No matter how savvy you think you’re being when downloading torrents there is always someone watching. This site records the IP addresses of torrent users and saves them to a database. It can tell you the name of the files that you have downloaded as well as your location and the dates that the files were downloaded. Check the link to see if you’ve been caught
Searching Google for relevant results can be somewhat of a mixed bag. Try to make the most of your searches with the tips shown in the link below.
I own a HTC Desire HD and I find it extremely handy when it comes to banking online or checking out my social networks.
This is where SSH Tunnel comes in. SSH Tunnel allows you to connect to a secure SSH (secure shell) server and pipe all your internet traffic through an encrypted tunnel. Some of the main downfalls of SSH Tunnel are that you need a rooted Android phone, access to a SSH server and a little bit of technical knowledge.
If you are interested in more leave a comment and I can discuss it in more detail.
If you are at work or school and you are trapped behind a strict firewall then why not create a tunnel to your home computer and route all the traffic through that tunnel giving you unrestricted internet access.
All these directions are based on using a Linux based computer. I’m sure it can be done in Windows too I just haven’t tried it.
This post describes how to ssh to a personal server using authenticated proxy. SSH (Secure Shell) is typically used to log into a remote machine and execute commands, but it also supports tunneling, forwarding TCP ports and X11 connections; it can transfer files using the associated SFTP or SCP protocols.
Normally we use NetCat to ssh outside using proxy server but if its not support proxy user / pass to authenticate by proxy server and then ssh outside. Here we will use a package called connect.c.
connect.c is the simple relaying command to make network connection via SOCKS and https proxy. It is mainly intended to be used as proxy command of OpenSSH. You can make SSH session beyond the firewall with this command.
This can be achieved by other methods too but this works for me.
1) Download connect.c software.
2) Compile connect.c Using GCC
gcc connect.c -o connect
and then copy to directory in your PATH i.e /usr/bin or /usr/local/bin
cp connect /usr/bin
3) Congiure ssh_config
append following line
ProxyCommand /usr/bin/connect -H proxy.yourserver.com:8080 %h %p
4) Export Proxy User / Pass as variable
It is insecure but we have to used it. If your proxy doesnt use user/pass for authenticatio, you can skip this.
Thats it now you can ssh outside without any restriction
The link below shows why you should always keep your security patches up-to-date and also not click on any attachment regardless of whether it is a PDF file, a Word document or anything else from someone that you don’t know.
In the case outlined below the exploit was able to evade anti virus and malware scanners so as you can see the next best form of defense is common sense.
Beware the article is kinda technical so it might be a bit over the head of some non techy folk.