Personal > Blogs

Personal blogs.

<1234567...59>
No user evaluation yet
__///////\ -cDc- CULT OF THE DEAD COW -cDc- /\\\\\\\__
\\\\\\\/ Everything You Need Since 1986 \///////
___ _ _ ___ _ _ ___ _ _ ___ _ _ ___
|___heal_the_sick___raise_the_dead___cleanse_the_lepers___cast_out_demons___|

First of all, if you think that this is another one of those macho
self-defense karate martial art articles which will teach you how to kick butt
like Bruce Lee in only 10 minutes (or however long it takes you to read this),
then you have another thing coming.

Let me explain right off the bat that I have no intention of teaching you
how to defend yourself in the event that you are actually in the situation of
being:
You need to login to report a site Details
Last check 2017-11-21 04:05 UTC Online (1 sec)
No user evaluation yet
A little bit about me: I am a Spiritual Satanist and have been for about two years now. This board will mainly be for people who are interested in and want to learn about Satanism. Opposing views are always welcome. What fun would it be if it were purely a circle jerk? Right.
You need to login to report a site Details
Last check 2017-12-19 09:50 UTC Online (1 sec)
No user evaluation yet
You need to login to report a site Details
Last check 2017-12-01 12:10 UTC Online (2 sec)
No user evaluation yet
Windows
TrueCrypt

WARNING: As of 28 May 2014, TrueCrypt is no longer maintained by its developers, which might have security implications. However, TrueCrypt version 7.1a is generally still considered safe. [1]

Step 1: Get TrueCrypt
Step 2: Install TrueCrypt
Step 3: In Truecrypt select the “Create Volume” option
Step 4: Follow the instructions of the "TrueCrypt Volume Creation Wizard"
Step 5: Select a drive letter in the main TrueCrypt window
Step 6: Select your TrueCrypt container or drive using the "Select File..." and "Select Device..." button
Step 7: Click the "Mount" button and enter your password. A new drive will now pop up in "My Computer"
Step 8: Store your sensitive files on that drive
Step 9: Click the "Unmount" button to unmount the drive

For additional security, encrypt your bootdrive with TrueCrypt.
You need to login to report a site Details
Last check 2017-12-22 17:05 UTC Online (2 sec)
No user evaluation yet
Firefox and SELinux

Update: it seems that updating the confined version of Firefox doesn't work. To work around this, temporarily disable SELinux before updating. Once the update process finished, you'll need to reset the file contexts on the files by running the command "restorecon -F -R -v ~/firefox-strict". Without doing this, Firefox will run unconfined after the update!

This guide has been written to help people out there creating a safe Firefox installation which is only allowed to browse through Tor. This means no other network traffic (eg. DNS requests, direct HTTP or FTP requests) is permitted to be sent from the process preventing any kind of data leakage possible by abusing the process (eg. memory leaks, buffer overflows, bugs in the code etc). This greatly increases the protection of your anonymity as it prevents all attempts to send your real IP address and other sensitive data to 3rd parties (like in the case of the recent FH attack where IP and MAC addresses and hostnames have been sent to a clearnet server).

Note that if you dedicated your system to the risky or illegal activities you do (eg. you use a VM inside your normal system or have a dual-boot setup), a better way to defend yourself is to simply block all outbound connections using a firewall and then configure your system to use the SOCKS proxy of Tor to connect to HTTP hosts on the internet. Otherwise, if you share your system between different activities and use a RHEL-based Linux distribution, you may follow this guide to make your browsing sessions more secure.

First of all, SELinux is a pretty hard-to-understand thing, so I won't go into technical details too much. Basically, think about SELinux as an additional security layer on top of the usual POSIX rights set on files, directories and other filesystem objects. POSIX rights are provided to grant read/write/execute/browse privileges for the owner user, the owner group and "everybody else" which means anyone having a user account on the system. SELinux extends this security scheme by creating application domains which are strictly separated from each other, applications from different domains cannot access each other's resources. All processes run in their confined security contexts (domains) which ensures they only have access to resources they really need access to.

To strengthen the security of the browser, I created a policy package for firefox which permits only connections to the SOCKS proxy of Tor. The steps below describe how to install and use the package:
You need to login to report a site Details
Last check 2017-12-22 17:10 UTC Online (2 sec)
No user evaluation yet
Political news, random, and discussion.
You need to login to report a site Details
Last check 2017-12-19 09:25 UTC Online (2 sec)
No user evaluation yet
Pagina info
You need to login to report a site Details
Last check 2017-11-16 06:50 UTC Online (3 sec)
No user evaluation yet
▄▄▄▄▄▄▄▄▄
██████▄▄█▓▓██████████████████▓▓▓██▓▄▄███ > Intro █ █
█████████▓▓██████████████████▓▓▓██▓███▓█ > MIT/EDU ▀▀▀█ █▀▀
███▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀█▓█ > Linode █ █
█▓█ ███▀▀▀▀▀███▀██▀▀█▀▀██▀██▀▀▀▀▀███ █▓█ > Nmap █ █▄▄▄▄▄▄▄▄▄
███ ██ ▄▀ ▀▄ ██ █▓▓ ███ █ ▄▀ ▀▄ ▓▓ █▓█ > Sucuri ▀▀▀▀█ █
█▓█ ▓▓ ▀▄ ▄▀ ██ █▓▓ ███ █ ▀▄ ▄▀ ██ █▓█ > NIST NVD █ █▀█ █
█▓█ ███▄▄▄▄▄███▄██▄▄█▄▄██▄██▄▄▄▄▄███ ███ > Wireshark █ █▄█ █
█▓█ ________________________________ █▓█ > Art █ █▄▄▄▄▄▄
█▓█ HTP____________________MWTB_DLTR ███ > Zerodays ▀▀▀▀▀▀▀█ █
██████▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀██████ > Outro █ █▀▀▀▀
█▓▓██ █▀▀████████████████████▀▀█ ██▓▓█ > See reverse for █ █▄▄▄▄
████ ████████████████████▓▓██████ ████ > HTP4 █ █
▀▀▀▀▀▀▀▀
You need to login to report a site Details
Last check 2017-11-21 04:10 UTC Online (3 sec)
No user evaluation yet
Programming Languages, Martials Arts and Computers. The Weblog of Chris Double.
You need to login to report a site Details
Last check 2017-11-22 02:35 UTC Online (3 sec)
No user evaluation yet
My name is Boris Nagaev. I live in Moscow, Russia. I program in C++, Lua and other. I use nickname starius. My current position is PhD student and Electronic engineer at Faculty of Bioengineering and Bioinformatics of Lomonosov Moscow State University, where I do science, programming, teaching, Linux and Windows administration.
You need to login to report a site Details
Last check 2017-12-06 15:20 UTC Online (3 sec)
<1234567...59>