Welcome to ECCIE, become a part of the fastest growing adult community. Take a minute & sign up!

Welcome to ECCIE - Sign up today!

Become a part of one of the fastest growing adult communities online. We have something for you, whether you’re a male member seeking out new friends or a new lady on the scene looking to take advantage of our many opportunities to network, make new friends, or connect with people. Join today & take part in lively discussions, take advantage of all the great features that attract hundreds of new daily members!

Go Premium

Go Back   ECCIE Worldwide > General Interest > Technical Questions
test
Technical Questions Even the most computer-savvy may have technical questions regarding navigation of the site. Ask it here! If you have an answer, be our guest! (For further assistance, contact your local moderator or see the "Emails to the Staff" post in the Questions for the Staff city forums)

Most Favorited Images
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
Most Liked Images
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
Top Reviewers
cockalatte 649
MoneyManMatt 490
Still Looking 399
samcruz 399
Jon Bon 398
Harley Diablo 377
honest_abe 362
DFW_Ladies_Man 313
Chung Tran 288
lupegarland 287
nicemusic 285
Starscream66 283
You&Me 281
George Spelvin 270
sharkman29 256
Top Posters
DallasRain70819
biomed163610
Yssup Rider61215
gman4453331
LexusLover51038
offshoredrilling48791
WTF48267
pyramider46370
bambino43155
The_Waco_Kid37374
CryptKicker37228
Mokoa36497
Chung Tran36100
Still Looking35944
Mojojo33117

Reply
 
Thread Tools
Old 09-23-2011, 11:54 AM   #1
wheels69
Valued Poster
 
wheels69's Avatar
 
Join Date: Jan 25, 2010
Location: Tx
Posts: 586
Encounters: 17
Default computer lockdown

what should someone do to lkep thier computer from hacker or unwanted eyes

is there a way to change or disable IP address
a way to clean the hard drive ...to wipe out past emails or sites that have been visted
wheels69 is offline   Quote
Old 09-23-2011, 03:24 PM   #2
badbottom
Lifetime Premium Access
 
Join Date: Jun 2, 2011
Location: Midcities
Posts: 183
Encounters: 2
Default

Changing ip address: use a proxy
Even more secure but extremely slow: Use Tor

Clean hard drive/history/cookies: CCleaner is a good start, and there are NSA certified disk wiping programs out there, but even a bulk magnetic eraser can't entirely wipe everything out from today's forensic computing specialists. Vaseline + hammer + dispersing the bits across a wide geographic area is the only guarantee. As for what emails/sites, ISP's keep records for a minimum of 30 days, sometimes up to a year, even longer for an active investigation, so unless you setup Tor and have done everything related from day 1 through a tor connection, if they want you they will get you.

http://xkcd.com/538/
badbottom is offline   Quote
Old 09-23-2011, 05:39 PM   #3
tia travels
Let's Have A Great Year!
 
tia travels's Avatar
 
User ID: 1650
Join Date: Jul 28, 2009
Location: Indianapolis & Touring
My Bio Page
Posts: 10,589
My ECCIE Reviews
Default

Very useful info.....I'm taking note. Thanks for sharing.
tia travels is online now   Quote
Old 09-23-2011, 11:58 PM   #4
wheels69
Valued Poster
 
wheels69's Avatar
 
Join Date: Jan 25, 2010
Location: Tx
Posts: 586
Encounters: 17
Default

Thanks for the info. ...I guess the only full proof way is a hammer or T-N-T
wheels69 is offline   Quote
Old 09-24-2011, 01:30 AM   #5
daratu1
Valued Poster
 
Join Date: Jul 10, 2011
Location: Inside
Posts: 350
Encounters: 19
Default

Quote:
Originally Posted by badbottom View Post
Changing ip address: use a proxy
Even more secure but extremely slow: Use Tor

Clean hard drive/history/cookies: CCleaner is a good start, and there are NSA certified disk wiping programs out there, but even a bulk magnetic eraser can't entirely wipe everything out from today's forensic computing specialists. Vaseline + hammer + dispersing the bits across a wide geographic area is the only guarantee. As for what emails/sites, ISP's keep records for a minimum of 30 days, sometimes up to a year, even longer for an active investigation, so unless you setup Tor and have done everything related from day 1 through a tor connection, if they want you they will get you.

http://xkcd.com/538/
Thus the reason for as much plausible denialibility as possible. For hard drive cleaning, you can do a basic format, then drop off at a computer security center that does drive shredding. Most of these locations will do this without taking your name. Then, you can avoid doing anything hobby related from your new hard drive. If you must use a PC, then run it in a virtual session, preferibly one that is based out of your RAM, and not the hard drive. As that is likely way too advanced, difficult, and awkward, setup tor, and some version of a portable browser on a flash drive. One of those ironkey ones would be good.

Tor has a setup for portable versions. Firefox also has a portable version. With this setup, you can use any PC and still have your browser/TOR client configured. All temp files and other things accessed should be stored to the flash drive not the PC you're using.

As for the IP address thing. According to a new Bill, HC1989 (I think) ISPs will be required to keep all internet information including ip address, internet history (DNS history) credit card info, and email/chat for a few years. Granted this is a bill, not a law yet.

I personally access all hobby stuff from a PDA over a VPN connection (L2TP/IPSec encryption) from a VPN provider who does not keep usage logs. I also use a browser that does not keep a cache, cookies, or info beyond an active session. I use a PDA as I can be sure they is no keylogger or other software installed (such as a screencapture program). Granted, my methods may seem extreme but I've worked for telecoms, and I know just what can be found in a data stream as well as sms (text messaging). As my methods are extreme I suggest looking into what I said earlier. Format the drive and drop it off for shredding at a computer security place. Use a flash drive with portable tor and firefox for hobby.
daratu1 is offline   Quote
Old 09-24-2011, 09:34 AM   #6
badbottom
Lifetime Premium Access
 
Join Date: Jun 2, 2011
Location: Midcities
Posts: 183
Encounters: 2
Default

One other option, they have live CD's of Linux that will boot and have a TOR version of Firefox installed. Take an old computer, remove the harddrive, and boot from the CD. Everything's in RAM, gone when you turn the PC off. Well, gone in about an hour, possibly longer if the NSA is involved.

Of course, then you need to put your whole system in a faraday cage so they don't remotely view your monitor through EM scanning, but at that point it is tinfoil hat time, or if they are using that level of monitoring then you are already screwed as they don't waste that on the simple stuff.
badbottom is offline   Quote
Old 09-24-2011, 11:23 AM   #7
Gotyour6
Valued Poster
 
Gotyour6's Avatar
 
Join Date: Dec 24, 2010
Location: .
Posts: 9,773
Encounters: 24
Default

Encrypt the hard drive.
No way in hell anyone is getting to it with out the password.

The goverment could try but depending on the password used it could take hundreds of years to decrypt just the password.

My notebook in encrypted with a SSD drive on it.
I lose it, I get a new notebook.
Data wont concern me. No way to lok at it.

Surf the net using a proxy.
Gotyour6 is offline   Quote
Old 09-24-2011, 12:07 PM   #8
Capt. Lincoln F. Stern
Account Disabled
 
Join Date: Sep 9, 2010
Posts: 2,330
Encounters: 20
Default

Quote:
Originally Posted by badbottom View Post
Changing ip address: use a proxy
Even more secure but extremely slow: Use Tor

Clean hard drive/history/cookies: CCleaner is a good start, and there are NSA certified disk wiping programs out there, but even a bulk magnetic eraser can't entirely wipe everything out from today's forensic computing specialists. Vaseline + hammer + dispersing the bits across a wide geographic area is the only guarantee. As for what emails/sites, ISP's keep records for a minimum of 30 days, sometimes up to a year, even longer for an active investigation, so unless you setup Tor and have done everything related from day 1 through a tor connection, if they want you they will get you.

http://xkcd.com/538/
This actually has merit.. All modern drives have a breathe hole.. usually covered up by a white filter cover..get a syringe used for injecting thermal paste (or just use thermal paste) but basically introduce a foreign paste/oil or solvent etc inside the drive.. the more the better.. and then use a USB drive cable rig for connecting a raw drive to a usb port to spin it up so you are cleared
Capt. Lincoln F. Stern is offline   Quote
Old 09-24-2011, 12:25 PM   #9
badbottom
Lifetime Premium Access
 
Join Date: Jun 2, 2011
Location: Midcities
Posts: 183
Encounters: 2
Default

Quote:
Originally Posted by Gotyour6 View Post
Encrypt the hard drive.
No way in hell anyone is getting to it with out the password.
http://xkcd.com/538/
badbottom is offline   Quote
Old 09-26-2011, 09:45 AM   #10
TexanAtPlay
Account Disabled
 
Join Date: Mar 21, 2011
Location: GoneDark
Posts: 156
Encounters: 2
Default

Quote:
Originally Posted by wheels69 View Post
what should someone do to lkep thier computer from hacker or unwanted eyes

is there a way to change or disable IP address
a way to clean the hard drive ...to wipe out past emails or sites that have been visted
Lots of technical answers...to a simple question. If a determined knowledgeable hacker wants into your system....they're getting in. We're talking about people who hack banks and DoD systems for fun...and they don't do it that often because they CAN be traced. There are all kinds of anti-hacker programs...a decently configured profile with fire walling will take care of 99% of hacker mischief -- but...why would these guys want in YOUR system? You are generally safe in a sea of millions of users, but your threats are more local...neighbors and family.

Hiding your local wireless means that your connection won't present a tempting target for the amateur wanna be hacker (15 year old kid who reads hacker websites). Most people don't even use firewalls or user profiles on their computers...guess where they're going to hack?

What's the most common WiFi password? The default for that router brand (or "password".)

Many of us have prying eyes which constitute children in the home who use the computer, or Significant Others.....I'd say that's the 99% threat.

Big basic hint..... ***Use the profile capabilities of your OS, whether Windows or Mac OS X, or Linux. Be the "administrator". Keep your password secret. You can also do stuff like stash files in folders with special permissions within your profile data (series of folders with your login which contain your files and settings and things like wallpaper on your hard drive). It does help with internal security against hackers....so if the SO wonders why the password? Got to protect against prying eyes....just not telling her it's HER prying eyes....

More to do...use Private Browsing...the option which doesn't leave the breadcrumbs in the browser history, install cookies, or save passwords. You'll want to go behind you and make sure it's working. Want to save some special files...like pics of your special session with your favorite "friend"...use off system storage. Dropbox and others don't care that your files are in the "X" range....you can even access your stuff from your smartphone too.

Biggest of all...NEVER save a password...memorize everything.
TexanAtPlay is offline   Quote
Old 09-26-2011, 10:04 AM   #11
ZedX79
Valued Poster
 
ZedX79's Avatar
 
Join Date: May 25, 2011
Location: Here
Posts: 1,451
Encounters: 18
Default

I am more curious what you're trying to get away from or hide from someone.
ZedX79 is offline   Quote
Old 09-26-2011, 07:32 PM   #12
Capt. Lincoln F. Stern
Account Disabled
 
Join Date: Sep 9, 2010
Posts: 2,330
Encounters: 20
Default

Quote:
Originally Posted by TexanAtPlay View Post
Lots of technical answers...to a simple question. If a determined knowledgeable hacker wants into your system....they're getting in. We're talking about people who hack banks and DoD systems for fun...and they don't do it that often because they CAN be traced. There are all kinds of anti-hacker programs...a decently configured profile with fire walling will take care of 99% of hacker mischief -- but...why would these guys want in YOUR system? You are generally safe in a sea of millions of users, but your threats are more local...neighbors and family.

Hiding your local wireless means that your connection won't present a tempting target for the amateur wanna be hacker (15 year old kid who reads hacker websites). Most people don't even use firewalls or user profiles on their computers...guess where they're going to hack?

What's the most common WiFi password? The default for that router brand (or "password".)

Many of us have prying eyes which constitute children in the home who use the computer, or Significant Others.....I'd say that's the 99% threat.

Big basic hint..... ***Use the profile capabilities of your OS, whether Windows or Mac OS X, or Linux. Be the "administrator". Keep your password secret. You can also do stuff like stash files in folders with special permissions within your profile data (series of folders with your login which contain your files and settings and things like wallpaper on your hard drive). It does help with internal security against hackers....so if the SO wonders why the password? Got to protect against prying eyes....just not telling her it's HER prying eyes....

More to do...use Private Browsing...the option which doesn't leave the breadcrumbs in the browser history, install cookies, or save passwords. You'll want to go behind you and make sure it's working. Want to save some special files...like pics of your special session with your favorite "friend"...use off system storage. Dropbox and others don't care that your files are in the "X" range....you can even access your stuff from your smartphone too.

Biggest of all...NEVER save a password...memorize everything.
To answer the RED sections.. people who war drive (look it up) are all over.. used to be a hobby of mine.. before gas prices went up... but a true war driver is not interested in hopping on your network... just mapping its GPS location.

lock down your wifi.. even the most basic wifi routers out there have very good security.

router passwords.. guess what.. there is an APP for your droid phone that can load up over 3000 common routers and their access.


How do you hide yourself in your neighborhood? lock down the router, do NOT use the Administrative account for your normal stuff...use common sense, do not allow your kids to use your pc.. if it is the only one in the house.. buy them their own. store your porn on usb drives and only connect them when you want to add to or view it.
Capt. Lincoln F. Stern is offline   Quote
Old 10-04-2011, 05:45 AM   #13
ck1942
Meet & Greet Organizer
 
ck1942's Avatar
 
Join Date: Dec 17, 2009
Location: "Hobbyverse"
Posts: 7,112
Encounters: 181
Default

2 things:

1 - even if you are usually a lone person in a household, your computer should have at least 3 user accounts - Administrator, yourself, guest.

Only the admin has total access to the unit. yourself is obvious, and can do whatever browsing, composing, storing, etc, needed for yourself. guest gets to use limited areas of the computer and has access only to that software allowed by the admin. guest does not easily have access to all software used by yourself, nor to any of yourself's data bases. Needless to say, do not leave passwords lying around on post-it notes. Change passwords every once in a while, 60-90 days say, and never use a password for more than one account lest you lose control of multiple accounts.

2 - if there is more than one person in the household, that person (best solution) gets his/her own computer. Or has access to his/her own account (just like guest) on your unit.

Computers are cheap; security is "expensive" especially if you give it away.

NEVER allow anyone access to your home computer or to your phone/handset for that matter unless you are scrupulous in watching them use it or have essential security enabled.

Be discreet in hobbying or in other activities that might compromise your life.
ck1942 is offline   Quote
Old 10-04-2011, 02:46 PM   #14
wheels69
Valued Poster
 
wheels69's Avatar
 
Join Date: Jan 25, 2010
Location: Tx
Posts: 586
Encounters: 17
Default

I have my pc connected to a rounter and a tablet which connects thur wi-fi
I change my password evert now and then

The reason I was asking was because. ..big brother ( LE ) have thier own computer guys and they can hack your computer to obtain your personal information
wheels69 is offline   Quote
Reply



AMPReviews.net
Find Ladies
Hot Women

Powered by vBulletin®
Copyright © 2009 - 2016, ECCIE Worldwide, All Rights Reserved