This article is intended for my friends who have an active lifestyle and are to express their opinions on public forums, including those of the non-democracy kind internet resurs, who are almost completely dependent on various dictators and other criminal regimes...
Today we will talk about what if your apponent has your IP — what he can do and how to disrupt his plans.
First - need to know what to do when visiting a rezhimnyi forum, resources, and do not forget that professional chuckers can work behind your opponent. Who needs it, read my articles:
- Commissars of the Internet - https://korenevskiylt.blogspot.com/2011/10/blog-post_24.html?m=1
Secondly, when visiting unsafe resources, one Google option "incognito" is no enough and if your IP address is not currently visible in the public space, then the applicant's website has information about you from the archive, and they can counter hov your own detailed information from out time.
Your opponent can also find out your IP and gain access to your personal information base using special software such as Sniffer. I will not deliberately analyze how to use aggressive software, we will only talk about what we can counter aggressive plans to get personal information from you, real threats of using such information and how to prevent the opponent from getting it.
First of all, remember that how you have any antivirus program initially, it cannot recognize the virus, and when it does recognize it, it may be too late for you.
Whay ?...
The most dangerous for you are keyloggers. What is it? Keyloggers receive information about the operational work of your computer, collect information about the buttons you press and transmit it to your opponent. Therefore, if you visit dangerous resources, download uncertified products or play uncertified games, try to work more with text code, more copy and paste text, names, page addresses, etc. Secondly, special programs such as Firewalls can help you against frontal attacks.
what do The Firewalls do ? principle work Firewalls....
It checks all running processes on your computer. If there are any incomprehensible actions, it will ask whether you allow such a program to work. Well, I will say this, there are cases when I specifically give a trojan a little work to show the opponent that I don't have any useful things for it ))))))
When working with TMP category firewalls, it is better to block everything, especially processes - 19A, 19E, 1A2, 1AA, 1AC, 1AF, 1B1 and so on... The trash heap is located - Documents and status > Local settings, but there are exceptions.
Comodo Internet Security (32bit) and Comodo Internet Security (64bit) - not a bad option but for the correct operation of the program you will need to disable your a antivirus.
http://downloads.comodo.com/cis/download/installs/1000/standalone/cispremium_installer_x86.exe ;
http://downloads.comodo.com/cis/download/installs/1000/standalone/cispremium_installer_x64.exe .
Online Armor Personal Firewall Free is a very good option, the free version is somewhat shortened, but if you like it, there is always the option to upgrade to the full version.
http://download3.emsisoft.com/OnlineArmorSetup.exe .
ZoneAlarm - the free version is very limited, but for the abilities of hackers from the former Soviet Union it is quite sufficient.
http://download.zonealarm.com/bin/free/1025_za/zaSetup_101_056_000.exe
No comments:
Post a Comment