Achtung!: How to beef up your security with these easy steps

Achtung!: How to beef up your security with these easy steps

German companies, led by European aerospace firm EADS, bared to the public that they have been receiving huge waves of cyber-attacks with trace origins leading to Chinese IP addresses being used by hackers last month. Despite not divulging the gravity of the damage brought by Chinese cyber-terrorists, it could be implied that the attacks are serious since they reported it to the German government. Aside from EADS, other German firms like Bayer and IBM’s German headquarters acknowledged that their servers also suffered hackings for the past few months. In light of these recent incidents of hackings, German foreign intelligence agency Bundesnachrichtendienst is planning to create a special unit that will infiltrate the hackers’ computers and cripple them. Since we cannot expect the government to do all the security measures, here are some things we can do to prevent hackers from getting into our systems.

Use incognito/private browsing mode

Some web browsers like Google Chrome and Mozilla Firefox understand the importance of spotless browsing in case you need to browse sites with sensitive information such as social security and bank accounts. Incognito mode (or Private Browsing for Firefox users) allows users to visit sites without leaving any trace materials such as browsing history, search and input forms, downloads, and many more. For instance, you want to play de.partypoker.com during office hours when there’s no work to do and you’re using a common computer. The easiest solution to leave no pieces of evidence behind is to play at Incognito mode. Pair it with an anonymizer tool like Tor and you’ll have a completely safe and anonymous poker browsing. Security is important to online poker players since there is actually real money moving in and out of their accounts. After all, how can you concentrate on your poker matches when you think your games are being monitored by people with evil intentions?

Install Internet Security Software Suite

Most pieces of software now come on packages where you can have all necessary features like anti-spyware and malware, advance firewall, and Internet security all in one nifty box. While it seems that paying premium for a bundle of software is a waste, think about the savings you can get from getting all those individually. Before you purchase however, check out software reviews first made by tech sites like CNet, Gizmodo, and including sci-tech sections of The New York Times and The Guardian.

Avoid public computers or connecting to public Wi-Fi hotspots

Sure, using public computers such as internet cafés and connecting to public hotspots can provide cheap or even free Internet connection for a while. But this also comes with risks. Public hotspots and computer shops are primary hunting grounds for phishers and hackers where they can get sensitive data from people connected there. If you cannot avoid connecting to public websites or use public computers, you might want to use proxies. Better yet, avoid these places.

 
Posted in How To | Leave a comment

Infected by Proxy

Proxy can be a fun adventure. It enables people in different countries to seem to be local to other countries. Can also boost speed and well keep you from baddies’

WuFRGVaB20ePB3sevbXEfA2

Need to fix your proxy cause you keep getting sent to some no name server trying to give you “better” search results? No not bing but butfling or something similar?

Try This:

proxycfg -u

netsh int ip reset

HKCU\Software\Microsoft\Internet Settings\ProxyOverride.

netsh winsock reset

 

Or

Regedit4

[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
“MigrateProxy”=dword:00000001
“ProxyEnable”=dword:00000001
“ProxyHttp1.1″=dword:00000000
“ProxyServer”=”http://ProxyServername:80″
“ProxyOverride”=”<local>”

Good luck and watch out for the “bad” proxy bugs.

 
Posted in Interesting, Networking | Tagged | Leave a comment

Hidden Files and listing them

 

There are lots of books on how to uncover hidden potentials or the hidden secrets of the amazon or find that hidden info the CIA really doesn’t care for you to find.

2qR6c

Course this is not one of those functions this is simply a nerdy way to get a list of hidden files on any given drive or folder.

Have a look at this VB Script. And enjoy.

 

 

‘Description- Lists all files in a selected folder
‘and (optionally its subfolders
‘Uses Dir with various switches

Option Explicit
Dim sFldrInput1, sFldrInput2,introMsg, sSwitches

introMsg = msgBox (“This program creates a list of all hidden files that are in” & vbCrLf & “a selected folder and its subfolders (if desired).” & vbCrLf & “If there are many files, it may take a few minutes.”& vbCrLf & “A message will appear when the list is finished.”,vbOKCancel)
If introMsg = vbCancel Then
    Wscript.Quit
End If
ChooseFolder sFldrInput1,”Select the folder containing files to be listed”
ChooseFolder sFldrInput2, “Select the folder where list is to be put”
ChooseSubfldr sSwitches
MakeList sFldrInput1, sFldrInput2, sSwitches
Wscript.Quit

sub ChooseFolder(sFldrChoice, sSelectionString)
dim objShell, objFolder, objFolderItem, strPath, msgValue
Const DESK_TOP = &H10&
Const WINDOW_HANDLE = 0
Const OPTIONS = 0
sFldrChoice = “”
Set objShell = CreateObject(“Shell.Application”)
Set objFolder = objShell.Namespace(DESK_TOP)
Set objFolderItem = objFolder.Self
strPath = objFolderItem.Path
Set objShell = CreateObject(“Shell.Application”)
Set objFolder = objShell.BrowseForFolder _
    (WINDOW_HANDLE, sSelectionString, OPTIONS, strPath)
     
If objFolder Is Nothing Then
    Wscript.Quit
End If

Set objFolderItem = objFolder.Self
sFldrChoice = objFolderItem.Path

msgValue = msgBox(“You selected “& sFldrChoice, vbOKCancel)
If msgValue = vbCancel Then
    Wscript.Quit
End If
If Len(sFldrChoice) = 3 then
   chkForDrv sFldrChoice
End if
End sub

Sub ChooseSubfldr(sSwitches)
dim sSubfldrYesNo
sSubfldrYesNo = msgBox(“Do you want to list files in all subfolders also?”, vbYesNoCancel)
Select Case sSubfldrYesNo
case vbCancel
  Wscript.Quit
case vbNo
  sSwitches = ” /A:H”
case vbYes
   sSwitches = ” /A:H /s”
End select

End sub

Sub MakeList(sourceFldr, listFldr, sSwitches)
Const sdirCmd =”cmd /c dir “
Const sWildCard = “\*.*”
Const sRedirect =”>”
dim listFile
dim sStatement
dim objWshell
Dim oIE, oIEDoc, sMsg
listFile =”\list_of_hidden_files.txt”
sStatement = sdirCmd & chr(34) & sourceFldr & sWildcard & chr(34) & sSWitches & sRedirect & chr(34) & listFldr & listFile & chr(34)

‘The next part is just to display a message while making list
set objWshell=Wscript.CreateObject(“Wscript.Shell”)
Set oIE = Wscript.CreateObject(“InternetExplorer.Application”)
oIE.Navigate “about:blank”
do while oIE.busy : wscript.sleep 10 : loop
Set oIEDoc = oIE.Document
oIE.AddressBar = False
oIE.StatusBar = False
oIE.ToolBar = False
oIE.height=200
oIE.width=300
oIE.Resizable = False
oIE.Visible = True
sMsg= “<p><center>List is being made.<br>Please wait.<br>Large numbers of files may take several minutes.</center></p>”
oIEDoc.Body.Innerhtml= sMsg
‘List the files
objWshell.Run sStatement,7,true

Set oIEDoc = Nothing
oIE.Quit
Set oIE = Nothing
set objWshell = Nothing
msgBox “List has been made of hidden files”
End sub

Sub chkForDrv(sFldrChoice)
Dim oRe, bMatch
set oRe = New RegExp
oRe.pattern = “[a-zA-Z]:\\$”
bMatch= oRe.Test(sFldrChoice)
If bMatch Then sFldrChoice= Left(sFldrChoice, 2)
Set oRe = Nothing
End sub

If it blows up on you. make sure to blame apple, Linus Torvalds or your local microsofty. Just don’t blame me.

 
Posted in Interesting, Microsoft, Windows | Tagged | Leave a comment