Documente Academic
Documente Profesional
Documente Cultură
Introduction
Hack yourself before going outside for hacking
Generally when you visit server or site, it has an ability to grab much information about you. In sometimes people do not want to leave their traces on the server or site. But before digging into the solution of anonymity lets have some information about the server that which type of information it collects from user.
Which information can server grab from your system when you visit them
As I have said earlier that you have to check yourself that are you secure? Can anybody hack into your system? There are many ways of checking this, but here I am pointing out some of the basic but very effective ways of it.
What Is Collusion?
There is one beautiful add-on for Firefox named Collusion. The reason that why I am giving so much importance to this add-on is that this add-on is created by Mozilla. It shows your real time trackers.
Limitations of Incognito
There is one beautiful add-on for Firefox named Collusion. The reason that why I am giving so much importance to this add-on is that this add-on is created by Mozilla. It shows your real time trackers.
Normal Data Collection - Computer Configuration, OS, Browser Information, Plugin Rough Data Collection - User agent string of browser, HTTP accept headers, Color Depth
of screen, Screen resolution, Time zone set at the client side, Fonts installed to the computer
Live Testing of The Uniqueness of the browser Purpose Of This Project - By testing the browser, we can identify that how much my
system or browser is track able. Which information does my browser shares with the sites which I visit? So we can fix that.
Also Do Book Reading Of Real Life Anonymity - Disappearing In Your Real Life Websites For Generating Fake Identity
www.fakenamegenerator.com For Advance Use www.kleimo.com For Basic Use
Websites
www.mailnator.com www.spamgourmet.com www.dispostable.com www.trashmail.net
Other Tools
Windows: Microsoft SDelete, Wife File, Delete on Click Linux: Wipe Package from UBUNTU MAC OS X: SRM, Permanent Eraser.
Cryptographys 3 parts
1. Communication Encryption Network Encryption - Generic Phone Encryption Nautilus Session Encryption SSH Email Encryption - PGP Database Encryption File Folder - Harddisk Encryption 7-Zip , AxCrypt , True Crypt, Sophos Free Encryption, Cryptext, Sofonica Folder Soldier, Disk Utility For Mac Users, Safe Hous Explorer, dsCrypt, Rohos Mini Drive, Free TFE Explorer For Windows and Unix Users, Remora USB File Guard, GNU Privacy Guard
2. 3.
TrueCrypt - Explained
Introduction
This tool is the ever best tool for encryption. It is for establishing as well as maintaining on the air encrypted volume. On the air encryption means data is automatically encrypted when you save the data and vice versa it is decrypted when you are loaded. There wont be any data which can be readable and which is encrypted. Without using the correct password it wont be available for reading data.
If you do any suspicious acts in terms of hacking, then it must be either deleted after done and encrypted while doing.
Of course you are not permitted to leave youre tut (Txt PDF DOC PPT), tools and web history on that account after your goal gets finished.
Security should not be up to the Application layer. What about the network layer security? If you are connected to the internet then there is always a risk factor of your data breach, system compromised anything. As you are aware that, Now a days DDOS attack is very much widely used attack. The hacker who generates auto spreading bot is not only the one who hacks the application, many thousands of compromised systems who are acting as BOTS are also the part of attack. So these were all about the attack. So here is all about those firewalls which can protect you on the internet. Indirectly it also helps to keep you anonymous. So that, you cannot be affected by hackers.
He will try to SPOOF the IP address from the entry of the packets sent to your system. Your system will allow it to execute to in your computer / Laptop without any further criteria. Thus hacker is able to gain the whole session of your computer. He can breach the data and make your PC to do that what he/she (hacker) likes. She/he does this through sending instruction to your computer.
It protects your computer from being executing hostile instructions. In organizations many systems are connected internally in LAN and they all are connected to the internet. Firewall enables the system administrators to let him select the systems to be connected to the internet. It enables funneling Means keeping aside the non valid users or the non authorized users. It gives alert when suspicious activity occurs. Thus if any hackers is going to install a RAT in your PC it gives alert, this is just a small example, if you are being tracked then you can even identify that with the analysis of the packets, which is a feature of major firewalls. It shows which services are working on which port and other Meta data.
This OS is the best OS ever I have seen developed by Kaos.Theory Security Research. This OS is on Bootable CD. It has a many level of privacy which many security professionals and professional hackers are using. But the impact of this Live CD is that it is provided with a good user interface. The name Anonym itself giving the meaning of privacy, It is a perfect solution for using computer or your laptop without touching or using your hard disk. So it doesnt allow user to leave traces knowingly or unknowingly. In openBSD operating system, researchers says that this OS the one of the best and advance security operating system. The ambition of this project is to provide anonymous as well as secure web surfing. Download Link - http://sourceforge.net/projects/anonymos/files/Anonym.OS%20Live%20CD/ShmooCon%202006/
This OS is designed for those activists who wants to be anonymous, who wants to maintain their privacy during the internet. By the use of this OS they can create, publish documents as well as they can manage websites, their pages, blogs and all that stuff anonymously. Also it provides secure communication environment.
Benefits Of This OS
Each and every connection of the internet is forced to pass though the TOR. It doesnt leave a single trace on your computer. One can use cryptography for protecting their emails, documents and other stuffs like instant messaging. With the help of use Mumble one can encrypt their voice chat and conference. Xchat-OTR and Pidgin-OTR tools are used for encrypting instant messaging. It has secure hard disk wiping tool.
SSH Tunnel
Introduction
It is the secure command line. It is identical like encrypted telnet. Basically in this system an attacker connects to the Remote server and then they use encryption so there wont be anyone who will monitor their activity. There will not be anyone who will able to sniff his username passwords. The technology is built on Server = Client system, in order to that it has an ability to tunnel the whole network traffic. So from my system the traffic will be directly tunneled and will reach to the endpoint whichever the site I want to open. As an impact or that, that site will assume that the traffic is generated here at the endpoint (At there on the website), not from my original system. This is the excellence of this technology.
Contact Details
Chintan Gurjar
Facebook : https://www.facebook.com/h4nDs0m3.dEviL Skype : chintan.letsnurture Email : chintangurjar1990@gmail.com ; frogmode@yahoo.com Twitter : https://www.twitter.com/chintan_gurjar
Vikas Roy
Facebook : https://www.facebook.com/varoyme Email : varoyme@gmail.com
Greetings