We Update Daily!
Custom Search
Chris S. Kenoyer. Owner MMJ Patient, Medical Activist, Online Patients Advocate, Online MMJ News Journalist
My Personal Medical Bio
Follow Us Now On Twitter @MedicalMMJMan
Or Follow Us Now On Facebook
Email Us Here olpwebs@yahoo.com
Or Email Us Securely Here MedicalMMJMan@countermail.com NEW 100% Encrypted Email Server
OLP’s Free MMJ News EList Get The Latest In MMJ News
Press Contact Info
Is CBD? A Possible Cure For Breast Cancer..? And All The Other Many Forms & Types Of Cancer..? Learn More About CBD Here
***************************
Advertise Here On OnlinePot Rates As Low As $50 a Year 24/7 – 365 Days A Year Of Sales!
***********************************
Website Navigational Links
Main Start Page 2
**************************
Latest Marijuana News Reports
*********************************
Parody’s Cartoons US Government Grown Pot, Term Papers, School Reports, & Thesis’s On Marijuana & Cannabis *********************************
Amsterdam A to Z ********************************
Canadian Marijuana Websites *******************************
Church’s & Pot Cannabis
*****************************
Co-Ops, Clinics, Dispensary’s *****************************
Marijuana Doctors & Clinics ****************************
Pot Cooking Recipes ****************************
Drug Testing A To Z ***************************
Pot Games
****************************
Pot Songs Video’s ****************************
100’s Of Grow Guides ***************************
Hash A- Z
***************************
Cannabis Legal Info, Drug Lawyers, State, Federal Laws, State & Supreme Court Rulings **********************
POW’s Of The MMJ War!
*****************************
Other Marijuana Websites Reciprocal Link Exchange ****************************
Medical Marijuana Studies, Research Report’s, Medical Cannabis Clinic Study’s ****************************
Parody’s & Cartoons When We All Need A Good Laugh!
****************************
Avoiding Online MOM Scammers Newly Re-Updated Info! *****************************
The Politics Of Contraband Medical Marijuana In The Mail? ******************************
The Hall Of Shame Section The Online MOM Scammers *****************************
Online MOM Providers Ads ****************************
Politicians & Voters Rights ****************************
Medical Marijuana, Strains ****************************
The OG Marijuana Strain Guide ****************************
800+ FAQ Growing Questions ****************************
Patients Spiritual Guidance, Free Online Crisis Help Center ****************************
Online Marijuana Seed Banks ****************************
Maximum Security Section Just Updated! *****************************
Traveling Tips, Guides, B & B’s ****************************
Vaporizers A To Z *****************************
Online Pot Video’s & Movies **********************************************
Please Visit Both Of Our Sister Websites!
Maine Patients Coalition.org
The Reefer Madness Teaching Museum.org
Listen Right Here Online! To Original 1930-1950’s Reefer Madness Propaganda Radio Shows And Programs Before TV There Were "Radio Stars"
*********************************
Legal Disclaimer
Guest Book
Translate Text or Web Page Go To: Language Tools Google Translations
Article Submissions & News Reports Are Always Gladly Accepted Here.
No part of this site maybe used or reproduced in whole or in part without the written consent of the Copyright Owner www.onlinepot.org
OLP ENTERPRISES LLC 1999-2013 Copyright © All rights reserved
OnlinePot assumes no legal liability for any products, or information or news posted, services offered, Or any contests or give away’s offered.
|
|
How secure is my Internet connection?
Added by: snoofer Last edited by: snoofer Viewed: 797 times |
Rated by 17 users: 5.67/10 |
Contributed by: /usr/share/bong Submitted: 03-14-2003
Anonymizers The internet is insecure – don’t put your faith in all this anonymizer/proxy/software crap. To determine about how secure something is, you have to take a lot of considerations:
1.Where are they located? The US government could trace back what you did (let’s say you made a seed purchase online with a credit card like an idiot). The webserver of the seed place where you made a purchase will probably leave a webserver log that shows the IP address of your anonymous service. All the US government has to do is go to your anonymous service provider and subpoena your user information. Investigating agents get your e-mail address. They go to your ISP and under the United States Patriot Act, they can get your user information.
2. What kind of encryption technology do they offer? The new version of OpenSSL (a popular SSL library) has been proven to be susceptible to a “timing” attack where a user could possibly snoop on the data that goes between a SSL session.
3. How secure is your home computer? Even if you can get an encrypted overseas Anonymizer service (offers the greatest protection), there are ways for the Man to get around this. The FBI recently captured the PGP keyphrase of a Mafia guy by putting a keystroke logger on the guy’s computer. It is very possible if you have a large ISP for them to capture all the traffic between your computer and the Internet.
Internet structure Traceroute counts the hops between you and your destination (and all the web servers inbetween) on the Internet. Go to http://www.washington.edu/networking/tools/traceroute to see a web-based version of traceroute.
Example: I want to trace the route from that website, as mentioned above, to overgrow.com
1 zinc-V13.cac.washington.edu (140.142.3.33) 1 ms 1 ms 1 ms 2 uwbr2-GE2-0.cac.washington.edu (140.142.153.24) 0 ms 0 ms 1 ms 3 prs1-wes-ge-0-0-0-0.pnw-gigapop.net (198.107.150.30) 1 ms 1 ms 1 ms 4 Peer1-PWAVE.pnw-gigapop.net (198.32.170.49) 1 ms 1 ms 1 ms 5 OC12POS3-0.van-gsr-a.peer1.net (64.69.67.157) 4 ms 10 ms 10 ms 6 r2-72-fe1-1-core-van.netnation.com (64.69.67.214) 11 ms 10 ms 10 ms 7 ip2.overgrow.com (64.40.108.190) 5 ms 5 ms 5 ms
As you can see, there are 5 routers/servers/hubs where LEO could possibly intercept my internet traffic. 5 possible people to pressure with a subpeona.
NOTE: for each person, a trace route will be different. one of the nicest things about the Internet is that it finds the fastest pipe available.
Packet Sniffing Packet sniffing is the ability to grab packets of information over the network. It can be compared to a “network wire tap”. Packet sniffers capture binary data passing through the network, most decent sniffers (usually found on the Unix/Linux platforms for free) decode this data into a readable form for a system administrator. To make it even easier, another step can occur – known as “protocol analysis”. There is a varying degree analysis that takes place, some are simple, just breaking down the “packet” information. Others are more complex, giving “detailed” information about what it sees on the packet (i.e., highlights a password for a service).
How can I prevent my packets from being sniffed? Many services on the Internet send data in plain-text. By default, POP mail, SMTP (for sending mail) send data in clear-text. The same applies for FTP, Telnet and News clients. ICQ, IRC, MSN and AOL Instant messengers send passwords in clear-text. In fact most services send passwords this way.
Start encrypting that password data! Many mail services offer encrypted logins. Ask your system administrator about secure mail. If you login securely, your data is still sent in clear-text. Install PGP from www.pgpi.org and send your e-mail securely. Also, try and login via SSL when you are making transactions via the Internet
(Note: always look for https in the location bar of your web browser, like http://www.example.com, or a lock at the bottom of your web browser).
A free packet sniffer: Ethereal Find Ethereal at: http://www.ethereal.com/distribution/win32
Ethereal is a free network protocol analyzer for Unix and Windows. It allows you to examine data from a live network or from a capture file on disk. You can interactively browse the capture data, viewing summary and detail information for each packet. Ethereal has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session.
I’m going to sniff a session between a web browser and a website. This is a common procedure in tracking down an individual’s Internet usage. In this example, we are a system administrator snooping on an employee. We believe he is abusing his privileges of Internet usage and violating our rules that say that no employee shall be in a chatroom.
We click “Capture”. The Capture options come up. Everything that is chosen will work, only change things if you know what you are doing. We captured a 2 minute session where a user
In this screen shot, we can see that 192.168.0.101, the machine we are monitoring, made a DNS query for the name slashdot.org, which is normal with web browsing (Packet #1). In Packet #6, we can see 192.168.0.101 made a HTTP request to 66.35.250.150, which proves that a user on the machine 192.168.0.101 is viewing slashdot.org, which is in violation of our Internet usage policy.
In this screen shot, we can see that 192.168.0.101, the machine we are still monitoring,requested an image over HTTP, which shows he is actively browsing the Internet.
In this screen shot, we can see that 192.168.0.101 made a DNS query for chat-place.org and has viewed their webpage over HTTP.
216.152.64.213 was communicating to our 192.168.0.101 machine over the IRC protocol to port 6667 — which shows our employee is chatting online on our company’s time.
Conclusion: The Internet is a very complicated place. Internet security shouldn’t be a band-aid. If the man wants to get you, proxies, programs, and anonymizers will not save you.
|
Last modified: 19:58 – Apr 18, 2003 |
|
|
Quicklink: http://overgrow.com/growfaq/1481 GrowFAQ © 2000-2004 Overgrow faq:1481 “How secure is my Internet connection?” |
|
|
|