Advertisement
Guest User

Internet Security and Privacy

a guest
Feb 23rd, 2013
2,818
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.34 KB | None | 0 0
  1. How to protect yourself in the internet
  2.  
  3. This document it's for education purposes only. Note that the autor does not have responsability with what anyone do using the programs or tools listed in this document.
  4.  
  5. 1.Use of VPN
  6.  
  7. The best way to be anonymous on the internet without having your IP leaked is to use a vpn, offcourse that there are two types the unsafe and the safe VPN's, I'm going to list them below.
  8.  
  9. 1.1. Paid VPN's (safe)
  10. Mullvad – http://www.mullvad.net
  11. PQR - http://www.prq.se/
  12. VPN Tunnel - https://www.vpntunnel.com/
  13.  
  14. 1.2. Free safe VPN's (not advised to use though)
  15. SecurityKiss - http://www.securitykiss.com/
  16. OpenVPN - http://openvpn.net/
  17. CyberGhost - http://cyberghostvpn.com/
  18.  
  19. 2.Use of DNSCrypt or Anonymous DNS's
  20.  
  21. It is advised to use DNScrypt tool so you can protect from DNS leak on the internet,
  22. because if your DNS is leaked you can be tracked via DNS passive checking.
  23.  
  24. Download: http://www.opendns.com/technology/dnscrypt/ for windows and linux.
  25.  
  26. Linux users configuration: http://linuxaria.com/howto/dnscrypt-crypt-your-dns-request?lang=en
  27.  
  28. NOTE: If the service on linux fail to configure properly just start dsncrypt-proxy from command line and do not close the window.
  29. And don't forget on linux to configure the 127.0.0.1 as your proxy for every connnection.
  30.  
  31. Anonymous DNS: http://anonymous-proxy-servers.net/wiki/index.php/Censorship-free_DNS_servers
  32.  
  33. Configure it as your DNS servers for you.
  34.  
  35.  
  36. DNS leak test after configuration: http://www.dnsleaktest.com/
  37.  
  38. 3. Use of Proxychains
  39.  
  40. It's advised, in spite of using VPN and DNScrypt, to execute commands in linux using proxychains.
  41.  
  42. http://securitytube-tools.net/index.php?title=Proxychains
  43.  
  44.  
  45. 4. Use of TOR network proxy's and Anonymous proxy's
  46.  
  47. Use of TOR network can hide your original IP from internet users
  48.  
  49. Download Vidalia (Windows users): https://www.torproject.org/projects/vidalia.html.en
  50.  
  51. Download/install Vidalia (Linux users): https://www.torproject.org/docs/debian-vidalia.html.en
  52.  
  53. Download TOR Browser (Windows users): https://www.torproject.org/docs/tor-doc-windows.html.en
  54.  
  55. Download TOR Browser (Linux users): https://www.torproject.org/docs/debian.html.en
  56.  
  57. Anonymous proxy's: http://anon-proxies.com/
  58.  
  59.  
  60. 5. Use of IRC proxy
  61.  
  62. When connecting to a IRC server even if you use any security measures as described you should use an IRC proxy.
  63.  
  64. Download IRC proxy: http://ircproxy.sourceforge.net/index.php?page=configuration
  65.  
  66.  
  67. If any help or sugestions on the information above please contact: v7ad1m1r@hushmail.me
  68.  
  69. 6. Use o Jabber Servers + Pidgin + OTR in Windows/Linux
  70.  
  71. The best way to know that your messages are safe bettween your friends it's using a jabber server account in Pidgin and having OTR (off the record messages, allways point-to-point encrypted messages)
  72.  
  73. Pidgin for Linux: You can use Synaptic if you use debian based OS's
  74. You can even compile it from source.
  75.  
  76. Safer Jabber servers you can use (all these use TOR proxy's):
  77. https://help.riseup.net/en/chat
  78. http://web.jabber.ccc.de/
  79.  
  80. See it here how to do it: http://www.cypherpunks.ca/otr/
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement