LovSurfing

GrazuteRoom.lt

Friday, November 25, 2011

Nov 25, 2011 - Frontal attack or does the enemy have your IP and access ?

 This article is intended for my friends who have an active lifestyle and are  to express their opinions on public forums, including those of the non-democracy kind internet resurs, who are almost completely dependent on various dictators and other criminal regimes...

 Today we will talk about what if your apponent has your IP — what he can do and how to disrupt his plans.
  First - need to know what to do when visiting a rezhimnyi forum, resources, and do not forget that professional chuckers can work behind your opponent. Who needs it, read my articles:
Commissars of the Internet - https://korenevskiylt.blogspot.com/2011/10/blog-post_24.html?m=1

 Secondly, when visiting unsafe resources, one Google option "incognito" is no enough and if your IP address is not currently visible in the public space, then the applicant's website has information about you from the archive, and they can counter hov your own detailed information from out time.

 Your opponent can also find out your IP and gain access to your personal information base using special software such as Sniffer. I will not deliberately analyze how to use aggressive software, we will only talk about what we can counter aggressive plans to get personal information from you, real threats of using such information and how to prevent the opponent from getting it.

 First of all, remember that how  you have any antivirus program initially, it cannot recognize the virus, and when it does recognize it, it may be too late for you.

Whay ?...

The most dangerous for you are keyloggers. What is it? Keyloggers receive information about the operational work of your computer, collect information about the buttons you press and transmit it to your opponent. Therefore, if you visit dangerous resources, download uncertified products or play uncertified games, try to work more with text code, more copy and paste  text, names, page addresses, etc. Secondly, special programs such as Firewalls can help you against frontal attacks.

what do The Firewalls do ? principle work Firewalls....

It checks all running processes on your computer. If there are any incomprehensible actions, it will ask whether you allow such a program to work. Well, I will say this, there are cases when I specifically give a trojan a little work to show the opponent that I don't have any useful things for it ))))))

When working with TMP category firewalls, it is better to block everything, especially processes - 19A, 19E, 1A2, 1AA, 1AC, 1AF, 1B1 and so on... The trash heap is located - Documents and status > Local settings, but there are exceptions.

Okay... but where can you get these firewalls?
I will present to you several models, but remember tha me no one will pay for this) as and no pay for films, oficial information from USA&UK&EU& Fance.... paying others peopls, others company, but you reading & waching me:

Sunbelt Personal Firewall - for those who do not want to bother their heads with all sorts of computer intricacies or children have access to your computer.

Online Armor Personal Firewall Free is a very good option, the free version is somewhat shortened, but if you like it, there is always the option to upgrade to the full version.
http://download3.emsisoft.com/OnlineArmorSetup.exe .

ZoneAlarm - the free version is very limited, but for the abilities of hackers from the former Soviet Union it is quite sufficient.
http://download.zonealarm.com/bin/free/1025_za/zaSetup_101_056_000.exe

It's better to download such programs via FlashGet...

Well, that's probably today all I wanted to tell you.

Do you know that in parallel to the official version of the Internet there are several other options, including for individuals? Who might find this useful, how to use it and more, will tell you later, if there is desire, time and resources )

No comments:

Post a Comment