Jump to content
The CHANI Project Conspiracy Forum
wildcard

Cyber-security 101 Information thread

Recommended Posts

Thank you Wildcard.

It's kind of you to give me those pointers.

It's a jungle out there.

Your welcome!

"When the zombies come...I will be waiting!"

Share this post


Link to post
Share on other sites

Kaspersky security has been good to me.. 8)

yep, there also NOT a U.S. company....think about that for a min or several actually

Share this post


Link to post
Share on other sites

Kaspersky security has been good to me.. 8)

yep, there also NOT a U.S. company....think about that for a min or several actually

Yes I know.. They are a Russian Co...

Share this post


Link to post
Share on other sites

Kaspersky security has been good to me.. 8)

yep, there also NOT a U.S. company....think about that for a min or several actually

Yes I know.. They are a Russian Co...

yep, but, more importantly and the particualr thread im tugging on for ya is that they aren't influenced by U.S. Govt agencies/policies like say McAfee or Symantic...rember WHO keeps finding announcing these new state sponsored virus's.

Odd isn't it that the two "premiere" anti-virus companies said basically nadda about Flame and DuQu (and several others that didn't make as big a splash) until Kapersky announced it (this is a rhetorical question btw lol)

Sometimes its not what they say but what they DON't say that is most telling.

since its almost Christmas and potentially teh end of da world here's a little insider gift for ya (my Dir and 2 other analysts used to work for Mcafee), The U.S. based anti-virus and various cyber-security firms keeps certain info on certain virus's and or malicious software under wraps and quite at teh behest of of certain gubiment agencies of the alphabet soup variety. Otherwise they may loose certain contracts, tax breaks, or more importantly access to the NSA's latest virus discoveries from around da world (this stuff is HAND delivered by an agent btw). Companies OUTSIDE the U.S. have no such deals in place...especially one based in mother Russia. That being said I'm willing to bet good money on the fact that they do have the same types of deals with THEIR Gubymint in place, just good business .....right?

Merry Xmas and remember: Being paranoid doesn't mean ppl aren't following you (especially in cyber-space) because ....they are more than you know and in ways you have no idea about (unless your a cyber-security specialist). Don't be afraid cause fear is the little mind killer but, be mindful and aware. Knowledge is power, it can also be dangerous but hell, aint none of us getting out of this life alive so might as well find out as much as ya can and bask in the knowledge that you found their secrets or at least some of them!!

Share this post


Link to post
Share on other sites

U.S. Military Launches Spy Operation Using Fake Online Identities

This article is from March of 2011.  Soooo....that means they have been at this for about 1 1/2 years now..think about it....chat rooms, social media sites....uh huh and where else??? LOL

"The U.S. Military has purchased software designed to create and control false online personas in an attempt to use social media and other websites to counter anti-U.S. messaging.

"According to the contract between US Central Command (Centcom) and California company Ntrepid, the software would let each user control 10 personas, each "replete with background, history, supporting details, and cyber presences that are technically, culturally and geographically consistent." The software would also be able to let personas "appear to originate in nearly any part of the world" and interact through "conventional online services and social media platforms," while using a static IP address for each persona to maintain a consistent online identity.

These false online personas, also known as "sock puppets," would be equipped to seem like real people while entering online discussion through blogs, message boards, chats, and more. With a false persona, a user could discredit opponents, or create the semblance of consensus.

Centcom spokesman Commander Bill Speaks told The Guardian that the software "supports classified blogging activities on foreign-language websites to enable Centcom to counter violent extremist and enemy propaganda outside the US."

snip

"Centcom spokesman Commander Bill Speaks told The Guardian that the software "supports classified blogging activities on foreign-language websites to enable Centcom to counter violent extremist and enemy propaganda outside the US."

The technology would not be used in America, or by American owned companies--which include major social media sites like Facebook and Twitter. "We do not target U.S. audiences, and we do not conduct these activities on sites owned by U.S. companies," Speaks told the Washington Times.

http://www.huffingtonpost.com/2011/03/17/online-persona-management_n_837153.html

http://wiki.echelon2.org/wiki/Operation_Earnest_Voice  apparently they had this up and running in June of 2010....about a year before they announced it....interesting...

posted this in response to this by wildcard...."Being paranoid doesn't mean ppl aren't following you (especially in cyber-space) because ....they are more than you know and in ways you have no idea about (unless your a cyber-security specialist)."

Share this post


Link to post
Share on other sites

U.S. Military Launches Spy Operation Using Fake Online Identities

This article is from March of 2011.  Soooo....that means they have been at this for about 1 1/2 years now..think about it....chat rooms, social media sites....uh huh and where else??? LOL

"The U.S. Military has purchased software designed to create and control false online personas in an attempt to use social media and other websites to counter anti-U.S. messaging.

"According to the contract between US Central Command (Centcom) and California company Ntrepid, the software would let each user control 10 personas, each "replete with background, history, supporting details, and cyber presences that are technically, culturally and geographically consistent." The software would also be able to let personas "appear to originate in nearly any part of the world" and interact through "conventional online services and social media platforms," while using a static IP address for each persona to maintain a consistent online identity.

These false online personas, also known as "sock puppets," would be equipped to seem like real people while entering online discussion through blogs, message boards, chats, and more. With a false persona, a user could discredit opponents, or create the semblance of consensus.

Centcom spokesman Commander Bill Speaks told The Guardian that the software "supports classified blogging activities on foreign-language websites to enable Centcom to counter violent extremist and enemy propaganda outside the US."

snip

"Centcom spokesman Commander Bill Speaks told The Guardian that the software "supports classified blogging activities on foreign-language websites to enable Centcom to counter violent extremist and enemy propaganda outside the US."

The technology would not be used in America, or by American owned companies--which include major social media sites like Facebook and Twitter. "We do not target U.S. audiences, and we do not conduct these activities on sites owned by U.S. companies," Speaks told the Washington Times.

http://www.huffingtonpost.com/2011/03/17/online-persona-management_n_837153.html

http://wiki.echelon2.org/wiki/Operation_Earnest_Voice  apparently they had this up and running in June of 2010....about a year before they announced it....interesting...

posted this in response to this by wildcard...."Being paranoid doesn't mean ppl aren't following you (especially in cyber-space) because ....they are more than you know and in ways you have no idea about (unless your a cyber-security specialist)."

It seems if they want to know about u they will know, one way or the other. I had a feeling about this though during the US election, they are definitely ( I think) using it anywhere they please. And how to prove it would be very hard indeed. I am aware that one can be watched when on the internet if u have a webcam, but only by sensing it. Why is the real question, except that's obvious, anyone who comes to this sort of forum is quite likely being monitored. So I guess, one has to choose what to say and what not to say. Doesn't it suck that we are no longer free?  ???What now they have cognitives sourcing out potential threats to the state( as it were)?! I guess the up side of that is that now we will all have to develop a new psychic skill to keep them out of your brain...

Share this post


Link to post
Share on other sites

Android malware emerges on Google Play which installs a trojan on your PC, uses your microphone to record you

"We’ve seen malware for PCs that infects mobile devices, but it turns out there’s also malware for mobile devices designed to infect PCs. Kaspersky researchers have discovered a new piece of Android malware that masquerades as a “cleaner” app meant to free memory for Google’s operating system but wreaks havoc on your smartphone in the background and on Microsoft’s operating system when it’s connected to a PC.

The security firm says the malware has the most “extensive feature set” it has ever seen in one mobile app. Here’s the list:

•Sending SMS messages.

•Enabling Wi-Fi.

•Gathering information about the device.

•Opening arbitrary links in a browser.

•Uploading the SD card’s entire contents.

•Uploading an arbitrary file (or folder) to the master’s server.

•Uploading all SMS messages.

•Deleting all SMS messages.

•Uploading all the contacts/photos/coordinates from the device to the master.

Once installed and executed on Android, the malicious app lists the running processes on your device and restarts them in the foreground to make it look like it’s doing what it’s designed to do. In the background, however, the app downloads three files (autorun.inf, folder.ico, and svchosts.exe) to the root of your SD card. When the smartphone is connected to a Windows computer in USB drive emulation mode, the svchosts.exe file (Backdoor.MSIL.Ssucl.a) is automatically executed on your PC.

The Windows part of the malware is not particularly sophisticated, but it is capable of taking control of the microphone to record you. It then encrypts all its recordings and sends them back to the attacker. Kaspersky explains how the malware authors are expecting this threat to spread:

Read the rest of this story here

http://thenextweb.com/insider/2013/02/03/android-malware-emerges-on-google-play-which-installs-a-trojan-on-your-pc-uses-your-microphone-to-record-you/

Share this post


Link to post
Share on other sites

From Acolytes thread:

http://www.nytimes.com/2013/02/04/us/broad-powers-seen-for-obama-in-cyberstrikes.html?pagewanted=all&_r=2&

I heard a news snippet on the radio whilst driving to work that this program is to be expanded to 5000 employees by the end of the year...(its currently at about 200 by "official" statements)

Share this post


Link to post
Share on other sites

I dont see anything wrong with it....on the surface however I have never used it so I'm no product expert on this software.

All VPN's use the same basic Idea, create a encrypted secure tunnel from your machine to the destination. How they do this might vary some but the principle is the same. Some of the important differences would be the level of encryption, what they use to encapsulate the frames, do they go to a secure server/proxy then to the destination etc.

One thing that you should know is that the free version has ads.....you really really don't want to use a security product that gives access to 3rd parties to place ads, since it basically opens up a channel (to your machine) to be able to PLACE those ads hence, your data is potentially subject to interception/compromise. IT/cyber security + freeware = bad  (imnsho)

EDIT: After reading up on their website I personally would definatly NOT use this product (read below) BTW emphasis mine...I pointed out da bad bad bad thingy again IMNSHO

Hotspot Shield creates a virtual private network (VPN) between your laptop or iPhone and our Internet gateway<~~~ bad bad bad!!!!. This impenetrable tunnel prevents snoopers, hackers, ISP's, from viewing your web browsing activities, instant messages, downloads, credit card information or anything else you send over the network. Hotspot Shield security application is free to download, employs the latest VPN technology, and is easy to install and use. So go ahead - Get behind the Shield - Try Hotspot Shield today!

Share this post


Link to post
Share on other sites

I dont see anything wrong with it....on the surface however I have never used it so I'm no product expert on this software.

All VPN's use the same basic Idea, create a encrypted secure tunnel from your machine to the destination. How they do this might vary some but the principle is the same. Some of the important differences would be the level of encryption, what they use to encapsulate the frames, do they go to a secure server/proxy then to the destination etc.

One thing that you should know is that the free version has ads.....you really really don't want to use a security product that gives access to 3rd parties to place ads, since it basically opens up a channel (to your machine) to be able to PLACE those ads hence, your data is potentially subject to interception/compromise. IT/cyber security + freeware = bad  (imnsho)

EDIT: After reading up on their website I personally would definatly NOT use this product (read below) BTW emphasis mine...I pointed out da bad bad bad thingy again IMNSHO

Hotspot Shield creates a virtual private network (VPN) between your laptop or iPhone and our Internet gateway<~~~ bad bad bad!!!!. This impenetrable tunnel prevents snoopers, hackers, ISP's, from viewing your web browsing activities, instant messages, downloads, credit card information or anything else you send over the network. Hotspot Shield security application is free to download, employs the latest VPN technology, and is easy to install and use. So go ahead - Get behind the Shield - Try Hotspot Shield today!

So here is your critical thinking test for the day...can anyone tell me whats so BAd about this particular setup? and why?

Share this post


Link to post
Share on other sites

Before downloading anything off the net...

Refer to the cat above the shout box. :P

Share this post


Link to post
Share on other sites

Here is a online Gauss detection tool: I recommend this to everyone

http://gauss.crysys.hu

hi Wildcard I'm rereading this thread after some peculiar things started happening on my computer a while ago.

I took the test for Gauss at the above url but got this, after it said Test Finished and I clicked on See Result

"Test results

Sorry, something bad happened or you reloaded the page."

What does that mean??

Thanks, if you're there.

KMRIA

Please Start the test again 

Share this post


Link to post
Share on other sites

Here is a online Gauss detection tool: I recommend this to everyone

http://gauss.crysys.hu

hi Wildcard I'm rereading this thread after some peculiar things started happening on my computer a while ago.

I took the test for Gauss at the above url but got this, after it said Test Finished and I clicked on See Result

"Test results

Sorry, something bad happened or you reloaded the page."

What does that mean??

Thanks, if you're there.

KMRIA

Please Start the test again

hmm worked ok for me, It could be you dont have the palida font installed. I got a msg about not having the font which is silly since it shouldn't have ANY bearing on the test.

Share this post


Link to post
Share on other sites

Here is a very good write up with links to help people secure their browsers better and enhance your browsing experience by adding several blocks and security measures. I use all the ones listed here and HIGHLY recommend you do as well  8)

grr cant find the original article now but in the mean time here is another one

http://www.businessinsider.com/heres-how-to-stop-facebook-from-tracking-you-2012-9?op=1

Share this post


Link to post
Share on other sites

Here is a very good write up with links to help people secure their browsers better and enhance your browsing experience by adding several blocks and security measures. I use all the ones listed here and HIGHLY recommend you do as well  8)

Where is the write up dude??

did the cat eat it?  8);D:) :P 8);D:) :P

Share this post


Link to post
Share on other sites

Here is a very good write up with links to help people secure their browsers better and enhance your browsing experience by adding several blocks and security measures. I use all the ones listed here and HIGHLY recommend you do as well  8)

Where is the write up dude??

did the cat eat it?  8);D:) :P 8);D:) :P

LOL oops didnt paste it in let me go finded it again  :P

Share this post


Link to post
Share on other sites

http://www.jimstonefreelance.com/

The following is the best security info you are likely to read anywhere.

In the real world, there is no such thing as "secure" and "Microsoft"

No matter what you think you know about security, pay attention to what follows, because it is absolute fact, delivered to me by a Microsoft programmer / whistleblower.

A secure Microsoft system is one of two things. (1) 200 or more feet underground in solid bedrock, with no connection to the outside whatsoever, or (2) 15 or more years old, with no Wifi, bluetooth, or any other sort of wireless technology installed, as well as locked in a closet.

I was in contact with a Microsoft programmer for a couple of mails before he went silent (mail censorship). In the two mails I received, he was at least able to say that Microsoft operating systems have as a feature, not a vulnerability, the ability to be breached at will, AS A FEATURE, by anyone who knew the correct commands to walk right in through a paralell FRONT door. He said it was top secret, prison term stuff to talk about, and that this door was there for the government and other priviledged people to use at will. In addition to this, this programmer made it perfectly clear that Microsoft worked hand in hand with McCaffee and Norton to make good and sure that not only did those two security products not interfere with this front door, but that in addition to the front door both McCaffee and Norton provided alternatives to it.

Many of you may know about a software application called PC anywhere, which allows full remote administration of any PC it is installed on. The front door this programmer spoke of, which is built into all Microsoft operating systems WORKS THE SAME WAY and can operate in paralell with the main user's front door, and provides a spook with the ability to open a session on your PC which is completely hidden to you and every bit as capable as the main user session. It's the same as hooking up two monitors, keyboards, and mice, and having two users use the same processor. This programmer used PC Anywhere as an example of how the front door built into all Microsoft operating systems since Windows 95 works. Obviously this front door will allow access to all data, but in addition to this it also allows fully remote installation of applications, deletion and modification of files, uploading of files to be used as "evidence", files which would remain hidden to the owner of the PC until a forensic examination revealed them, and any other abilities the real owner of the PC would have, and it all happens live, over the web, with the screen and input device control on the spook PC being provided by YOUR COMPUTER.

This programmer was going to tell me how to log into this second front window (he was nervous about just saying it all at once) and before that happened, all mails went silent.

So if anyone out there wonders why I don't use encryption, and don't do anything to secure my Microsoft PC, the answer is simple - THE FINAL AND MOST ADVANCED SYSTEM SECURITY KNOWLEDGE THAT ANY IT PROFESSIONAL COULD EVER HAVE IS KNOWING THAT WHEN DEALING WITH THE GOVERNMENT OR JEWISH COMMUNITY, NO SECURITY EXISTS AT ALL. Your security efforts are good ONLY against high school hackers and other idiots not on the inside track.

And this, in a nutshell, is how the CIA intends to get their hands on "ALL" data, as described in the linked article above.

It is important to note that in that article the CIA chief says ALL data, not "all data that goes across the web". He simply says ALL DATA, ALL PHOTOS, ALL VIDEOS, EVERYTHING ANYONE EVER RECORDS, TYPES, VIEWS, EVERYTHING and in that context it could only be possible if the CIA intends to walk through ALL FRONT DOORS ON ALL PC'S AND RAID THEM. The front door the programmer told me about would make this CIA witch hunt possible. It's exactly how they are going to do it.

Share this post


Link to post
Share on other sites

Store your files on a removable hard drive that you only connect when you want to save something.

Wipe your hard drive, reformat reload operating system and everything else..

Do this every few months...

It is not just microsoft..

Share this post


Link to post
Share on other sites

http://www.jimstonefreelance.com/

The following is the best security info you are likely to read anywhere.

In the real world, there is no such thing as "secure" and "Microsoft"

No matter what you think you know about security, pay attention to what follows, because it is absolute fact, delivered to me by a Microsoft programmer / whistleblower.

A secure Microsoft system is one of two things. (1) 200 or more feet underground in solid bedrock, with no connection to the outside whatsoever, or (2) 15 or more years old, with no Wifi, bluetooth, or any other sort of wireless technology installed, as well as locked in a closet.

I was in contact with a Microsoft programmer for a couple of mails before he went silent (mail censorship). In the two mails I received, he was at least able to say that Microsoft operating systems have as a feature, not a vulnerability, the ability to be breached at will, AS A FEATURE, by anyone who knew the correct commands to walk right in through a paralell FRONT door. He said it was top secret, prison term stuff to talk about, and that this door was there for the government and other priviledged people to use at will. In addition to this, this programmer made it perfectly clear that Microsoft worked hand in hand with McCaffee and Norton to make good and sure that not only did those two security products not interfere with this front door, but that in addition to the front door both McCaffee and Norton provided alternatives to it.

Many of you may know about a software application called PC anywhere, which allows full remote administration of any PC it is installed on. The front door this programmer spoke of, which is built into all Microsoft operating systems WORKS THE SAME WAY and can operate in paralell with the main user's front door, and provides a spook with the ability to open a session on your PC which is completely hidden to you and every bit as capable as the main user session. It's the same as hooking up two monitors, keyboards, and mice, and having two users use the same processor. This programmer used PC Anywhere as an example of how the front door built into all Microsoft operating systems since Windows 95 works. Obviously this front door will allow access to all data, but in addition to this it also allows fully remote installation of applications, deletion and modification of files, uploading of files to be used as "evidence", files which would remain hidden to the owner of the PC until a forensic examination revealed them, and any other abilities the real owner of the PC would have, and it all happens live, over the web, with the screen and input device control on the spook PC being provided by YOUR COMPUTER.

This programmer was going to tell me how to log into this second front window (he was nervous about just saying it all at once) and before that happened, all mails went silent.

So if anyone out there wonders why I don't use encryption, and don't do anything to secure my Microsoft PC, the answer is simple - THE FINAL AND MOST ADVANCED SYSTEM SECURITY KNOWLEDGE THAT ANY IT PROFESSIONAL COULD EVER HAVE IS KNOWING THAT WHEN DEALING WITH THE GOVERNMENT OR JEWISH COMMUNITY, NO SECURITY EXISTS AT ALL. Your security efforts are good ONLY against high school hackers and other idiots not on the inside track.

And this, in a nutshell, is how the CIA intends to get their hands on "ALL" data, as described in the linked article above.

It is important to note that in that article the CIA chief says ALL data, not "all data that goes across the web". He simply says ALL DATA, ALL PHOTOS, ALL VIDEOS, EVERYTHING ANYONE EVER RECORDS, TYPES, VIEWS, EVERYTHING and in that context it could only be possible if the CIA intends to walk through ALL FRONT DOORS ON ALL PC'S AND RAID THEM. The front door the programmer told me about would make this CIA witch hunt possible. It's exactly how they are going to do it.

Hey anon, this is kinda old news. I can gain access to most PC's with just the microsoft admin acct. Microsoft, McAfee, Norten they have all been in bed with da gubymint for a long long time. remember that big lawsuit against microsoft a few years ago? Kinda went away with no real conclusion didn't it? hmm wonder why...

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×