Well what do we have here ? FBI director Robert Mueller wants that service providers record their customers online activities with the same lame excuses that men like him come always up with: Protecting minors and terrorism. Let me get something straight here. Terrorists are not uneducated, they know how to build explosives, they know how to work with computers. They especially now about encryption.
Thunder7 recently told me that he bought a used Xbox and discovered that the hard drive was full of music files from the previous owner. The original Xbox uses an internal 20 gigabytes hard drive to store save games, patches, music and images. The new Xbox 360 and Sony's PS3 will also utilize a hard drive and the following tip is also valid for them.
I'm going to show you how to create a secure usb data safe that can be used to store sensitive data. Secure means it is encrypted and will only be encrypted if you need the data that is saved on the stick. This method is also working with other removable media such as zip drives and hard disks.
System Safety Monitor 2 is available in a free version from the developers website. The tool basically works as a firewall preventing malicious software to be started automatically. The free version runs in paranoid mode which means you have to allow or disallow every process and get nagged quite a bit at the beginning. Once the majority of rules are established the software runs a lot smoother and seems to come forth only when you tend to install a new program or change existing ones.
You see lots of processes when you start your taskmanager, svhost.exe, csrss.exe, winlogon.exe and many more. A user who never dealt with those executables before has a hard time figuring out which are safe and which could be malicious because normally you can't say which program is using those files. A question like "Is svhost.exe a virus, is it safe ?" is normal and can be answered using the methods described below.
Many sites offer to scan your computer for viruses online which should be seen as a last resort because this method has advantages but also disadvantages. If you scan your system online you can be sure that the latest virus definitions are used while scanning your system and that the script that is running was not compromised by a virus or trojan running on your system.
More than ten dedicated servers have been seized by the German police last Thursday. Some servers were running a version of the popular anonymising software Tor (The Onion Routing) which leads to the conclusion that those Tor Servers were most likely configured to run as Exit Nodes as well as normal nodes. As you may know a request runs through different Tor Servers with each only knowing the adjacent servers but not the starting node (you) and the destination. Only the last node in the chain knows the destination.
Freenigma offers a free firefox extension that adds cryptography functionality to Yahoo, Gmail and MSN. The team says it is working on adding other emails services, as of now, only the three services mentioned are supported. You have to signup at their website to recieve an invitation before you will be able to download the extension. They state that it could take a few hours the most before you recieve the invitation. Mine arrived about ten minutes after I completed it.
Device Lock allows you to close open USB and firewire ports as well as other device ports that make it possible to run external devices on your computer. With all the live cds and programs that run from USB such connections to the pc have become a greater security risk than ever before. System administrators as well as security concerned end users should disable every means of accessing the pc or running software from devices that could access it.
Relakks had a few problems shortly after their start due to the amount of users that registered the service right after it was introduced. Connections have been really slow and I had no chance to further test the service and write about my experience with it. I'am currently writing this article while being connected to Relakks and everything is working fine so far. I'am able to open websites and surf the internet without problems. I'am able to check my email and download files using Relakks.
I signed up with Relakks yesterday and was satisfied with this clean and easy process. I had to provide only some information like name, email, password and username and was able to log on to their system. My status was inactive at that time because I did not make a purchase yet. I decided to try the service for one month and had to provide my credit card details in order to do so. One month would cost 6$ which is a good price if they live up to their promises which are a) anonymous internet experience and b) maximum speed.
The Pirate Party is a swedish party that has three main goals: Protected Privacy, Free Knowledge and Shared Culture. They are making a bid for the Swedish parliament in the upcoming election and just introduced the worlds first commercial darknet called Relakks. Let us take a look at the definition of Relaks from the website:
Password chart is an online service that helps you improve the quality of your passwords. The principle is pretty easy: You enter a phrase at the beginning which will be used to create the password chart. An example would be "Make your passwords stronger with passwordchart.com" or "https://www.ghacks.net/ is gr3at". The password chart will be displayed on the right side of the screen changing while you are adding new chars to the phrase. You can opt to add numbers and punctuation for increased security, they will be added to the chart on the right.
A web proxy is becoming more and more important in todays internet. Schools and Companys tend to block sites pretty quickly nowadays, especially when the blocking is directed at just a few websites and not every website in that category. Web Proxys might be able to sneak past this policies and display the site in your browser even though it is banned in the network.
I have written a small php script that lookups your IP, your browser, the refering site and the remote port. The website has no ads at all and loads pretty fast. This might be useful for those who are using proxys and want to check if those proxys are spilling their IP address or not. The RIAA for example is identifying downloaders by their IP address.
IceSword is a new contender for the title of the best rootkit revealing and removing program out there at the moment. It is rather hard to find a working download of IceSword but as always I provide a fast way to download the latest version of Icesword named IceSword1.18.rar. Click the link to download the rootkit scanner from rapidshare. In contrast to other rootkit scanners like Blacklight Icesword can not be run automatically. Icesword only provides perhaps the most powerful utilities to scan your system for rootkits and other information.
AntiVir is probably the best free antivirus software. It´s free for non commercial use and updates its virus definitions regulary just like in the professional version. The free version however has the habit to display a advertisment popup after each update, which normally means that you see this ad every single day. It is always the same ad and I don´t see a reason for this at all, once is fine but everyday ?
Phishing is a popular method to capture personal data such as passwords, transaction numbers and credit card details. The company I´am working with locks several user accounts each day to prevent harm done to them due to phishing. It normaly starts with an email asking you to update your profile, to download a security update or a email that reveals that you are the highest bidder of an ebay auction (that you do not know about).
Ghacks is a technology news blog that was founded in 2005 by Martin Brinkmann. It has since then become one of the most popular tech news sites on the Internet with five authors and regular contributions from freelance writers.