_St0rm

Staying "safe" online as a user. (OLD)

Feb 14th, 2012
381
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 9.18 KB | None | 0 0
  1. ###############################################
  2. # Staying secure online as a user| By: _St0rm #
  3. ###############################################
  4.  
  5.  
  6. www.twitter.com/_st0rm
  7.  
  8.  
  9. Table of contents:
  10.  
  11.  
  12. [*] Passwords
  13.  
  14. [*] Facebook Security
  15.  
  16. [*] Anti-Virus
  17.  
  18. [*] Calls
  19.  
  20. [*] Links
  21.  
  22. [*] Tools
  23.  
  24.  
  25. "A real hacker makes his victims not know they've been hacked."
  26.  
  27.  
  28.  
  29.  
  30. As a user, everyday you may be faced with spam, scammers and other malicious material.
  31. Staying safe in this day and age can be a challenge if you're not computer literate.
  32. So i'm going to list some tips on how to stay safe, and hopefully not get hacked.
  33.  
  34. ========================================================================================
  35. #############
  36. # Step one: # Passwords
  37. #############
  38.  
  39. Step one, have good passwords. These passwords can be something like:
  40.  
  41. 923593963395692_J@ys0ns@cC0unt
  42.  
  43. "That seems really scary... I like my simple to remember password such as:"
  44.  
  45. Jodie92
  46.  
  47. Well having easy to remember passwords is a really bad thing, people could look you
  48. up on facebook, and then see your name's Joedie and you were born in 1992.
  49. With that information, they could try guessing.
  50.  
  51. Also having good passwords makes it exceptionally hard to crack them from a hackers
  52. point of view.
  53.  
  54. If you find it really hard to remember passwords, then write them on a piece of paper
  55. and put them somewhere safe where you work or live. Then instead of something like:
  56.  
  57. Yahoo email account:
  58.  
  59. Password: 923593963395692_J@ys0ns@cC0unt
  60.  
  61. Have something like:
  62.  
  63. Y
  64. john231
  65. 923593963395692_J@ys0ns@cC0unt
  66.  
  67. For anyone looking at that, they're not gonna have a clue where that belongs to.
  68. Last thing, is don't use the same passwords EVER. This is the easiest way to hack into
  69. more than one thing for a person.
  70.  
  71. oh, and PS: Don't tell anyone your passwords...
  72.  
  73. Trust me, all hackers have done it.
  74. ========================================================================================
  75. #############
  76. # Step two: # Facebook Security
  77. #############
  78.  
  79. On facebook there's over 800 million users. Facebook is the biggest "Free" database
  80. for hackers or anyone to learn more about their target.
  81.  
  82. Seems scary?
  83.  
  84. So you've made your profile, you have your 1000 friends, and you're happy.
  85. Well have you enabled any of the security features?
  86.  
  87. I lived for 2 years having my facebook completely secure, nothing was allowed to be
  88. shown and no random people were added, only IRL friends were added.
  89. This helped me GREATLY! Everyday I always see some virus, or some of my friends
  90. inviting me to "join this" when really it's a malicious program used to send spam on
  91. your facebook account. And I never had any.
  92.  
  93. So I reccommend if you're security cautious about your personal information then I
  94. reccommend having 1: Good passwords, 2: Extra security on your facebook account.
  95.  
  96. If you don't know how to enable the features, then simply search it into google
  97. or youtube for video guides.
  98.  
  99. Once you've enabled some features you'll see some Facebook games or some
  100. "super awesome app" And you'll really want to use it.
  101.  
  102. Personally I DESPISE using these and adding them to my profile, because it has complete
  103. access to your personal information... Just to play a game?
  104. It's not worth it, google free online games and you can play for free
  105. without your information being noted down in a server somewhere.
  106.  
  107. This security goes exactly the same way for twitter. Don't click on random links
  108. by people you really don't know.
  109. ========================================================================================
  110. ###############
  111. # Step Three: # Anti-Virus
  112. ###############
  113.  
  114. I won't ramble about which is the best or why, however I will say:
  115. Norton Internet security is HORRIBLE.
  116.  
  117. Hackers whom i've encountered have even said it's almost a virus in itself.
  118. I utterly hate it because it's really bad.
  119.  
  120. An alternative for it could be AVG. The free version of AVG is 'in my opinion'
  121. better than Nortons paid packages.
  122.  
  123. So if you hate the anti-virus you have, or you want some new software
  124. or maybe you think you have a virus already. Download only ONE type of Anti-virus
  125. software, sometimes having two can be bad.
  126.  
  127. So I suggest, look on forums, look on google, watch youtube videos
  128. ask friends, ask the "I.T Guy" in your office!
  129.  
  130. Ask as many people as possible until you find the one that's right for you.
  131. See the anti-V's rating before buying it and make sure it's used by people you know.
  132.  
  133. Anti-virus in your computer is imperitive, I once spoke to a colleuge of mine about
  134. what software did he have, and he said: "Oh I don't have any."
  135.  
  136. My jaw almost dropped, and once we had scanned his computer, we found he had
  137. numerous viruses.
  138.  
  139. So this is where you the user goes and does what we like to call: "Recon."
  140. And find the best suitable Anti-Virus for yourself.
  141.  
  142. ========================================================================================
  143. ##############
  144. # Step Four: # Calls
  145. ##############
  146.  
  147. Where I live, I get a call almost every week from people saying they're from
  148. microsoft and there's something wrong with my computer.
  149.  
  150. Don't believe everything someone says, ask for credentials
  151. and if they wont give you any then hang up.
  152.  
  153. I got so many calls that I got a phone phreaker friend of mine to attach the phone
  154. to my computer so when someone called, I instantly got their Name and their Phone
  155. number.
  156.  
  157. Which I thought was pretty cool.
  158.  
  159. After I got the call, I would troll the caller so much that we would both laugh
  160. at the end of it, after I had a trace, I found where they were calling from.
  161.  
  162. I drove to the location where it said and after my friend at the Phone company helped
  163. me out in giving me their details.
  164.  
  165. I found where they lived, and knocked on the door. They denied everything, and so then
  166. I took my phone out and was about to call the cops. The people then removed their
  167. file on the people on the "recent call list." And I haven't had a call since.
  168.  
  169. People will try to scam you to get you to give them access to your computer,
  170. which from there they can do anything.
  171.  
  172. Always ask for credentials and always jot down what the person said for later use.
  173. ========================================================================================
  174. ##############
  175. # Step Five: # Links
  176. ##############
  177.  
  178.  
  179. You'll always get someone sending you malicious links, these are a real "NO NO."
  180. Don't ever click on a link that says "Make millions here!"
  181.  
  182. This is normal for some readers, but unfortunatly there's select few out there
  183. that do click on these links and lose access to their computer.
  184.  
  185. This is real basic internet knowledge, but for someone who's not used to the internet
  186. if you get a random email from someone with a PDF inside, and you think.
  187.  
  188. "Well it' just a PDF what could go wrong?"
  189.  
  190. PDF's and other documents can contain malicious programs which are called
  191. spyware and malware. These will give the hacker access to "logs" from your keyboard.
  192.  
  193. So when it comes to the internet and emails, be vigilant. Be smart. Be safe.
  194. ========================================================================================
  195. #############
  196. # Step Six: # Tools
  197. #############
  198.  
  199.  
  200. There aren't a whole lot of tools you can have as a simple internet user to keep safe.
  201.  
  202. There's things called Network sniffers, which can see who's on your network what they're
  203. doing and from what IP are they coming on from.
  204.  
  205. These can be really good if you have wireless Internet in a large area with lots of
  206. people.
  207.  
  208. There's also programs and software out on the internet that can be used
  209. to encrypt certain files and software to hide it from unauthorized access.
  210.  
  211. A really good example of some tools are from a Defcon video I stumbled upon.
  212.  
  213.  
  214. http://www.youtube.com/watch?v=U4oB28ksiIo
  215.  
  216. The title is:
  217.  
  218. Defcon 18 Pwned By the owner What happens when you steal a hackers computer zoz part
  219.  
  220. It's REALLY good, and I reccomend checking it out, because this guy can be used as
  221. our "user" example. His computer was stolen and he uses his skills and methods to
  222. find the person who did it by using some tools and software he had installed.
  223.  
  224. So if you're interested DEFINATLY watch that Youtube video and listen to his story.
  225. ========================================================================================
  226.  
  227. If I have missed something please don't hesitate to contact me on Twitter @
  228.  
  229. www.twitter.com/_St0rm
  230.  
  231. Thanks,
  232.  
  233. Storm.
Advertisement
Add Comment
Please, Sign In to add comment