Posting mode: Reply
[Return]
Name
E-mail
Subject
Comment
File
Password(Password used for file deletion)
  • Supported file types are: GIF, JPG, PNG
  • Maximum file size allowed is 3072 KB.
  • Images greater than 250x250 pixels will be thumbnailed.
  • Read the rules and FAQ before posting.
  • このサイトについて - 翻訳


  • File : 1259800358.jpg-(40 KB, 275x275, ComputerSecurity.jpg)
    40 KB Anonymous 12/02/09(Wed)19:32 No.7002985  
    Here's a question I'm sure you guys get a lot on here.

    How do I make my computer as secure as motherfucking possible.

    Obviously, it's something currently a little beyond my current technical know-how, but I'm a quick learner, and not technologically incompetent, just inexperienced.

    So where do I start? What do I need to know?
    >> Anonymous 12/02/09(Wed)19:36 No.7003043
    Bump for "Pleeeease?"
    >> !nINteNdOOM 12/02/09(Wed)19:38 No.7003069
    Install gentoo.
    >> Anonymous 12/02/09(Wed)19:40 No.7003092
    >>7003069

    I acknowledge that that is a very good place to start, as I presume it will give me the capability to work in whatever security measures I want with little trouble.

    But that doesn't tell me jack shit about security measures.
    >> Anonymous 12/02/09(Wed)19:42 No.7003113
    What do you want to protect against?
    >> Anonymous 12/02/09(Wed)19:42 No.7003126
    >>7003092
    Yes it is. It will take you at least 3 months to setup your internet connection on gentoo. Hence you will be safe for longer than any other distros.
    >> Anonymous 12/02/09(Wed)19:43 No.7003127
    >>7002985
    Never connect to the internet.

    Done.
    >> Anonymous 12/02/09(Wed)19:43 No.7003139
    >>7003127
    What about someone who sits in front of my computer, I want to protect it from that too
    >> Anonymous 12/02/09(Wed)19:45 No.7003152
    >What do you want to protect against?

    Basically? I'd like to be able to protect my computer from most concentrated hacking or observation attacks.

    Obviously, no system is perfect, and will be cracked eventually, but, I'd like to be able to at least hold out against anyone who's just 'interested'.
    >> HERPTY !DERP1Y93iE 12/02/09(Wed)19:45 No.7003154
    Common Sense 2010. It's amazing, I swear.
    >> Anonymous 12/02/09(Wed)19:45 No.7003164
    >>7003139
    Set up a 30 character long password of letters, symbols and numbers to access anything and everything.

    Also, encrypt everything. Get an HDD equipped with Hardware Encryption. Although if you forget your password, you're fucked. It's not like software encryption like TrueCrypt or something.
    >> Anonymous 12/02/09(Wed)19:46 No.7003175
    >>7003139
    >implying anyone who breaks into your house will know how to use gentoo
    >> Anonymous 12/02/09(Wed)19:47 No.7003181
    >>7003164
    What if they have a cluster of 2000 PS3s to crack my encryption?
    >> Anonymous 12/02/09(Wed)19:48 No.7003194
    >>7003181
    It'll take a few centuries to brute force it, no matter how many Cell/PPC processors they have working on it.
    >> Anonymous 12/02/09(Wed)19:48 No.7003198
    >>7003194
    But, what if they have a lot of time....
    >> Anonymous 12/02/09(Wed)19:49 No.7003213
    >>7003127
    What if I get mugged by a hacker while transporting vital data for my computer on a USB drive on my keyring?
    >> Anonymous 12/02/09(Wed)19:50 No.7003220
    >>7003198

    Implant a heart monitor into your body and if it ever flatlines make it to where it sends a signal to your computer to wipe your hard drive

    and stop looking at CP
    >> Anonymous 12/02/09(Wed)19:52 No.7003233
    I should have known this wouldn't be any help >.>
    >> WhySoAnon !!rjSftmXsPDX 12/02/09(Wed)19:52 No.7003238
    >>7003213
    I doubt a mugger is sophisticated enough to get around the most basic password setups and won't know how to bruteforce it, with that said use a basic encryption program. I believe TrueCrypt works for USBs.
    >> Anonymous 12/02/09(Wed)19:53 No.7003247
    >>7003233
    tl;dr

    your information isn't valuable, don't do illegal shit
    >> Anonymous 12/02/09(Wed)19:54 No.7003254
    >>7003213
    https://www.ironkey.com/
    >> Anonymous 12/02/09(Wed)19:54 No.7003255
    >>7003238
    BUUUUT, the Mugger is a hacker, I already said that!
    >> Anonymous 12/02/09(Wed)19:55 No.7003269
    >>7003198
    They won't be able to break it, trust me.

    It won't be a few centuries either, try several millennia.

    You'd be lucky of humans are even around in 30... years.


    A password of that length with varying characters is fucking crazily hard to crack.
    They will never put the resources in it to crack someones TC container because you were downloading CP or whatever it is you are trying to hide.
    And if you aren't downloading the CPs, they'll certainly not give a shit about you. (no offence)

    Simple rule: don't make enemies with governments and they won't care.
    >> Anonymous 12/02/09(Wed)19:56 No.7003274
    >>7003254
    What if I'm trying to do it on a budget... then what?
    >> Anonymous 12/02/09(Wed)19:57 No.7003281
    Well you can make your computer very very secure even the nsa wouldn't be able to crack it. However there is a balance between security, usability, convenience and cost. Any hyper secure setup is going to be costly and time consuming and your data will be far less accessible.
    >> Mei !8800gtx15A 12/02/09(Wed)19:57 No.7003284
    >>7003269
    They won't give enough of a shit if they only think you downloaded something....

    If you're keeping lolis in the basement, the partyv& will have enough time to crack it.

    Or if you're Osama Bin Laden...
    >> Anonymous 12/02/09(Wed)19:58 No.7003287
    >>7003233
    Protip: No computer is secure. EVER.
    Computers were always and will always be designed for functionality and features. Not designed for security. You want to make your computer as secure as possible?

    Turn it off.
    Seriously, the only truly secure computer is one that's turned off.

    Then if you want to go apeshit, put it in a 10 foot thick cement vault with four different 30 character/symbol/number password lock on the outside of it.
    >> Anonymous 12/02/09(Wed)19:58 No.7003295
    >>7003274
    Then nothing you have is worth securing to such an extent.

    If you're worried, go buy a Lenovo ThinkPad with one of their Hardware Encrypted HDDs. Get it with a fingerprint scanner.

    Shut the fuck up and leave.
    >> Anonymous 12/02/09(Wed)19:59 No.7003301
    >>7003287
    and a big dog outside... with a smaller dog guarding the big dog
    >> Anonymous 12/02/09(Wed)20:02 No.7003324
    >>7003301
    In a house with curtains.
    >> Anonymous 12/02/09(Wed)20:02 No.7003326
    >How do I make my computer as secure as motherfucking possible.

    Unplug it. Encase it in reinforced concrete, and dump it off a ship to the bottom of the Marianas trench (or any other subduction zone, really) to be pulled into the mantle and turned back into raw materials.

    Between that and no security at all is what you're actually looking for. What, exactly, is your goal?
    >> Anonymous 12/02/09(Wed)20:02 No.7003327
    >>7003301
    Wouldn't you want each dog to be progressively bigger to guard the smaller dog infront of it?
    >> Anonymous 12/02/09(Wed)20:03 No.7003334
    >>7003326
    Don't you think it would be easier to just dump it in a volcano? I mean it essentially gives the same results.
    >> Anonymous 12/02/09(Wed)20:04 No.7003343
    >>7003284
    They still won't crack it.
    The amount of combinations and the unknowns of how big the actual password will outlast any poster on this board.

    You can doubly fuck them by placing yet another 30+ character passworded container inside, and another, and another, and another.

    The only way they are getting your password is via hardware, either through a reflashed BIOS or spyware / malware.
    Or of course, beating the shit out of you via "invisible" methods until you release the password. (shocks, chemicals, etc)
    >> Anonymous 12/02/09(Wed)20:05 No.7003354
         File1259802335.png-(26 KB, 448x274, security.png)
    26 KB
    >>7003269
    >> Anonymous 12/02/09(Wed)20:07 No.7003367
    >>7003327
    If you put the biggest dog on the end, if someone found a way to bypass the previous dogs they'd just have to punt the chihuahua and walk into your bomb shelter with impunity
    >> Anonymous 12/02/09(Wed)20:08 No.7003385
    >>7003334

    You haven't seen a caldera that's not undergoing an eruption, have you? Cold hard rock is what you see. Like leaving it out on the sidewalk.
    >> Anonymous 12/02/09(Wed)20:09 No.7003388
    >>7003343
    That's where Hardware Encryption comes in. If it's software, you have a chance of reflashing the BIOS. If it's encrypted via the Hardware though...
    They're fucked.
    >> Anonymous 12/02/09(Wed)20:10 No.7003413
    >>7003385
    I would think heading to an active volcano and dumping it in would've been implied.
    >> Anonymous 12/02/09(Wed)20:11 No.7003424
    >>7003413

    Fine, you go walk up to the edge of an erupting volcano's caldera. I'll wait right here.
    >> Anonymous 12/02/09(Wed)20:12 No.7003443
    >>7003424
    >implying I wouldn't rent a helicopter and fly over it, and dumping it in from there
    Don't watch much Discovery Channel do you?
    >> Anonymous 12/02/09(Wed)20:14 No.7003464
    >>7003443
    >implying that you have enough money to rent a helicopter to fly over an erupting volcano.
    >implying that you'd ever find a pilot silly enough to do it.
    >> Anonymous 12/02/09(Wed)20:14 No.7003469
         File1259802894.jpg-(13 KB, 200x200, podcast_2_3.jpg)
    13 KB
    HEY OP.

    Listen to these. Starting from the beginning. It starts out good for novice listeners, but after 100 or so shows starts to get kind of intermediate. This fucker is right 99% of the time, and will correct himself the next episode when he's not.

    http://www.grc.com/securitynow.htm
    >> Anonymous 12/02/09(Wed)20:16 No.7003490
    >>7003464
    >implying chartering a bot to go over the Marianas trench and encasing a computer in concrete would be significantly cheaper
    >implying there aren't pilots that do that regularly for tourists in Hawaii
    >> Anonymous 12/02/09(Wed)20:17 No.7003509
    >>7003469
    Man, that goes back to 2005. Although, a lot of the stuff they do talk about is timeless.
    >> Anonymous 12/02/09(Wed)20:17 No.7003513
    >>7003490
    >boat**
    >> Anonymous 12/02/09(Wed)20:17 No.7003515
    >>7003469

    Awesome podcast is Awesome :)
    >> Anonymous 12/02/09(Wed)20:18 No.7003522
    >>7003469

    He is a fucking tool. He said that refusing connections on a port that you don't offer services on is somehow less secure than silently dropping packets.

    It's been about 15 years since he said that, and nobody's ever been able to break into any computer that way.
    >> Anonymous 12/02/09(Wed)20:20 No.7003545
    >>7003490
    >implying that the pilots in hawaii fly directly over Mauna Loa when it's erupting.
    >implying that my way is less feasible.
    >> Anonymous 12/02/09(Wed)20:21 No.7003557
    >>7003522
    Refusing to accept a service on a port alerts a scanner to your existence. Silently dropping packets does not. If you want to be invisible, then Silently dropping packets is the way to go.
    >> Anonymous 12/02/09(Wed)20:21 No.7003566
    Online Armor is the best free firewall
    >> Anonymous 12/02/09(Wed)20:22 No.7003574
    >>7003545
    It is less feasible. You could miss the marianas trench easily with the currents. And it doesn't have to be erupting, it just has to be active enough to have magma flow reaching the surface.
    >> Anonymous 12/02/09(Wed)20:23 No.7003578
    >>7003557
    This.

    Saying "OH HEY, I DON'T LET PORT X GO THROUGH" is like telling the officer than breaking your door down is the incorrect method to unlock the door.
    >> Anonymous 12/02/09(Wed)20:23 No.7003587
    >>7003522
    >>7003557

    Fucking owned
    >> Anonymous 12/02/09(Wed)20:24 No.7003592
    >>7003566
    COMODO was here.
    You're a faggot.
    >> Anonymous 12/02/09(Wed)20:24 No.7003600
    >>7003557
    >implying that many people don't offer at least one service that's detectable like instant messaging or bittorrent and that dropping packets on other ports makes a hill of beans difference.
    >implying that people scan for random ports when scanning for bittorrent and im is more effective to determine the existence of a computer.
    >> Anonymous 12/02/09(Wed)20:25 No.7003608
    >>7003592
    Don't be jealous.
    >> Anonymous 12/02/09(Wed)20:26 No.7003618
    >>7003587

    see >>7003600

    Owned? hardly.
    >> Anonymous 12/02/09(Wed)20:26 No.7003619
    >>7003608
    I'm using the best free Firewall available in COMODO combined with Defense+.
    Why would I be jealous?
    >> Anonymous 12/02/09(Wed)20:27 No.7003629
    >>7003619
    Because you know Online Armor is better
    >> Anonymous 12/02/09(Wed)20:27 No.7003632
    >>7003600
    It doesn't actually matter what's extreme, what's unfeasible, and what "most people" do. Security is security.
    >> Anonymous 12/02/09(Wed)20:28 No.7003645
    best online protection for your computer is disabling your network adapters.
    >> Anonymous 12/02/09(Wed)20:28 No.7003647
    >>7003629
    I know no such thing. COMODO is clearly superior. Only a faggot like yourself can't see that.
    >> Anonymous 12/02/09(Wed)20:33 No.7003701
    >>7003647
    The truth is making you emotional.
    >> Anonymous 12/02/09(Wed)20:34 No.7003712
    >>7003632
    >implying that wasting time on theoretical threats is somehow productive compared to dealing with actual holes in security.

    Jane is running IM. I portscan for IM on her subnet and find every computer that's running IM. Those are active computers. If I scan for random ports, I am far less likely to find available machines. Why scan for 22 when I can find shit on 5050?
    >> Anonymous 12/02/09(Wed)20:40 No.7003770
    >>7003712
    Block application from receiving any messages from an IP other than the original one it communicated with.
    Any other IPs connecting to it are automatically a threat.

    Solved.
    >> Anonymous 12/02/09(Wed)20:41 No.7003781
    >>7003618

    >implying I can see future posts
    >implying everyone has those necessary ports in use right when a hacker wants in
    >implying machines hackers want into will be even running them
    >> Anonymous 12/02/09(Wed)20:42 No.7003792
    you want a computer thats as secure as possible?

    well you're in luck, the solution is to not use a computer forever, now get off the internet ya bum



    Delete Post [File Only]
    Password
    Style [Yotsuba | Yotsuba B | Futaba | Burichan]
    Watched Threads
    PosterThread Title
    [V][X]Anonymous
    [V][X]Anonymous
    [V][X]AnonymousCirnOS!!!
    [V][X]Anonymous
    [V][X]Anonymous
    [V][X]Anonymous
    [V][X]Anonymous
    [V][X]Anonymous