Networking :: Security And Privacy Benefits To P2P?
Oct 22, 2010
Has anyone worked in building p2p apps and protocols? I'm talking an actual p2p network of physical devices that is strictly p2p, no servers for most things. Are there security and privacy benefits to p2p? How are addresses handled, like say you want to send a message to a specific friend but you don't have the relatively static IP system in the Internet. How are those things handled?
View 1 Replies
ADVERTISEMENT
Jul 15, 2009
I stumbled across this privacy app today, it's sort of like a CCleaner for Linux. I only see one mention of it in the forums, and I'm wondering why nobody's using it. It seems to be pretty thorough and preforms as they advertise, the site says it has overwrite capability but I'm not sure what algorithm it's using, as I haven't looked at the code. Anyway seems like something that ought to be in the repos.[URL]...
View 14 Replies
View Related
May 23, 2010
I have two Ubuntu PCs at home and I found out about apt-cacher as a means of reducing internet usage for updates. (my connection speeds aren't that good). When I install apt-cacher, is it possible for anyone on the internet to use my PC as a repository? If so, how can I allow only computers on my LAN to access the apt-cacher cache?
View 9 Replies
View Related
Jan 8, 2010
These files seem to contain browsing history:
~/.mozilla/firefox/xxxxx.default/cookies.sqlite ~/.mozilla/firefox/xxxxx.default/formhistory.sqlite ~/.mozilla/firefox/xxxxx.default/downloads.sqlite ~/.mozilla/firefox/xxxxx.default/places.sqlite ~/.mozilla/firefox/xxxxx.default/places.sqlite-journal
~/.mozilla/firefox/xxxxx.default/Cache/
Therefore I have cleared these files using an erasing program. I am wondering if there are other locations where such log files are stored for Internet browsing. I have looked in the /var/log directory and cannot see anything - for example doing a grep on http:// after browsing in Firefox does not reveal anything obvious.
View 6 Replies
View Related
Jun 16, 2010
I have LTS 10.04 with firefox 3.63 and the cookie settings are not there. Does anyone else have missing privacy settings. I dont like the idea of tracking cookies and want to do what I can to get rid of them.
View 1 Replies
View Related
Oct 16, 2010
I just have a simple BIOS password when I boot into my machine. Should I also have the standard login password as well? In other words, what benefit does the login at the boot up, (after BIOS) really give and would you recommend a good or better security process?
View 2 Replies
View Related
Jun 12, 2010
Intrepid Ibex (U8.10) is what I am using presently and I would like to know if there are measures that I can take to prevent my ISP from keeping data that flows between my PC and it.
I am living in Australia, I am wanting to keep the bastards (read: Australian Government) ignorant about what I use my PC for.
Its them storing any of my personal information that I am worried about, but if I can keep my history from them completely, even better...
View 9 Replies
View Related
Dec 2, 2010
A US ISP's "privacy" policy basically states that they will collect any and all of your data (email, posts, surfing etc ) and then "share" it". direct me to a "checklist" which can suggest counter measures for non-geeks? How can we function if we cant trust our ISP? Are there some specific 'tricks' in Ubutu to foil rogue ISPs? If yes, it would be a great 'selling point', especially for professionals concerned that rogue ISPs could "share" their intellectual property.
View 9 Replies
View Related
Mar 21, 2010
I just put privacy remix on a usb drive. It seems to be working ok, but no internet.
I'm connecting to the router with an ethernet cable and it works ok in windows.
I can't find anything in the setup guide that says you have to do anything special to connect.
View 4 Replies
View Related
May 14, 2011
I was asking around in some IRC channels earlier trying to develop some thoughts on how NFS is better than CIFS. I set up a FreeNAS file server, and that's where all of my data now resides on a pair of raided drives. That way my main desktop, which is kind of a power hog gaming rig, can be powered off since I pretty much live on my laptop now. Anyway, I began to tinker with CIFS and NFS. Since some family members in the household use Windows, I definitely need CIFS. But I wanted to bounce back to NFS too and check it out.
While I do think it's nice I don't have to worry about authentication to the NAS box when using NFS, it's still a little scary. Being that it's more of a trust method instead of actual authentication, truthfully all a user needs to get into your data is the path to your NFS share and a matching UID. I mean, am I wrong by saying this? Sure, it may seem like NFS is convenient, but this angle of it is a little scary. I just don't feel like that screams "secure."
On the flip side, you have CIFS, which uses a user authentication level. So I hit my little shortcut to my NAS and it asks me who I am. I log in and bam, I have connection. I can browse other folders on the share, etc. This is convenient because I do have a "public" share on here with a generic user. That way if friends come over and want to transfer something to me, I have them drop it in the public share and I later transfer it accordingly. Since there is a user level authentication, this to me seems a little more secure.
Speed wise I was a little concerned, as some users have said NFS is faster than CIFS. Well, they might be right. But I did a few bench tests here on my laptop, using the same exact share except one with CIFS one with NFS. I stayed in the exact same location and transferred the same 300mb file in each instance.
NFS - 1.7mb/s
CIFS - 1.5/mb/s
Not exactly enough to warrant a huge argument over, so I leave that argument along the road to be forgot about since it doesn't really have any bearing on this situation. I like things about both NFS and CIFS. I just want to know why is it "not optimal" to use a full blown CIFS setup even if you're using 100% Linux systems.
View 4 Replies
View Related
Jan 6, 2010
Right now we are running a gigabit network with unmanagead switches. What do i gain performance wise and capability wise with moving to smart and managed and do these benefits make the cost worth it?
View 1 Replies
View Related
Jan 5, 2010
I remember that one complaint about XP was the way that when you used Firefox or IE index.dat files were created which were violations of privacy.
If, after browsing, one deletes the relevant firefox files are there any other locations or logs in Ubuntu that record details or times of browsing?
Currently these files seem to contain browsing history:
I have looked in the /var/log directory and cannot see anything but perhaps other people know?
I just want to know if and where browsing activity is located (apart from in the /user/.mozilla directory).
View 3 Replies
View Related
Jun 8, 2011
What are the benefits to upgrading to F15 from F14 if any? Has there been some huge step forward in performance, security or some other reason that makes it worth while to upgrade? I know many people make the move simply because they wish to have the latest and greatest, but is there any reason specifically to upgrade to the latest and greatest?
View 14 Replies
View Related
Feb 10, 2010
What are the benefits of wiping out windows and have your system running on linux only?
View 9 Replies
View Related
Nov 5, 2010
I've found plenty of how to's and information on setting up a DNS Server, but what I can't find is how it would benefit me? So, that's just what I'm asking here. How would having my own DNS Server benefit me?
View 1 Replies
View Related
Jun 14, 2010
I have to investigate the technical benefits of using RHEL 5.5 instead of Fedora 8 on our servers. So any specific reasons with proper justification?
View 4 Replies
View Related
Apr 21, 2011
I am confused with the concept of Kerberos and LDAP SSL. I am in the midst of integrating my Unix box with the Active Directory hence the use of PAM_LDAP method. I understand that since it's non-secure transmission hence We use Kerberos to authenticate. If we already used kerberos to authenticate i.e. it means that the username/password is not transmitted in clear text. Why we still need LDAP SSL? What is the benefit?
View 3 Replies
View Related
Jul 19, 2011
What are the benefits of a smaller specialized kernel? I know it will have a smaller memory footprint but will it actually affect performance in user-space at all?
View 3 Replies
View Related
May 20, 2010
I can not find a way of removing original email addresses from a email I wish to forward so I can maintain the privacy of the original sender.
View 3 Replies
View Related
Nov 28, 2010
Just for the fun and learning experience I am working on a minimal install with Squeeze +IceWM. The goal is to make a livecd with a set of privacy apps - like Iceweasel with Tor/privoxy and some encryption tools. Everything is working out just fine, but I thought it would be very nice to have an installer. I read about the refractainstaller and refractasnapshot in this post, and thought they sound like a good solution: viewtopic.php?f=19&t=54635#p315738 However, the links seem to be dead and so were all the mirrors I tried. Does anyone know where these files can be found or any other easy way I can make Debian installable from a livecd?
View 14 Replies
View Related
Apr 3, 2010
I have set up UEC and have installed the store images. I have seen that we can create and run instances which are similar to virtual machines. We can utilize virtualization and create virtual machines and thereby fully utilize the server. Not sure what extra benefits or features can be achieved using cloud (say UEC). I suppose I am missing something. Kindly let me know how cloud adds more value than server virtualization.
View 1 Replies
View Related
Jul 21, 2011
Since I have never had the need to create one, the first time I encounterd it I asked myself: what is it?I was looking for MySql installation guidelines on mysql.com, when, reading them, I found this command:shell> useradd -r -g mysql mysql.Now, I read the man page of useradd looking for explanation about -r option, but I didn't found it useful.It just says that -r options creates a System account, but it doesn't say anything else.So my question is: what is a system account? Few lines under the command it says:"Because the user is required only for ownership purposes, not login purposes, the useradd command uses the -r option to create a user that does not have login permissions to your server host."What would be the benefits if mysql user has not login permission?
View 6 Replies
View Related
May 1, 2010
I've searched lot on forums but couldn't find a related post. My problem is I want to hide my mail folders when login attempt in Evolution has failed. I dont use Remember password option so everytime I'm prompted for password.
When I give no password and escape that dialog, I can see all the mails that have been already downloaded form my gmail account. If any of you guys know already existing post, please redirect me to that one.
View 2 Replies
View Related
Sep 24, 2010
Firefox used to work fine, then I played around (only) with privacy settings, and now it deletes all cookies (including ones set to expire in a month) at the end of the session.It is set to "remember history". Moving to a new profile is not an option.
View 3 Replies
View Related
Dec 21, 2010
I am rebuilding a bunch of servers and want to do it right. They are Dell R200s and R300s with on-board LSI SAS1068E SCSI controllers with 2 SATA drives. The only RAID level supported on these cards is RAID 1. So, to the server, we have 148GB of space to deal with. They currently run 32-bit Ubuntu 8.10; I will be installing x64 Ubuntu 10.04.
I have always seen that it is best practice to partition in such a way that /boot, /var/log, /temp, and /home for example are separated out from /. Usually this is on a RAID5 or higher box. Is there any benefit to doing that sort of thing on a RAID1 box? I realize that this is in some ways a matter of opinion, but I would like the opinion of folks with experience. I'm pretty new to Linux in general.
The main services running on these boxes are Apache2, Tomcat6, MySQL, and Java.
View 2 Replies
View Related
Jun 7, 2010
I have a Windows and a Linux machine.In Windows, everytime I visit a site, a lot of cache/history files are created on my machine. I setup my Firefox to don't save anything.but Windows saves a lot of "temp" files, some filenames I opened for example are inserted in registry (like video names). Each video I open in VLC is shown in "Last shown videos". In windows, all files opened can be found at "Recent opened files" as well.
A lot of these privacy configurations can be tweaked (VLC and "Recent opened files" in Windows) - it's a PITA doing it individually, but it's possible - but there isn't a guide to these "internal" privacy traces that are left on Windows installation (inserted in registry for example) In Linux, I just know there are these problems in app level (like VLC), and in "system level "(like bash_history).
is there a complete guide to avoid undesirable traces of what I did/watch/used in my Windows machine? (Delete everytime the PC is restarted, or even avoiding recording these info at all). (I'm mainly interested in config made by Windows itself when installing software and writing to registry. A guide with configuration guides to different types of software is a bonus, I know it's impossible to have a complete guide for it).I'm not interested in a VM machine, since I want to be able do control these issues in my own host and understand the privacy risks involved.
View 6 Replies
View Related
Jul 2, 2011
I notice that a lot of you speak of running a 100% KDE setup for your personal computers. What are the advantages of this?
I see the major disadvantage to be that I wouldn't be able to just run what I want when I want. I don't see how much else could out weigh such a thing either.
I assume stability and compatibility and system resources are all very good reasons against it possibly. But really, at this stage in the game, with the speed of computers why not? Plus I haven't noticed too many, if any compatibility issues, it's all the same kernel right?
View 14 Replies
View Related
Aug 3, 2009
Problem that may require several tools available on Fedora. I don't know if its possible or not.
Given: Surveillance video box based on Fedora & Zoneminder. Internet connection is via a private 10.x.x.x network connection to the local phone company/ISP. That's the only connection available and they are the only ISP in the area. The ISP uses NAT to ultimately provide a routeable IP address, but that only works on outbound initiated traffic.
Problem: How can someone out on the Internet hit this box? i.e Is there any way to rig a method that will ultimately allow a connection initiated from the Internet to see the surveillance video that this box has stored via an http session?
I thought of one idea but don't have the tools to implement it. User sends an email to a server out on the Net somewhere. Surveillance box retrieves mail ever minute. The mail contains the users IP address. Surveillance box sends an outbound packet to that IP address to get NAT functional. The users box then uses that address to hit the box on the private network. The snag with this is that NAT is specific to ports, and I have no sway over the ISP's NAT capability.
Is there any way to push an http session outbound to the waiting end user? i.e. initiate a push of http traffic from the private box to the end user?
View 5 Replies
View Related
Sep 1, 2011
I have server ubuntu natty 11.04-64 bit, Yesterday, I Think I had been hacked by someone..
How to create report to see log for brute force attack?
I have some port opened 80, 53(bind9), SSH(22), Port Squid & some port java
I am Also worried that Guy is create other username for login
How to check that?
Is it possible to recovery HISTORY at ubuntu..?
View 3 Replies
View Related
Feb 5, 2011
I've wanted to learn networking and security for a while and after speaking with several people I realized that building my own network is the best way to go. I'm pursuing computer security as a hobby and a future career and I'm keeping things on the legal side. So with that stated I was wondering how you all think I should walk down this path.
What ebooks or printed books should I consider reading? Should I buy 1 or maybe 2 computers to go along side my laptop? What type of specs should they have (processor, memory, hd space). I'm on a budget and am simply looking to learn networking and security. Should I install ubuntu on all my machines or is there another distro of linux that's free, easy to install, and security centered? One last question, (and it's a newbie question) why would one want to learn networking and security on a windows machine. I know there's money to be made on installing and managing windows networks, but can't a person connect to windows machine from linux and practice hacking or other securtiy related activities including simply transfering files?
View 1 Replies
View Related