Slackware :: Securely Browsing The Net � Using SOCKS?
Jan 30, 2011
I read this article:[URL]..(Alien for all packages and howto) but I have some doubts. Let's see if I understand correctly. In practice, we open a port (8888 for example) on the local PC on which you made a ssh tunnel to our server, right? Who resolves the dns? Our remote server? With this technique we are safe even from sending data through unencrypted protocols like hhtp (not https)? An administrator who wants to see what we visited what would see in his log?
View 2 Replies
ADVERTISEMENT
Aug 6, 2010
How can you use swat securely from a securely location?
View 1 Replies
View Related
Jun 19, 2011
I run Slackware 13.1 on a small Pentium 4 box that runs a torrent client, game server, and a few more Internet-related scripts.
I see no point running these stuff with root priviledges, so I have this line in rc.local:
Code:
su user -c "/home/user/services/start-all.sh"
How secure is that command, su user -c? And what would be the right way to go with it?
View 8 Replies
View Related
Oct 17, 2010
I've just installed Slackware 13.1 in two different laptops for first time. I have some strange internet browsing behaviour in one of the laptops. I've installed 2 internet browsers(firefox,opera) using the directions from Slackbuilds.org and there is also konqueror pre-installed. Moreover I installed Wicd network manager.
I can browse some pages e.g. ..... with firefox very slowly but NEVER facebook. I can browse almost any page, even facebook, with OPERA but very very slowly. The same goes with konqueror... Wicd shows that i am always connected with my WPA wireless network
Laptop details:
Quote:
Toshiba sattellite a100-209
//-----------------------------------------------
Processor Intel Celeron M 370 / 1.5 GHz
Databus-Speed 400 MHz
//-----------------------------------------------
Installed RAM 512 MB
Technology DDR2 SDRAM - 533 MHz
[code]....
View 7 Replies
View Related
Feb 18, 2011
I have a Debian Squeeze installed on my old iBook G4 mid 2005. The computer has been giving me hard time and I want to sell it for parts. Before that however I'd like to erase the hard drive securely. Is there a software that this forum recommends for erasing hard drives completely and securely? Is there Linux equivalent for something like DBAN which can be installed on a CD and then boot the computer from it?
View 14 Replies
View Related
Jul 11, 2010
To copy from production to standby over the internet I use a cron job doing rsync -avze 'ssh -p 8022' --exclude-from= ....
My question is: should the cron job run on the production or the standby system. Root access to the remote system is given by a pass phrase-less ssh key. Currently I run rsync on the production system. I guess that it is more secure because the standby needs no ssh login to production. Running rsync on the standby would use less resources on production. I am concerned that in this case there would be pass phrase-less access from standby to production.
View 3 Replies
View Related
Feb 3, 2009
I loaded F10 up on my laptop a few nights back. NetworkManager connects via Ethernet just fine. It will also connect wirelessly, but only when security is disabled. I've been using 128-bit WEP.
When I try to connect using security, this is what appears in the log:
Code:
Jan 29 21:07:17 localhost NetworkManager: <info> Activation (wlan0) Stage 1 of 5 (Device Prepare) complete.
Jan 29 21:07:17 localhost NetworkManager: <info> Activation (wlan0) Stage 2 of 5 (Device Configure) starting...
[Code]......
View 2 Replies
View Related
Aug 28, 2011
I need to send large files from a Linux machine to another using cryptography. The sender machine knows the recipient IP but not vice-versa. I don't need strong cryptography and prefer higher-speed less-secure solutions.
There are no problems with presharing crypto keys but I'd prefer not dealing with SSH users creation.
I think to HTTP PUT over TLS, but I never had experience with it and I prefer to hear which are the possible solutions. I know that it can listen as a daemon but I don't know anything about cryptography. So pipeing with OpenSSL may be a solution.
View 2 Replies
View Related
Jan 25, 2011
How to patch redhat and debian securely ? I mean is there sth like in solaris live upgrade, when after upgrade sth goes wrong I can revert to previous state from before upgrade?
View 4 Replies
View Related
Oct 18, 2010
I have a small network at my office (3 workstations, 1 ubuntu desktop that I'm using as a file server). I'm using a WRT54G2 router for networking and internet connectivity. Here's what I'm trying to accomplish: I want to be able to access my little file server from home, across town. I think ssh might be the best way to go now. What I don't know: How do I set up the ssh server on my machine/network without compromising my network security and the security of my server? Do I just set up port/ip forwarding on my router, install openssh, and that's it?
View 9 Replies
View Related
Mar 22, 2011
I am running Ubuntu Server 10.10. I have installed OpenVPN using this guide I have set up everything correctly as this guide says, but I am having problems with the config file. I want to securely route all traffic on the client to the server, how ever the server will not start. My config is below:
Quote:
#################################################
# Sample OpenVPN 2.0 config file for #
# multi-client server. #
# #
# This file is for the server side #
[Code]......
The servers ip is 10.0.0.65 and I want to assign the clients the ip range of 10.0.0.200 to 10.0.0.20 When I try to start the server I get the message Fail.
View 8 Replies
View Related
Dec 12, 2009
following on from [URL] I was having a little think about how to make this concept more secure. its easy enough to separate known and unknown clients out via MAC address. but that system is easier to break than it is to set up either, sniff out a mac address already connected to the system, and spoof that address.or, more simply, set a static IP on your wifi device, and avoid the redirection completely. so, is anyone aware of a relatively straight forward setup that would allow me to identify clients on my network without relying on MAC address, would more forcefully separate out known and unknown hosts (vlan??). As well as doing so without alerting them to the fact, and without requiring known hosts to do anything special, or install software. Or requiring any more hardware than I have already. (hardware = a debian box with 2 NIC's acting as a gateway between all internal network, and the billion router which handles the outside world not getting in, and a WAP attached to the internal side of the network. also somewhere I have a wifi card that I could attach to the server to replace the AP) I assume some sort of authentication mechanism is required, but I dont know much more past that.
View 2 Replies
View Related
May 26, 2011
I'd like to run a Tor relay, but am trying to understand the security implications. For some time I've run my torrent client in a VirtualBox virtual machine, which is run as a very non-prived user, bridges directly to The Internets, and writes to one directory on the host. My belief is this is about as secure as it can be, but am open to suggestion.If I run a relay in the VM it wouldn't be associated with my use of Tor as a client, which is fine since there is no technical need for them to be connected and it's desirable for security.I read that chroot jails can be broken, particularly when run as root, so I don't really trust that. Also studied a vserver, but it must share the network setup which doesn't strike me as isolated enough.
View 14 Replies
View Related
Jan 15, 2009
I'd like to find a way to mount a windows file share securely (encrypted) as I'll be communicating over the Internet.
View 4 Replies
View Related
Jul 30, 2010
Can't I forward a program window from my laptop to my desktop securely, both running Linux?How to ssh -X an existing window program just like the 'screen' program does?This question came up with my friends when watching an episode of 24! "Almeida send me your screen"
View 1 Replies
View Related
Jan 4, 2011
This one being Ubuntu 9.10 (yes, I know I really should upgrade). I keep a number of confidential files in a TrueCrypt container which is a standalone file in my Documents folder. I'd like to delete some of these, but I want to do it as securely as I can, but I believe if I simply hit 'Delete' with the file selected it'll move the file to the Deleted Items folder. This, I assume, means that the file is taken out of the encrypted volume and stored unencrypted in the Deleted folder.
I've been reading a little about the Shred command, and there seems to be some question about whether it works effectively with a journalled file system; and since I have no idea whether I'm using a journalled file system, or how to find out, I'm treating Shred and other over-writing secure deletion tools as ineffective for now.
With this in mind, can anyone advise me how I can protect the file stored in the TrueCrypt volume, and delete it in place, without taking it out of the encrypted area? And, further to that, can anyone tell me whether in fact the file is actually secured while it's in the encrypted volume? For all I know, just opening the volume may result in copies being made somewhere (apart from RAM).
View 5 Replies
View Related
Jun 27, 2011
My company needs to send sensitive data across to another company, 800gb of .dpx. The way I have thought of is:
E-Sata/1TB WD black.
True-encrypted/ hw accelerated aes (3x machines being built with 2600k)
Sha1sum on each file.
The main goal is to make sure that
1. The files that were transferred off the server onto the drive, are exactly the same.
2. Secure.
3. Fast.
View 9 Replies
View Related
Feb 2, 2009
I am looking for an API in JAVA which gives me functionality to copy a file to remote host in secure manner like (SCP).
View 1 Replies
View Related
Dec 3, 2010
i have a Netbook which is connected to the internet with its wireless card, i have another computer that connect to the Netbook via wired cable (LAN), in order to shre files BTW the computer and still get an internet connection to the bench computer i am using SSH server on hte Netbook, and create a SOCKs (i really don't know that is it exactlly, i just followed up with some tutorial) on the bench and i can get an internet connection on the bench machine via Firefox.
the problem arise when i try to use YUM, as far as i understand it, it does not know about the SOCKs.the masseges that i got from yum are:14: PYCURL ERROR 56 - ""i have tried so far (based on some googleing that i have did):1. type 'export http_proxy='http://localhost:8080"' (8080 is the port i use to create the Dynamic SSH for the SOCKs) in the bench machine.2. in yum.conf i have tried to add a 'proxy=...' line.i have found somthing that i think could help, but i didn't tried it
View 1 Replies
View Related
Jul 6, 2010
I have socks proxy running on port 1080. I want other people on LAN to use this proxy. How can I do that?
One way is that the client can run this command and then use proxy 127.0.0.1:1080 on his computer:
ssh -L 1080:127.0.0.1:1080 myusername@myipaddress
But, I dont want to use ssh because that requires me to give my password to others.
View 2 Replies
View Related
Jan 18, 2010
How can I install SOCKS proxy?
View 2 Replies
View Related
May 8, 2010
Just a general question.
Can Tor be configured as a socks proxy? Would it change the IP even if the user was loading a java applet?
View 1 Replies
View Related
Feb 24, 2010
I have been ssh tunneling, which works great.I can browse the internet by simply tunneling my traffic through my SSH server.the following command: ssh -ND 9999 username at myserver.i cant postlinks.is all I have type, and I can connect to a SOCKS proxy server on localhost:9999.My problem is that I have an application that only supports HTTP proxies.Is there any way I can get it tunneling over the socks proxy?
View 4 Replies
View Related
May 8, 2009
I want to generate my own socks 5 proxy not for lan but for my use on internet I want to access that proxy from any pc and any connection. Like proxy supplied by atomintersoft.com or xroxy.com i want to create my own 300 socks 5 proxy. I can have dedicated server if required to do so.
1)tell me steps to create my own socks5 proxy.What are general system requirement.
2)Which Distro will be best for this purpose.I am new here and dont have idea about linux but can grasp everything faster than u!
View 1 Replies
View Related
Feb 17, 2010
what is the command to sftp from one linux host to another linux host through a SOCKS v5 that requires authentication? I have tried:
Code:
# sftp -o "ProxyCommand netcat -X socks_proxy_host:1080 %h %p" external-server
I know this does not have auth in it but I was going to come to that later
output
Code:
Connecting to external-server...
netcat: invalid option -- 'X'
[code].....
View 7 Replies
View Related
Jul 22, 2010
I have an internet connection through socks4 proxy form a server nearby to my laptop(fedora 12) i need to update and install sofwares. How to configure yum to use the socks proxy?
View 2 Replies
View Related
Jun 3, 2009
I have been installed opensuse 11.1 from CD. I upgrade KDE 4.1.3 to KDE 4.2.4.Problem: tab "Socks" in Network Configuration disappear.ImageShackHow can I return it? Or how can I turn on socks client from konsole? (i need dante client). If I install it - it will not turn on automatically
View 4 Replies
View Related
Apr 30, 2011
I often use an SSH tunnelling on my computer, using a SOCKS proxy.
ssh -D 1234 example.com
However, this only accepts local connections. I would like other systems on my network to be able to use the proxy on my computer as well.
How can I achieve this? If SSH doesn't have an option itself I imagine it might be possible to have a program proxy the proxy on a different port, but I don't know if there are any common tools to do this.
View 2 Replies
View Related
Jun 28, 2011
Is there an easy way, preferably by using the linux terminal, to check if a socks 5 proxy works?
View 1 Replies
View Related
Feb 27, 2011
I have my desktop set up as a SOCKS proxy, and not only me uses it, some friends do too.What I would like to know is how to check every now and again what they are using it for... for example the agreement we have is that they only use it to watch BBC iplayer and 4OD etc while they are abroad. What I dont want is them to pointlessly use it for other browsing.I trust my friends wont, but is there also a way of checking they arent using my connection to download illegal torrents?I guess best case scenrio would be to be able to whitelist only a few sites per user request. Is this possible?
View 1 Replies
View Related