Archive for the ‘Internet Security’ Category

Use Bloglines.com to read blogs

April 19, 2007

Bloglines.com
About Bloglines
Free and Easy

Bloglines is a FREE online service for searching, subscribing, creating and sharing news feeds, blogs and rich web content. With Bloglines, there is no software to download or install — simply register as a new user and you can instantly begin accessing your account any time, from any computer or mobile device. And it’s FREE!

Bloglines is a window to a whole new world of dynamic content that is being created and distributed over the new “live” web. You can make your own personalized news page tailored to your unique interests from our index of tens of millions of live internet content feeds, including articles, blogs, images and audio. And it’s FREE!

Bloglines shields you from the confusion of news feed standards — RSS, Atom, and others. Bloglines allows you to search for, read and share any updates from your favorite news feed or blog regardless of its authoring technology. And it’s FREE!

Bloglines offers the most features for people who like their online news to be fresh. It’s the most popular website of its kind, indexing millions of new online articles every day.

How to create a backup for you blog and get around any future bans

April 13, 2007

The Government of India has previously tried to block this blog along with
other blogs.
Blogs blocked in India

Considering the high levels of paranoia and elevated sense of madness within the establishment it seems extremely likely that they are going to do something in desperation ,it is hence highly recommended you back up your blog and create mirror sites to withstand any such attacks.

If you follow the steps outlined in this post
Your blog is virtually indestructible as long as your physical existence is sustained.And it shall rise again and again like the phoenix.

This procedure is for those who have a blog on blogger.com

1.Go to wordpress.com and sign up for an account and create a new blog.

2.Click on Manage——> And then click on Import

WordPress will guide you through the rest of the procedure.

And Voila ! your blog is set up on wordpress.com

Mirror Site of Naxalrevolution on WordPress.com

https://naxalrevolution.wordpress.com/

Repeat this procedure once or twice a month to keep updating your
archives.

All it takes is 10 minutes of you time.

This Blog EXIM policy can be repeated again and again until you
have as many blogs as you desire.

In the event of a ban/block/deletion you can keep jumping from one
platform to another , one address to another.

How to save your blog to your Hardrive

Once you have your blog setup on wordpress.com

You can save your entire blog in xml format onto your hardrive.

To do this go to your dashboard and
click on Manage——> And then click on Export

Here you will get the option to save your entire blog onto your hardrive.

I just saved mine and it was only 6 MB.


Create copies of this file , write them onto a CD or tuck
them away in some online storage account or you could
use it to setup a blog on blogspot !

If you have any queries or doubts regarding Internet Security please email us at the following email id.

How to blog via Email

April 13, 2007

Blogger.com has a feature by which you don’t need to log in at all and can post on your blog
by just sending an email.

To do this you first need to register a blog

After that follow these steps
1.Log into your account and go to your blog dashboard.
2.Click on Settings—->And under settings click on email

Example:Click on image for larger image

3.Now you need to setup a new id and you need to enter one word or several words in the
box provided in the mail to blogger section. This will be the email id of your blog and whenever you mail an email to this id it will get automatically published onto your blog.

4.Remember not to disclose this email id to anyone as anyone who knows about it
can then publish on your blog.

5.Do not forget to save you settings.

How to restrict access to your blog.

April 13, 2007

Blog Readers

Your blog is open to all readers by default.

You can restrict your blog to only readers you choose.
However, these readers will need to log in before reading your blog, adding an extra step.

How to do this

1.Log into your account and go to your blog dashboard.
2.Click on Settings—->And under settings click on Permissions

Example:Click on image for larger image

3.There you can choose who can view your blog.

Example:Click on image for larger image


4.Remember to Save you Settings after you make the changes.

Install an Anti-virus and keep it updated.

April 13, 2007

It is important to always have an anti-virus installed in your PC.

AVG Anti-Virus Free Edition is one of the most popular solutions to provide basic security protection on home and non-commercial PCs.

Download and Install AVG’s Free Anti-Virus Software

http://free.grisoft.com/

Use a firewall for your personal computer

April 13, 2007

Use a firewall

Firewalls keep out some viruses and hackers

A firewall acts as a barrier between the public internet and your private computer or network and blocks threats including some viruses.

Why install a firewall?

A firewall protects you against a number of different online threats:

  • Hackers breaking into your computer.
  • Some viruses, called “worms,” that spread from computer to computer over the internet.
  • Some firewalls block outgoing traffic that might originate from a virus infection.

What a firewall does

Because the internet is a public network, any connected computer can find and connect to any other connected computer. A firewall is a barrier between the public internet and your private computer system.

Think of it as a really paranoid bouncer who stops anyone coming into your computer if they’re not on the guest list.

What a firewall does NOT do

A firewall isn’t sufficient on its own to guarantee security, but it is the first line of defence.

You also need to take the other protective steps outlined on this website.

However, a firewall provides limited or no protection:

  • If you give permission for other computers to connect to yours.
  • If it is switched off, disabled or contains many exceptions or open ports.
  • Against most viruses.
  • Against spam.
  • Against spyware installations.
  • Against any kind of fraud or criminal activity online.
  • If you or a virus has created a back door through the firewall.
  • If a hacker has the password for the firewall.
  • Against people with physical access to your computer or network.
  • Against malicious traffic that does not travel through it, for example via a poorly configured wireless network.
  • Against attacks after a network has been compromised.
  • Against traffic that appears to be legitimate.

None of these things give a reason NOT to install a firewall, however. It’s like wearing a seatbelt in a car: it’s a good idea but it won’t guarantee your safety if you crash.

It is safest to assume that your internet service provider does NOT provide any kind of firewall and make sure you have the right software to protect yourself.

Types of firewall

Desktop firewall

A desktop firewall is installed on each computer that is connected to the internet and monitors (and blocks, where necessary) internet traffic. They are also sometimes known as ‘software firewalls.’

Windows Firewall (part of Microsoft Windows XP Service Pack 2) is a basic firewall. You can replace it with a more sophisticated commercial desktop firewall or supplement it with a hardware firewall if you wish.

The benefits of a desktop firewall are:

  • Windows Firewall is free and built-in to Windows XP and free commercial firewalls are available for older systems in private use.
  • Commercial desktop firewalls often integrate well with other security products like virus scanners.
  • Easy to set up – no wiring or extra hardware.
  • If you use a laptop, a desktop firewall will protect you wherever you connect to the internet.

We recommend that every computer should have a software firewall installed.

Hardware firewall

Hardware firewalls are often built into broadband internet routers. If several computers share an internet connection, a hardware firewall will protect all of them. Most router manufacturers offer devices with firewalls.

Although they are getting easier to use, configuring a hardware firewall is often trickier than configuring a software firewall. Most internet routers and firewalls have a password that lets you control them from your computer. It’s a good idea to change that password so that it is not the default one.

There is usually little price difference between a router that includes a firewall and one without and so it pays to get the extra protection if you have a choice.

You can have hardware and desktop firewalls and having both may give a small margin of extra security. However, a desktop firewall on each computer is your first priority.

How to install a desktop firewall

Your choice of desktop firewall depends on whether or not you are running Windows XP and whether or not you want to buy a commercial firewall.

Windows XP Service Pack 2

Windows XP Service Pack 2 includes Windows Firewall, which is a desktop firewall. You can check if you are running this version of Windows by opening the Control Panel and double-clicking on System. When the System control panel appears, under the word “System” it will tell you what operating system you are running. If it reads “Microsoft Windows XP” and “Service Pack 2” there, you’re all set.

You can check if your firewall is operational by opening the Control Panel and double-clicking on Security Centre. A green light and the word ‘on’ should appear next to Firewall.

Windows XP

See Get the latest Windows updates for instructions on upgrading to Windows XP Service Pack 2.

Windows 95, 98, ME, 2000

See: Using older computers online safely.

Commercial firewalls

Commercial firewalls operate in the same way as Windows Firewall but generally give you extra control over how the firewall works, more information about how to configure it and more support.

Most security software companies sell a firewall as a standalone software package or as part of a security suite that includes other protection such as a virus scanner.

In addition, the basic version of Zone Labs ZoneAlarm is free for personal use.

How to test if your firewall is working

There are a couple of online sites that you can use to see if your firewall is protecting your computer:

  • Symantec Security Check.
  • ShieldsUP! (follow the links for ‘Shields Up’). This site requires a little more technical knowledge to use properly.

How to configure a firewall

Most desktop firewalls require some training before they are fully configured. This is because they need to learn what programs you use and which ones connect to the internet.

Windows Firewall pops up warnings when a program tries to connect to the internet for the first time.

Other desktop firewalls work in a similar way but the information they give varies from product to product.

The key thing is to pay attention to these messages and make sure that you only allow legitimate connections.

Source : getsafeonline.com

How to browse the Internet anonymously from home ,office or any other place

April 12, 2007

Many mice surf the web under the illusion that their actions are private and
anonymous
.Unfortunately, it isn’t so. Every time you visit a site for a piece
of cheese
, you leave a calling card that reveals where you’re coming from,
what kind of computer you have, and other details. And many cats keep
logs of all your visits, so that they can catch you!
From http://anonymouse.org/

This problem can be overcome by using proxies.

List of Website that offer free web proxies

A very important resource on Internet Privacy.
Do click on the link below for those who are interested in
these matters in detail.

http://dmoz.org/Computers/Security/Internet/Privacy/

Browse the Web using TOR

April 12, 2007

Tor: anonymity online

Tor is a toolset for a wide range of organizations and people that want to improve their safety and security on the Internet. Using Tor can help you anonymize web browsing and publishing, instant messaging, IRC, SSH, and other applications that use the TCP protocol. Tor also provides a platform on which software developers can build new applications with built-in anonymity, safety, and privacy features.

Tor aims to defend against traffic analysis, a form of network surveillance that threatens personal anonymity and privacy, confidential business activities and relationships, and state security. Communications are bounced around a distributed network of servers called onion routers, protecting you from websites that build profiles of your interests, local eavesdroppers that read your data or learn what sites you visit, and even the onion routers themselves.

Install TOR button into your Mozilla Firefox browser

https://addons.mozilla.org/en-US/firefox/addon/2275

TOR official website

How TOR works

Internet Security Week

April 10, 2007

Internet Security Week

Reactionary governments have shown themselves willing to attack and intimidate people who aren’t even radicals and who are just researching social and political movements. They are also willing to repress or monitor people for other reasons. Repression is a real threat in some circumstances, and Naxalrevolution takes this seriously for the sake of the people who visit this site and other sites for different reasons.

Maintaining anonymity and practicing secure behaiviour makes it more difficult for agents and officials, often violating civil rights and breaking laws, to identify people interested in revolutionary knowledge.

It also makes things harder for right-wing activists, vigilantes and other groups to ruin the lives of people interested in revolutionary education.

As a part of Internet Security week the below posts will guide you on how to adopt some of the best internet security practices and how to secure your means of communication

For any doubts or clarifications please leave a request in the comments section.

Credits: I would like to thank irtr from whom I first heard about these security practices and riseup for the detailed information and good work that they are doing.

After reading the below posts.Naxalrevolution strongly recommends that you sign up for a new email account at either

Hushmail.com

or

Riseup.net
Please see to it that you adhere to their terms and conditions.
Full list of email providers is given in the below posts.

and use it for communicating with your friends and with us.
We will shortly be announcing our new email id.

Why security matters

April 10, 2007

Source : Riseup.net

Why security matters

Every email takes a perilous journey. A typical email might travel across twenty networks and be stored on five computers from the time it is composed to the time it is read. At every step of the way, the contents of the email might be monitored, archived, cataloged, and indexed. However, it is not the content of your email which is most interesting: typically, a spying organization is more concerned by whom you communicate with.

There are many ways in which this kind of mapping of people’s associations and habits is far worse than traditional eavesdropping. By cataloging our associations, a spying organization has an intimate picture of how our social movements are organized–a more detailed picture than even the social movements themselves are aware of. This is bad. Really bad. The US government, among others, has a long track record of doing whatever it can to subvert, imprison, kill, or squash social movements which it sees as a threat (black power, anti-war, civil rights, anti-slavery, native rights, organized labor, and so on). And now they have all the tools they need to do this with blinding precision.

We believe that communication free of eavesdropping and association mapping is necessary for a democratic society (should one ever happen to take root in the US). We must defend the right to free speech, but it is just as necessary to defend the right to private speech. Unfortunately, private communication is not possible if only a few people practice it: they will stand out and open themselves up to greater scrutiny. Therefore, we believe it is important for everyone to incorporate as many security measures in your email life as you are able.

Email is not secure

You should think of normal email as a postcard: anyone can read it, your letter carrier, your nosy neighbor, your house mates. All email, unless encrypted, is completely insecure. Email is actually much less secure than a postcard, because at least with a postcard you have a chance of recognizing the sender’s handwriting. With email, anyone can pretend to be anyone else. There is another way in which email is even less private than a postcard: the government does not have enough labor to read everyone’s postscards, but they probably have the capacity and ability to scan most email. Based on current research in datamining, it is likely that the government does not search email for particular words but rather looks for patterns of association and activity.

In the three cases below, evidence is well established that the US government conducts widespread and sweeping electronic survillence.

full-pipe monitoring

According to a former Justice Department attorney, it is common practice for the FBI to practice “full-pipe monitoring”. The process involves vacuuming up all traffic of an ISP and then later mining that data for whatever the FBI might find interesting. The story was first reported on January 30, 2007 by Declan McCullagh of CNET News.com.

AT&T

The Electronic Frontier Foundation (EFF) filed a class-action lawsuit against AT&T on January 31, 2006, accusing the telecom giant of violating the law and the privacy of its customers by collaborating with the National Security Agency (NSA) in its massive and illegal program to wiretap and data-mine Americans’ communications.

Because AT&T is one of the few providers of the internet backbone (a so called Tier 1 provider), even if you are not an AT&T customer is is likely that AT&T is the carrier for much of your interent traffic. It is very likely that other large internet and email providers have also worked out deals with the government. We only know about this one because of an internal whistleblower.

Carnivore

For legal domestic wiretaps, the U.S. government runs a program called Carnivore (also called DCS1000).

Carnivore is a ‘black box’ which some ISPs are required to install which allows law enforcement to do ‘legal’ wiretaps. However, no one knows how they work, they effectively give the government total control over monitoring anything on the ISP’s network, and there is much evidence that the government uses carnivore to gather more information than is legal.

As of January 2005, the FBI announced they are no longer using Carnivore/DCS1000 and are replacing it with a product developed by a third party. The purpose of the new system is exactly the same.

ECHELON

ECHELON is a spy program operated cooperatively with the governments of the United States, Canada, United Kingdom, Australia, and New Zealand. The goal is to monitor and analyze internet traffic on a wide scale. The EU Parliament has accused the U.S. of using Echelon for industrial espionage.

Call database

On May 10, USAToday broke the story that the NSA has a database designed to track every phone call ever made in the US. Although this applies to phone conversations, the fact that the government believes that this is legal means that they almost certainly think it is legal to track all the email communication within the US as well. And we know from the AT&T case that they have the capability to do so.

You can do something about it!

What a gloomy picture! Happily, there are many things you can do. These security pages will help outline some of the simple and not-so-simple changes you can make to your email behavior.

What a gloomy picture! Happily, there are many things you can do. These security pages will help outline some of the simple and not-so-simple changes you can make to your email behavior.

* Secure Connections: by using secure connections, you protect your login information and your data while is in transport to riseup.net.
* Secure Providers: when you send mail to and from secure email providers, you can protect the content of your communication and also the pattern of your associations.
* Public Key Encryption: although it is a little more work, public key encryption is the best way to keep the content of your communication private.

See the next page, Security Measures, for tips on these and other steps you can take. Remember: even if you don’t personally need privacy, practicing secure communication will ensure that others have the ability to freely organize and agitate.

Simple Measures for Email Security

April 10, 2007

Source : Riseup.net

Simple Measures for Email Security

Practice secure behavior!

These pages include a lot of fancy talk about encryption. Ultimately, however, all this wizbang cryto-alchemy will be totally useless if you have insecure behavior. A few simple practices will go a long way toward securing your communications:

  1. Logout: make sure that you always logout when using web-mail. This is very important, and very easy to do. This is particular important when using a public computer.
  2. Avoid public computers: this can be difficult. If you do use a public computer, consider changing your password often or using the virtual keyboard link (if you use riseup.net for your web-mail).
  3. Use good password practice: you should change your password periodically and use a password which is at least 6 characters and contains a combination of numbers, letters, and symbols. It is better to use a complicated password and write it down then to use a simple password and keep it only in your memory. Studies show that most people use passwords which are easy to guess or to crack, especially if you have some information about the interests of the person. You should never pick a password which is found in the dictionary (the same goes for “love” as well as “10v3” and other common ways of replacing letters with numbers).
  4. Be a privacy freak: don’t tell other people your password. Also, newer operating systems allow you to create multiple logins which keep user settings separate. You should enable this feature, and logout or “lock” the computer when not in use.

Use secure connections!

What are secure connections?

When you check your mail from the riseup.net server, you can use an encrypted connection, which adds a high level of security to all traffic between your computer and riseup.net. Secure connections are enabled for web-mail and for IMAP or POP mail clients. This method is useful for protecting your password and login. If you don’t use a secure connection, then your login and password are sent over the internet in a ‘cleartext’ form which can be easily intercepted. It is obvious why you might not want your password made public, but it may also be important to keep your login private in cases where you do not want your real identity tied to a particular email account.

How do I use secure connections?

In the web browser, if the location starts with https:// then you have a secure connection. Your web browser should also display a little padlock icon either in the location bar or in the bottom corner of the window.

The limits of secure connections

The problem with email is that takes a long and perilous journey. When you send a message, it first travels from your computer to the riseup.net mail server and then is delivered to the recipient’s mail server. Finally, the recipient logs on to check their email and the message is delivered to their computer. Using secure connections only protects your data as it travels from your computer to the the riseup.net servers (and vice versa). It does not make your email any more secure as it travels around the internet from mail server to mail server. To do this, see below.

Use secure email providers

What is StartTLS?

There are many governments and corporations which are sniffing general traffic on the internet. Even if you use a secure connection to check and send your email, the communication between mail servers is almost always insecure and out in the open. Fortunately, there is a solution! StartTLS is a fancy name for a very important idea: StartTLS allows mail servers to talk to each other in a secure way. If you and your friends use only email providers which use StartTLS, then all the mail traffic among you will be encrypted while in transport. If both sender and recipient also use secure connections while talking to the mail servers, then your communications are likely secure over its entire lifetime. We will repeat that because it is important: to gain any benefit from StartTLS, both sender and recipient must be using StartTLS enabled email providers. For mailing lists, the list provider and each and every list subscriber must use StartTLS.

Which email providers use StartTLS?

Currently, these tech collectives are known to use StartTLS:

Naxalrevolution strongly recommend that you and all your friends get email accounts with these tech collectives! Additionally, these email providers often have StartTLS enabled:

  • universities: berkeley.edu, johnhopkins.edu, hampshire.edu, evergreen.edu, ucsc.edu, reed.edu, oberlin.edu, pdx.edu, usc.edu, bc.edu, uoregon.edu, vassar.edu, temple.edu, ucsf.edu, ucdavis.edu, wisc.edu, rutgers.edu, ucr.edu, umb.edu, simmons.edu.
  • organizations: action-mail.org, no-log.org
  • companies: speakeasy.net, easystreet.com, runbox.com, hushmail.com, dreamhost.com, frognet.net, frontbridge.com, freenet.de, blarg.net, greennet (gn.apc.org)

What are the advantages of StartTLS?

This combination of secure email providers and secure connections has many advantages:

  • It is very easy to use! No special software is needed. No special behavior is needed, other than to make sure you are using secure connections.
  • It prevents anyone from creating a map of whom you are communicating with and who is communicating with you (so long as both parties use StartTLS).
  • It ensures that your communication is pretty well protected.
  • It promotes the alternative mail providers which use StartTLS. The goal is to create a healthy ecology of activist providers–which can only happen if people show these providers strong support. Many of these alternative providers also also incorporate many other important security measures such as limited logging and encrypted storage.

What are the limitations of StartTLS?

However, there are some notable limitations:

  • Your computer is a weak link: your computer can be stolen, hacked into, have keylogging software or hardware installed.
  • It is difficult to verify: for a particular message to be secure, both the origin and destination mail providers must use StartTLS (and both the sender and recipient must use encrypted connections). Unfortunately, it is difficult to confirm that all of this happened. For this, you need public key encryption (see below).

Use public-key encryption

If you wish to keep the contents of your email private, and confirm the identity of people who send you email, you should download and install public-key encryption software. This option is only available if you have your own computer. Public-key encryption uses a combination of a private key and a public key. The private key is known only by you, while the public key is distributed far and wide. To send an encrypted message to someone, you encrypt the message with their public key. Only their private key will be able to decrypt your message and read it.

The universal standard for public-key encryption is Pretty Good Privacy (PGP) and GNU Privacy Guard (GPG). GPG is Free Software, while PGP is a proprietary product (although there are many freeware versions available). Both work interchangeably and are available as convenient add-ons to mail clients for Linux, Mac, and Windows. For information configuring your mail client to use public key encryption, see our mail client tutorial pages. In particular, see the tutorials for Apple Mail and Thunderbird. Otherwise, you should refer the to documentation which comes with your particular mail client. Although it provides the highest level of security, public-key encryption is still an adventure to use. To make your journey less scary, we suggest you keep these things in mind:

  • Be in it for the long haul: using public-key encryption takes a commitment to learning a lot of new skills and jargon. The widespread adoption of GPG is a long way off, so it may seem like a lot of work for not much benefit. However, we need early adopters who can help build a critical mass of GPG users.
  • Develop GPG buddies: although most your traffic might not be encrypted, if you find someone else who uses GPG try to make a practice of communicating using only GPG with that person.
  • Look for advocates: people who use GPG usually love to evangelize about it and help others to use it to. Find someone like this who can answer your questions and help you along.

Although you can hide the contents of email with public-key encryption, it does not hide who you are sending mail to and receiving mail from. This means that even with public key encryption there is a lot of personal information which is not secure. Why? Imagine that someone knew nothing of the content of your mail correspondence, but they knew who you sent mail to and received mail from and they knew how often and what the subject line was. This information can provide a picture of your associations, habits, contacts, interests and activities. The only way to keep your list of associations private is to to use an email provider which will establish a secure connection with other email providers. See Use secure email providers, above.

Security resources for activists

April 10, 2007

Security resources for activists

This above posts contains a quick overview of email security. For more in-depth information, check out these websites:

Related links

Electronic Privacy Information Center:

Electronic Frontier Foundation:

American Civil Liberties Union:

Center for Democracy and Technology:

Wikipedia:

News Articles

Related Posts on Naxalrevolution

U.S Air force is funding a project that studies blogs