a vpn over wifi and log everything that does not use that vpn to alert you should someone get in otherwise. I would avoid PPTP as the vpn protocol because the most common implementation is the microsoft one and that is known to be flawed.
Also know that police now regularly look to see if your wifi is secured, if it is then they make the argument in court that any traffic on your network must have come from you or someone you authorized to use the network. By securing it you run the risk of someone getting in and then you getting blamed for it with no viable defense. Segregation may be an option where you have a bandwidth throttled open access point for people to use if they really want to that way you have the ability to say "wasnt me" should anything ever happen.
computer security needs to be defined as "secure from whom and for how long". It is easy to secure against a 2 year old for long durations much harder to secure against a well organized well funded attacker (government or some private groups) for any length of time. The more secure something is the less usable it is, the two directly conflict with each other.
In most situations security works the same as "the club" steering wheel lock for autos. It does not stop anyone who specifically wants your car but it tends to make them go elsewhere for something easier to get. The more difficult you make it the less likely the random person will do anything. That leaves only those specifically targeting your network (either because its the only one in range or because they want your network specifically). This reduced traffic means you can monitor the network more for rogue activity without a lot of BS to filter through.
Great Articles there, NoCo Patriot! Yep, I’ve been traveling, at a hotel or a coffee shop…..and Had ‘‘THE FRANKENPUTER” with me. I have a program similar to AirSnare where I can ‘see’ all the local wireless internet connections and their IPS. I also run a packetsniffer….that way, if anyone can connect to me, I can get some info on them, should I need to.
One other thing guys, and I believe NoCo Patriot will back me up on this one. DON’T USE YOUR COMPUTER FOR A STOREROOM OF YOUR INFO!!!! BACK IT UP TO DISC OR A PORTABLE HARDDRIVE, THAT WAY, ITS PROTECTED! I believe he will hit upon that soon…..because it isn’t a question ‘IF’ your system is gonna crash, its ‘WHEN’, and ‘HOW BAD’!
OK, You’ve had your computer cleaned, and you want it to stay that way. But you still need to check in with WRAM to see if things are OK. And my other Freedom Websites. What type of programs do I need? Where can I get them? How do make it run efficiently?
Well, you can download them from CNet, and free places like that. FreeDownLoadCenter, etc, etc….just be careful. Searching anything for ‘Free’, is a hackers delight! Make sure your system is up-to-snuff! Also, check out BestBuy, Your local computer discount retailers……..
Make sure you have a good Firewall and AntiVirus, that is the absolute minimum! The free ones CAN do a good job, I have run them, and I still do on one of my machines. BUT, maybe you need more protection! Me, I have a side job…..I grade software. Free and Paid. Some are better than others. Just because something is free, doesn’t mean it won’t work. YOU HAVE TO HAVE THE RIGHT TOOL FOR THE RIGHT JOB!
The paid versions of the Firewall and the AntiVirus, which you can get a combined program from a lot of diff. people, is a lot more aggressive than the free versions, they usually update themselves better, their engines search out faster, and is usually their flagship products. The free versions are the same exact thing, just usually stripped down, without all the bells and whistles.
This one computer that I grade ware on, I’m going to use as a example. She’s called Goliath. Now, SoCo Patriot will probably give you the ins and outs of this when he checks in…..I’m just using this as a reference. Even in freeware, you have the good stuff and the cheap stuff that won’t work. Top of the line free stuff is like Avaste, AVG, etc. Paid....Symantec, McAfee, etc. Its good basic product. Their paid versions are GREAT! Everybody has the ones they like. You can’t run these 2 together on the same machine, they’ve got pride and they don’t play well together.
However, Avaste and IObit Security 360 do play well together. You can have one backing ( IObit)the other one up(Avaste). Its not wise to run 2 programs like this together, but I have, and I do….just have to find ones that will work. If you have a paid suite, like Avaste, with a AntiVirus and a built in Firewall….your good to go. Have them so they update automatically.
I’m going to use my system named Goliath as a example of what you need to run, as far as software is concerned. This is the system that I use to evaluate software with.
I have a Firewall, Antivirus, those are my front line defenses. Should they get into my system, I am ENCRYPTED! That means that if your on the outside looking in…..everything looks scrambled! It’s a security software, it does that. You set it with a password, or no (kinda defeats the purpose if you don’t use one though….and all kinds of other features), and go as secure as you want. From just keep a nosey person off you system to a secret agent trying to peek in on you. Get one if your serious about security! Theres a lot out there…..Goliath runs TRUECRYPT.
The Feds can get into any system, but, with something like TrueCrypt, they’d have to have my computer into their lab hooked up to theirs and decipher mine. It would take a while. On Line…..no.
Next step into our secure system has a AntiKeyLogger. A Keylogger is a tool that the bad folks plant or install to see what your typing . It can be a employer, or a hacker. Both use these. They can check to see if your working, surfing the net, or their favorite…..grabbing your account #’s. Some even have a screen capture built into them. Very sneaky and Nasty. This software (Anti Key Logger) lets you know when someone trys to hit your system, and keeps it from taking hold, in some instances. But Its does let you know someone is there. The antivirus and firewall system usually have a weaker version of this, Goliath runs DataGuard AntiKeyLogger.
Next comes Monitoring. These are on the system to see whats running, see how hard the computer is working and seeing how much data is going in and out of your system. They are like the gauges in your car/truck/motorcycle. On the computer side Goliath runs Moo0 System Monitor, which tells me the state of my CPU, whats running and its %. With this, I can see if my system is being taxed really hard. I can also see whats pegging my system out….if its any one program. On the internet side of Goliath, there is NetWorx. That tells me what my total bandwidth is being used, how much in going in , how much is coming out, rate transfer, etc. With this, I see if someone is downloading from me, if I’m downloading from them, if theres a bad connection. You can also set it for a certain amount of bandwidth….to keep from going over you fair access policy, or to keep a eye on how much your using. Its great to find folks stealing stuff off your system, too!
Now….after you’ve gone to your sites and have looked and done what you wanted and needed…..and your not gonna use you system for awhile or your gonna log off to go to work or do whatever…..you need to clean your system. This is a must. Tracking cookies and everything else can reside in your buffers and caches. If you knew the nuts and bolts of HOW THE INTERNET WORKED, all the data exchanged….you’d chringe!
After your done, your system will store information all over the place. Cookies, sites, domains, https, bits of files, a lot of it is stuff that will gum up the works if you don’t clean it out on occasions. Some of it can be used to track you, and it isn’t secured. Goliath uses CCleaner, and another Suite, WinUtilities, to keep her system clean. After I go on, I can go directly to WRAM, look at things, if I make a few posts or I’m looking around…..I’m also looking at my system monitor and bandwidth. If it jumps up really high….I click on my firewall internet button, I sever my connecton. I let the data clear…..so the folks looking can see that I see them…..then I reconnect. After all is said and done, I run CCleaner. I can hit analyze…sometimes its only 8 megs, sometimes if they’re busy, I’ll have 38 megs, depending. Computers store and share massive amounts of data. Then, I clean. You can choose none at all, a lite delete, a DOD (3 passes), NSA (7 passes) or Guttman (35 passes). This is a secure delete….multiple times. They won’t be able to retrieve this info. With their biggest and brightest, yes, but it will be limited…..
Also in WinUtilities, their 1 Button Checkup does much the same thing, but in a few different areas. It’ll clean your clipboard area, Caches, and buffers. One thing handy about this, is you can use this suite to keep your computer in top operating shape. You can defrag the harddrive (you have to un-encrypt the system to do this), clean your empty space on your harddrive (needs to be done periodically!), secure file deletion and emptying folder and recycle bin. It also has a built in task manager.
OK, you’ve run CCleaner and One Button Checkup and have cleaned your system thoroughly. All the messy stuff is gone…… Now then there are a few system setting we need now to go to and change.
to down load more than you are allowed in one day. SoCoPatriot will also tell you, you need all your patches and fixes on a regular basis.
Now, one other thing. Program manager. Stock program manager is for the birds. I use Process Explorer. It’s a very powerful tool, so if you try and use it, us only what you understand. I’ve had spyware or hackware hijack my system and I couldn’d do anything other than disconnect. BUT, I had process explorer, all I had to do is the 3 finger salute to bring it up, and then USE KILL PROCESS when I found the problem in the program listings.
Bad part about Windows, a lot of it is hidden from view. The spyware or hackware uses that very same way to hide from you. It goes into hidden programs or attaches itself to hidden parts. IF, if you can’t find it in process explorer, chances are, it’s a serious thing.
If that’s the case, go into Safe mode, then use your go-back feature. That has saved my backside several times also.
You don’t have to use these that I’ve said, I only run them and I don’t Advertise for them…..run whatever strikes your Fancy! On AntiVirus/Firewalls, you have Norton or Symantec, McAfee, Avaste, AVG, Online Armor…..hundreds more literally!
Last but not least, I have a program called Clocx, I can put it anywhere on the screen, has multiple alarms, and guess what else, Multiple Faces so when I want something different, I can change how it looks. I also have it so if late a night I get side tracked, it’ll shut down my computer at a certain time without my aid!
Everyone stay safe…………
Hey Guys.....just checking in. I had to go over to a friends house that has a major problem with his email program. Well....it was a mess.
Anyway, I'm going to say something about it, just in case any of you have a problem close to his.
He had a large attachment trying to come thru, but his email program would just sit there looking at it and it wouldn't download. I realize sometimes I don't sound very ladylike at times.....but say things in a way that can't be misunderstood. For a better lack of terms.....his email program was constipated. There, I said it, please excuse my French.
Anyway, there is a browser setting that won't allow attachments over 500K to come thru. When this happens, go online, and look at you emails like when your away from home, look at it.....then delete it. Close out off the net, the reopen your email program....everything should be A OK.
The fella had a email program last year that opened things whenever he's click on a email. NOT GOOD! Virus and other trash will attach itself to such messages!
Some of the better email programs will open itself not on your computer, but at the server end, that way if anything is screwy, the servers will take care of things. You have to be extremely careful here.....get a program that you like and one that gives you 24/7 support!
Cause if your at home in the late hours on Friday night, say 23:00, then if you don't have support, you'll be without email until Monday probably.
Like SoCo Patriot says, if they don't seem to be OK, even though it might be your friend.....don't open it! And avoid Co's that you know and do business with alot, like service providers, asking for account #'s or Passwords!!!!! Thats Phishing!
WHEN IN DOUBT, DON'T OPEN! I won't go into the nuts and bolts of it all, as NoCo Patriot is a most eliquette speaker.....I'll let him give you the lowdown.
Sometimes....these little viruses will get into your email and start going stupid. Or someone is getting remote access. What I do is get/ make up a funny name with a ficticious email address and put in my address book. I never use it, but once, and that was when I created it. Then it just sits there.
Now, every-once-in-a-while, look thru your 'sent' folder, and look around. If somethings been sent with 'Billy Jo Bob' in it.....somethings fishy. I also have it to where just in case I get any mail for Billy Jo Bob, its forwarded to my Secondary email address, just in case. Bots are bad about that......