Button Ads!         



                  GrowStoreFinder.com Grow Shop Directory            1-15-2014                              GreenBookPages.com Grow Shop’s Directory Product Reviews 
         Local grow shops and hydroponic store locator with reviews                      
Find Local Hydroponics Shops and Grow Stores.   10-10-14  
Mega Text Ad’s Spaces Available! 
                                                                                   Advertise On All 3 Of Our Marijuana Websites   


  We Update Daily!

Chris S. Kenoyer. Owner
MMJ Patient, Medical Activist,
Online Patients Advocate, 
Online MMJ News Journalist 

My Personal Medical Bio 

Follow Us Now On Twitter


Or Follow Us Now
  On Facebook

        Email Us Here

Or Email Us Securely Here
NEW 100% Encrypted Email Server

OLP’s Free MMJ News EList  
Get The Latest In MMJ News

Press Contact Info

 Is CBD?  A Possible Cure For
Breast Cancer..? And All The Other
Many Forms & Types Of Cancer..?
Learn More About CBD Here


Advertise Here On OnlinePot
Rates As Low As  $50 a Year
24/7 – 365 Days A Year Of Sales! 


Website Navigational Links

Main Start Page 2


Latest Marijuana News Reports


Parody’s Cartoons US 
Government Grown Pot,
Term Papers, School 
Reports, & Thesis’s On  
Marijuana & Cannabis


Amsterdam A to Z


Canadian Marijuana Websites


Church’s & Pot Cannabis


Co-Ops, Clinics, Dispensary’s 


Marijuana Doctors & Clinics 


Pot Cooking Recipes


Drug Testing A To Z


Pot Games


Pot Songs Video’s


100’s Of Grow Guides  


Hash A- Z


Cannabis Legal Info, Drug 
Lawyers, State, Federal Laws, 
State  & Supreme Court Rulings


POW’s Of The MMJ War!


Other Marijuana Websites 
Reciprocal Link Exchange


Medical Marijuana Studies, 
Research Report’s, Medical
Cannabis Clinic Study’s


Parody’s & Cartoons  
When We All Need A Good Laugh!  


Avoiding Online MOM Scammers
Newly Re-Updated Info!


The Politics Of Contraband 
Medical Marijuana In The Mail?


The Hall Of Shame Section
The Online MOM Scammers 


Online MOM Providers Ads


Politicians & Voters Rights


Medical Marijuana, Strains 


The OG  Marijuana Strain Guide


800+ FAQ Growing Questions


Patients Spiritual Guidance,
Free Online Crisis Help Center


Online Marijuana Seed Banks


Maximum Security Section 
      Just Updated!    


Traveling Tips, Guides, B & B’s


Vaporizers A To Z


Online Pot Video’s & Movies


Please Visit Both Of Our Sister Websites!

Maine Patients Coalition.org

The Reefer Madness Teaching Museum.org 

Listen Right Here Online! 
To Original 1930-1950’s
Reefer Madness Propaganda 
Radio Shows And Programs
Before TV There Were 
"Radio Stars"





Legal Disclaimer

Guest Book

Translate Text or Web Page Go To:
Language Tools Google Translations

Article Submissions &  News
Reports Are Always Gladly
Accepted Here.


No part of this site maybe used or
reproduced in whole or in part
without the written consent of the
Copyright Owner

1999-2013 Copyright
© All rights reserved

OnlinePot assumes no legal liability for any products, or information or  
news posted, services offered,  Or
any contests or give away’s offered.



How secure is my Internet connection?

  Added by: snoofer  Last edited by: snoofer  Viewed: 797 times   Rated by 17 users: 5.67/10
Contributed by: /usr/share/bong
Submitted: 03-14-2003

The internet is insecure – don’t put your faith in all this anonymizer/proxy/software crap. To determine about how secure something is, you have to take a lot of considerations:

1.Where are they located?
The US government could trace back what you did (let’s say you made a seed purchase online with a credit card like an idiot). The webserver of the seed place where you made a purchase will probably leave a webserver log that shows the IP address of your anonymous service. All the US government has to do is go to your anonymous service provider and subpoena your user information. Investigating agents get your e-mail address. They go to your ISP and under the United States Patriot Act, they can get your user information.

2. What kind of encryption technology do they offer?
The new version of OpenSSL (a popular SSL library) has been proven to be susceptible to a “timing” attack where a user could possibly snoop on the data that goes between a SSL session.

3. How secure is your home computer?
Even if you can get an encrypted overseas Anonymizer service (offers the greatest protection), there are ways for the Man to get around this. The FBI recently captured the PGP keyphrase of a Mafia guy by putting a keystroke logger on the guy’s computer. It is very possible if you have a large ISP for them to capture all the traffic between your computer and the Internet.

Internet structure
Traceroute counts the hops between you and your destination (and all the web servers inbetween) on the Internet. Go to
http://www.washington.edu/networking/tools/traceroute to see a web-based version of traceroute.

I want to trace the route from that website, as mentioned above, to overgrow.com

1 zinc-V13.cac.washington.edu ( 1 ms 1 ms 1 ms
2 uwbr2-GE2-0.cac.washington.edu ( 0 ms 0 ms 1 ms
3 prs1-wes-ge-0-0-0-0.pnw-gigapop.net ( 1 ms 1 ms 1 ms
4 Peer1-PWAVE.pnw-gigapop.net ( 1 ms 1 ms 1 ms
5 OC12POS3-0.van-gsr-a.peer1.net ( 4 ms 10 ms 10 ms
6 r2-72-fe1-1-core-van.netnation.com ( 11 ms 10 ms 10 ms
7 ip2.overgrow.com ( 5 ms 5 ms 5 ms

As you can see, there are 5 routers/servers/hubs where LEO could possibly intercept my internet traffic. 5 possible people to pressure with a subpeona.

NOTE: for each person, a trace route will be different. one of the nicest things about the Internet is that it finds the fastest pipe available.

Packet Sniffing
Packet sniffing is the ability to grab packets of information over the network. It can be compared to a “network wire tap”. Packet sniffers capture binary data passing through the network, most decent sniffers (usually found on the Unix/Linux platforms for free) decode this data into a readable form for a system administrator. To make it even easier, another step can occur – known as “protocol analysis”. There is a varying degree analysis that takes place, some are simple, just breaking down the “packet” information. Others are more complex, giving “detailed” information about what it sees on the packet (i.e., highlights a password for a service).

How can I prevent my packets from being sniffed?
Many services on the Internet send data in plain-text. By default, POP mail, SMTP (for sending mail) send data in clear-text. The same applies for FTP, Telnet and News clients. ICQ, IRC, MSN and AOL Instant messengers send passwords in clear-text. In fact most services send passwords this way.

Start encrypting that password data! Many mail services offer encrypted logins. Ask your system administrator about secure mail. If you login securely, your data is still sent in clear-text. Install PGP from www.pgpi.org and send your e-mail securely. Also, try and login via SSL when you are making transactions via the Internet

(Note: always look for https in the location bar of your web browser, like http://www.example.com, or a lock at the bottom of your web browser).

A free packet sniffer: Ethereal
Find Ethereal at: http://www.ethereal.com/distribution/win32

Ethereal is a free network protocol analyzer for Unix
and Windows. It allows you to examine data from a live network
or from a capture file on disk. You can interactively browse the
capture data, viewing summary and detail information for each packet. Ethereal has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session.

I’m going to sniff a session between a web browser and a website. This is a common procedure in tracking down an individual’s Internet usage. In this example, we are a system administrator snooping on an employee. We believe he is abusing his privileges of Internet usage and violating our rules that say that no employee shall be in a chatroom.

We click “Capture”. The Capture options come up. Everything that is chosen will work, only change things if you know what you are doing. We captured a 2 minute session where a user

In this screen shot, we can see that, the machine we are monitoring, made a DNS query for the name slashdot.org, which is normal with web browsing (Packet #1). In Packet #6, we can see made a HTTP request to, which proves that a user on the machine is viewing slashdot.org, which is in violation of our Internet usage policy.

In this screen shot, we can see that, the machine we are still monitoring,requested an image over HTTP, which shows he is actively browsing the Internet.

In this screen shot, we can see that made a DNS query for chat-place.org and has viewed their webpage over HTTP. was communicating to our machine over the IRC protocol to port 6667 — which shows our employee is chatting online on our company’s time.

The Internet is a very complicated place. Internet security shouldn’t be a band-aid. If the man wants to get you, proxies, programs, and anonymizers will not save you.

  Last modified: 19:58 – Apr 18, 2003  
Quicklink:  http://overgrow.com/growfaq/1481
GrowFAQ © 2000-2004 Overgrow
faq:1481 “How secure is my Internet connection?”