Tag Archives: security

Once again about cookies, supercookies and Flash cookies… How to better protect Firefox, your Linux OS and.. you!

In a previous post I already suggested to use HTTPS Everywhere and HTTPS Finder to better protect your privacy on the web. Today I would like to focus your attention on the privacy risks caused by cookies.

Some of them can track your internet activity also when you have logged off from the websites that created them. In few words, some cookies can actively support the creation of a quite punctual profile of your interests and share these information with third parties without you know if your data will be anonymised and correctly stored.

Internet tracking is actual and silent and antivirus software are not the best solution to manage them because every day new types of apparently harmless cookies and supercookies are created and spread into our computers. Cookies usually don’t directly affect your internet browsing but they are a real risk if you want to protect your privacy. A good VPN service (e.g. one that does not link your payment to your “new” assigned VPN IP) could be the best solution but flash cookies, evercookies (a particular type of zombie cookies which are able to geometrically clone themselves outside the original folder where they were stored) could reveal your IP and your habits, just after you disconnect your OS from the VPN shield.

To improve your privacy you can start to combine your VPN with some particular Firefox add-on as Self-Destructing Cookies (for the regular cookies) and BetterPrivacy which has been developed to “search and destroy” Flash cookies.

To improve your privacy, never forget that  you can tune your Firefox Privacy settings also using  Secure Sanitizer which wipe the browser cache in a stronger way than Firefox itself.

Last but not least, don’t forget to “waste” some minutes of your time and use BleachBit after every internet session or every time you shutdown your computer. Better to be slow than sorry! 

How to obtain a free digital signing service for your personal documents

Sooner or later you need to digitally sign a document. If you have never done it before it’s only a matter of time, you will need a digital signing service sooner than you can imagine. The problem is represented to be ready without being obliged to spend money for it.

You will find different offers online and many trusty companies will try to convince you that their offer its the best but many of them limit your possibility to freely sign documents when you really need.

During my tests I tried a bunch of them and, for my experience, just few worth any attention.

In particular I was positively impressed by hellosign and Adobe Echo Sign. They are both interesting but hellosign offers something more. I mean you have not to spend a cent for both but Abobe limits the number of documents you can free sign to just 5 documents each month. If you are not used to digitally sign your docs this limitation doesn’t represent a problem but, trust me, when you will begin you soon need more than 5 free signatures a month.

HelloSign also allows you to upload an image file with your handwritten (and, of course, scanned) signature or create a new one choosing between some different fonts. You have no limits for signing documents but you can send only three signature requests a month (enough for my present necessities). Moreover, you can browse into the hellosign Documents folder and find all the  documents you have signed before.

On the other hand, Adobe Echo Sign request more personal information when you sign-up for the service and, as we already underlined, it limits your experience to just 5 activities a month.

Try them and let us know if you have already found a better, free, online service to digitally sign your documents. Good luck!  AddThis

Spring Time! Now you are ready to protect your Ubuntu – Debian system from Rootkits and Viruses

It’s Spring Time and after a long Winter surfing the web and testing new programs, it’s time to give a short rest to your computer, delete old files and scan the OS looking for possible rootkits or viruses. I usually use Ubuntu and the possibility of viruses is not high but… why I shouldn’t double-check to avoid viruses or rootkits?

– First step: Rootkits

Open your favourite Software Manager (I am na old school boy so Synaptics it’s my choice) and install rkhunter and chkrootkit. I know, they are two different programs that have the same goals so you can decide to install and use just one of them…

After the installation you can start using them just typing into a Terminal:

sudo rkhunter --update
sudo rkhunter --check

and/or:

sudo chkrootkit

Examine all the results and don’t be disoriented by possible “”false positives”. Try to understand if some “risks” you find in the results logs could be regular software you are using (e.g. encrypted disks, etc..)

– Second Step: Viruses

Install ClamAV to scan your disks and be sure you have not infected by common viruses.

Open a Terminal and type:

sudo aptitude install clamav clamav-daemon clamav-freshclam clamtk

Then to update the ClamAV engine and the virus lists just type:

sudo apt-get upgrade clamav clamav-daemon clamav-freshclam clamtk

At this point you find ClamTk into the Accessories Menu and you are able to scan your PC just clicking on some intuitive buttons in the graphical interface.

Good Luck!  AddThis

Link

How to Login into Ubuntu 12.10 Using USB Flash Drive  http://bit.ly/WtgNHI

How to configure Firestarter to use VPN services on Linux

VPN LinuxIn my experience Firestarter is a effective firewall and, on Linux, it starts automatically every time we boot up Ubuntu. But, when I decided to use a VPN tunnel through openvpn, I had some connection problems. In fact I was able to initialize my VPN services but, after a while, all the internet connections were mysteriously shut down.

The “problem” was Firestarter which cut off the connection as forbidden considering my inbound/outbound Policy.

To solve this matter you have to open a tunnel on Firestarter to allow VPN working:

1- open the configuration file my VPN provider gives to its users (generally its a text file containing all the configuration info used, in my case, by openvpn) and I searched for the IP address of the default starting connection used to authenticate the VPN services (e.g. 177.458.563.25). Save somewhere or memorize this VPN IP address.

2- open a Terminal and type:

sudo nautilus

3- using nautilus go to File System (it’s before home folder) and open etc–>firestarter and open the file user-pre using Gedit (or your preferred text editor)

4- the user-pre file is usually empty so don’t panic and write these lines into it:

iptables -A INPUT -j ACCEPT -s xxx.xxx.xxx.xxx -p esp
iptables -A INPUT -j ACCEPT -s xxx.xxx.xxx.xxx -p udp -m multiport -sports isakmp,10000
iptables -A INPUT -j ACCEPT -i tun+
iptables -A OUTPUT -j ACCEPT -d xxx.xxx.xxx.xxx -p esp
iptables -A OUTPUT -j ACCEPT -d xxx.xxx.xxx.xxx -p udp -m multiport -dports isakmp,10000
iptables -A OUTPUT -j ACCEPT -o tun+

Now you have to substitute the xxx.xxx.xxx.xxx with the VPN IP address you have found at step 1 (in my example was 177.458.563.25).

5- Save the user-pre file and close Gedit and Nautilus

6- open a new Terminal and restart Firestarter typing:

sudo /etc/init.d/firestarter restart

That’all! Now your VPN works on your Linux computer and Firestarter has accepted a new Routed IP Tunnel into its allowed policies configuration.  AddThis

Security by obscurity does not work with inquisitive minds. There are many things that should be changed and some that have. Though our bodies may not be free, our minds are – free to learn, explore, to resist. Hack the world!“, Anonymous Writer, 2600 Magazine, Autumn 2012

Join the first Spy Week by Lifehacker!

The first Spy Week starts today @Lifehacker with a bunch of interesting stories about topics related to the spy world. During the next days we will have the opportunity to improve our knowledge on different fields as e.g. sharing sensitive information over the internet or taking photographs without being noticed by other people. Moreover Lifehacker will publish some interviews with experts who share some tips and answer to every related question from the readers. For example, now, Steven Santarpia from ICORP Investigation is online and interacting with lifehackers. This week, be sure not to miss any topics about spying (+ hacking + social engineering) and visit the dedicated section into the Lifehacker website! AddThis

Watch your privacy! Upgrade your Firefox security with HTTPS Everywhere and HTTPS Finder!

As we already discussed many times in this blog, we know that web security is something very difficult to reach but we can always try to improve our security when surfing into the web.

First of all, use Firefox! Do it! In my opinion it’s slower than Chrome but very “transparent” and so you have less risks to unintentionally share information you want to keep private. In my experience, Firefox could be safer than Chrome if you use the right adds-on.

Then, install a particular add-on named HTTPS Everywhere.

This add-on (for Firefox and Chrome) will automatically connect your browser to the https version of many websites contained in its “Rule list”. The number of https connections in the HTTPS Everywhere’s list is sufficiently wide and you can always decide to manually add new https addresses (more info) as in the following example:

<ruleset name=”Google”>
<target host=”www.google.com” />
<target host=”google.com” />

<rule from=”^http://(www\.)?google\.com/” to=”https://google.com/”/&gt;
</ruleset>

If you prefer to save time and you don’t want to write some lines for every website you prefer to connect through https, you will install another add-on: HTTPS Finder. HTTPS Finder is perfectly interconnected with HTTPS Everywhere and it will try to reach every website you type into the address bar, using a https connection. If it finds a valid https website, it will ask you if you want to add a specific rule into HTTPS Everywhere rule list. At this point you have only to agree and the new rule will be stored in the list.

Simple, easy, useful! Bookmark this page!

Video – AnonimoX Firefox cuida tu privacidad en internet Ubuntu, Windows etc. by Pedrote2222

AddThis

Use the anonymoX add-on for Firefox to visit website protected by IP selection

What about listening to Pandora or other USA IP-based online music services if you are not into the USA? There are many add-on for Firefox which can help you to use the right proxy for appearing in different places in the world but, in my experience, you can have some difficulties when you try to use them.

In fact the IPs of free proxies change frequently and sometimes you are obliged to spend a lot of time searching for the right IP of free proxies. Other times the free proxy addresses are so overcrowded that you have to wait many seconds before you can visualize webpages.

One exception is anonymoX, a simple add-on for Firefox which always works properly and assure a good connection speed. AnonymoX has two different service levels, the free basic service has fewer features but it really works properly and it’s fast.

With the free level you can choose your favourite IP exit country between USA, UK and NL. You can also decide if you prefer to stealth your web surfing using anonymoX features or the classic TOR servers. Moreover, you can change your fictional ID every times you want also while you are surfing the web.

During all our tests anonymoX was able to assure us a good surfing privacy, in particular we successfully tried to change browser id and we really appreciated the possibility of visiting .onion websites through the Tor option. Recommended!!! AddThis