Safe web surfing. How to make surfing the web safe. Why is all this

💖 Do you like it? Share the link with your friends

Golden September has arrived, it has become easier to breathe, and I am with you again, dear friends. Today we will not break stereotypes, but will talk about everyday life, about the life of a webmaster and surfing the net safely. It often happens that life dictates its own laws, and a webmaster, by chance, finds himself in a situation where he needs to take care of his own safety and safe surfing on the Internet.

Figuratively speaking, I am a bit of a fatalist, and fate can sometimes present unexpected surprises. The Internet is becoming more and more controlled, people are becoming more and more stupid and at the very beginning of their journey they make mistakes for which they later have to repent and tear their hair out. So, here's my introductory post on surfing the web safely.

The special attention paid to the Internet by various regulatory authorities recently is due to the passion of the country's main blogger. Remember, under Yeltsin, all officials enthusiastically followed tennis, under Putin they dreamed of doing judo, but under Medvedev they occupied Twitter, and now they are scratching their left egg instead of engaging in important government affairs. But, you need to be on the crest of the wave, and that’s why law enforcement agencies found pasture on the Internet. If you read the news, you probably know that the guys there successfully catch “extremists”, earning ranks and titles, shoulder straps and stars. I really hope that next spring the main blogger will leave where he came from, and all of our great and mighty people will start practicing judo again. It’s good for your health and will make you feel calmer on the Internet.

You may ask me, why should an ordinary user need encryption? There is really no need for a simple user to encrypt. There is no need for the average person who reads the news to be encrypted, a housewife hanging out on women's forums has no need to be encrypted, and there is no need for a blogger who leads his own hamster about a healthy lifestyle, whose income is enough for a beer, to be encrypted. But, as I wrote above, man proposes, but God disposes, and very often the villainous fate presents unexpected tricks. I have heard, and even seen with my own eyes, how people suddenly find themselves in a niche that they did not plan to find themselves in. This can include both politics and politics, and the same niche can also include various cunts who use their language on social networks and on various thematic portals.

To be honest, I haven’t seen anything like this in the public, so these few posts can be used as instructions for beginners AWM us, as well as people who deem it necessary to remain anonymous. Imagine that you bought an adult website for pennies, or that your city portal turned towards the opposition. You should not convince yourself that this is impossible, or that you are disgusted by seeing naked genitals. Every new thousand visitors send ringing gold coins to your keeper, and the sound of coins is so sweet that you simply cannot bear to part with a source of stable income. But, after all, a person lives not only on the Internet, and especially recently the Internet and real life are intertwined more and more. You blurted out somewhere, wrote a financial strip, scolded an official - and early in the morning the bell rings. In general, I would advise people who walk on the cutting edge of law and legality to completely reconsider their lifestyle, and in particular the security of the network and their home computer.

First, remember a few unshakable rules.

1. For semi-legal sites, never buy domains in the RU zone!
2. For semi-legal sites, never buy hosting in the country where you live!
3. If your lifestyle is connected with adult, warez, politics, and so on, then you should not be on any social network!
4. Your domains and hosting should not be registered in your name!
5. Mail only gmail
6. None of your data (phone numbers, accounts, Skype, full name, city of residence, photos, etc.) should be on the Internet!
7. Surfing directly on your illegal sites is possible, but all administrative work must be done through a proxy or anonymizer.
8. All your adventures on the Internet remain in the cache of the provider. How long are they stored there? Unknown. Three years, five years... no one gives guarantees on the shelf life of your traces.
9. Surfing via mobile high-speed Internet is generally an ass, unless you bothered to issue a SIM card for a homeless person.

In general, it is worth noting that from the point of view of legality, almost all webmasters are illegal immigrants who, in one way or another, violate this very law. If they haven’t come to you yet, it’s not because you are a positive and law-abiding citizen in all places, but simply because no one needs you yet. Every webmaster in particularly dangerous niches must be aware of the simple truth that he and the state are different poles with completely different interests.

For today, my introductory ode is over, and in my next posts, I will consistently try to tell you about basic security on the network and on your home computer.

    Sd3000

    I don’t use antiviruses myself, because when you catch an infection, you can immediately see where everything is and how. But this is truly aerobatics.

    A very good option is to have several accounts with different rights.

    Apart from hemorrhoids, this does not give anything for yourself. Why? Because in 99% of cases the password is login under Administrator / Administrator = login under user. + Methods for penetrating protected sections of the same Windows Vista have already become known. Let me remind you that XP “supposedly” had practically no security. At a low level, it was also easy to climb any user sections on localhost. In Vista - it’s almost 7, here things have really been taken to a new level. But it’s unlikely that social engineering and the stupidity of users will ever be abolished.

    “When a family does not have 2 computers, and the computer with which you earn money has to be shared with your family, in this case it is necessary to have different accounts.”

    In such cases, have only different computers :) Share a really working machine with someone. It's like being left without everything at one point. But if you are a kamikaze, then you are welcome. The example you described below is proof of this.

    The “No Script” plugin is absolutely useless and prevents the plugin from working. And you can’t catch any special infections through javascript, especially under FireFox. It's security obsessed compared to IE, but it's worth it. In order to catch an infection through javascript, you need to answer affirmatively to any question, which is usually disguised under a plausible pretext. That is, a simple rule applies here. If you have clearly visited a suspicious site and if it asks you to answer affirmatively to some question, then it is strictly forbidden to agree and therefore I would strongly recommend leaving such a site. There are fewer and fewer such sites.

    Apocalyptic

    My idyll came when there were 4 computers at home.

    This is a good option. Probably your computer distributes the Internet to others :)

    Do you have a server to administrate? 🙂

    The “No Script” plugin is absolutely useless and prevents the plugin from working.

    I forgot to say that Outpost Firewall can block all these things, from ActiveX to advertising.

    blockquote>To catch an infection through javascript, you need to answer affirmatively to any question, which is usually disguised under a plausible pretext. That is, a simple rule applies here. If you have clearly visited a suspicious site and if it asks you to answer affirmatively to some question, then it is strictly forbidden to agree.

    Yesterday I just had homework on computer security, I tried to make friends with Eset and Outpost Firewall, it took me half the night to do this, since both the first and the second have their own firewall and they block each other.

    Daniel

    After the last infection, I gave up on protection: ZoneAlarm and Avast are for show and against ScriptKiddis.

    Basic protection:

    — I store everything important online (DropBox, GoogleDocs, Yandex Bookmarks)

    — Passwords and confidential — KeePass (and the database is in DropBox)

    — Change 120-128 bit passwords once a month

    I plan:

    — Master portable software (Notepad ++, etc. for working on a website)

    — Started to master web services, simple programs (Yandex photos, etc.) and FF add-ons to perform simple operations for which we usually use super-duper-pro software

    — Buy ​​Kaspersky to check and disinfect site content (as a last resort)

    As a result: I can demolish the system at any time and install it again, without loss.

    Sd3000

    According to theory 2, FireWall cannot be friends by definition

    That is, one port can be served by only one and only one program. Everyone can monitor, but only one can maintain it; this is laid down at the system level, both Windows and Linux.

    That is, if they show that they have worked hard, then one of them is working in some kind of observation mode, not control.

    It’s too early to buy your own server for your home 🙂 a router is enough))))

    Only port 80 is open for amateurs; there is nothing to do on the other ports.

    Well, since working in a server center, I realized that the best protection is properly configured hardware rather than software.

    SergeySL

    properly configured Cisco is 10 times better and faster, any FireWall even on Linux :)

    Cisco is a piece of hardware running Cisco IOS, a very smart piece of hardware, however, its software again needs to be configured.

    About 10 times faster - have you measured it? Have you compared the price of a router based on a cheap computer with Linux/Unix and a device from Cisco? What about the cost of setup and support?

    Apocalyptic

    The most effective way is to differentiate access rights between users and the system administrator. Believe me, there is nothing more effective!!

    Yes, yes, but the SD3000 says that this is not an option in XP.

    I store everything important online (DropBox, GoogleDocs, Yandex Bookmarks)

    Passwords and confidential information - KeePass (and the database is in DropBox)

    Change 120-128 bit passwords once a month

    I plan:

    Master portable software (Notepad ++, etc. for working on a website)

    I began to master web services, simple programs (Yandex photos, etc.) and FF add-ons to perform simple operations for which we usually use super-duper-pro software

    Wow, you took a radical approach to the issue of security; in principle, it’s a good idea to store valuable information not on your home computer.

This type of earnings, such as surfing sites, is one of the most popular among beginners and, despite the minimum income, thousands of people use it thanks to various sites. What is website surfing? This is a paid view of advertisers' websites.


In other words, you get paid for being a visitor to a particular site. You can make this type of income through mail sponsors, for example, or Seosprint.

Unfortunately, constantly visiting sites is accompanied by the threat of infection of your computer, because... Among advertisers, there are systematically unscrupulous web masters trying to spread viruses.

System Protection Tools

You can surf websites safely if you organize multi-level protection for your system using the following tools:

Antivirus is the most important tool for protecting your computer from viruses. Anti-virus systems vary, but for complete protection it is best to use popular programs, such as Kaspersky or NOD32.

Do not forget to systematically update the antivirus database and its version, this will increase the level of protection of your system.

A firewall is a functionality that is optimally suited for checking incoming traffic on your computer.

In the case of surfing, a firewall is the ideal solution to protect your computer from viruses. In combination with an antivirus, the firewall provides a fairly high level of protection.

A browser is a program that is used to view pages on the Internet, and is also accompanied by built-in protection.

For example, Google specialists systematically conduct security checks for users of the Google Chrome browser. By using popular browsers, you are a more secure user.


Firewall– built-in protection for your computer against various threats. Many users disable this functionality due to numerous pop-ups, but by doing this they are putting their system at risk.

If you disabled it for this reason, then it’s better to change your mind, and to reduce pop-up windows, configure the necessary settings.

Safe surfing the Internet

There are many other reasons that negatively affect the safety of surfing the Internet. Most people neglect them, which is why their systems become infected with viruses.

Nobody wants to infect their PC, so listen to these tips:

  1. Do not go to dubious sites - for example, where they offer to download some hacking programs and other scams. The likelihood of them spreading viruses is high.
  2. Do not download anything from unverified resources - otherwise you will definitely fall for Trojans (). They are distributed under the guise of harmless software, and then hackers use your PC for their own purposes.
  3. Use router protection – modern routers have additional firewalls and many security settings, use all possible features.
  4. Browser update - few people check the latest version of the browser, and they are developed not only for convenience. Hackers can find loopholes in older versions, so they are not secure.

Most of the troubles come from the actions of the users themselves. If you are careful and stop believing everything that pops up on banners and advertisements, your problems will definitely decrease.

Programs for safe surfing on the Internet

The best way to protect yourself when visiting the Internet is to use a proxy. To explain it in simple language, when you connect to the network, your connection will go through other servers.

In addition to security, this will also help you remain anonymous. To avoid having to download a bunch of extensions or pay, download the Tor browser, it is simple and convenient:


It looks like Google Chrome, but it has several useful features. It does not save passwords, does not keep a history of visiting sites, and so on. The most important thing is that after launching the browser, proxies from several countries are used to connect.

You can check which ones:


Otherwise, nothing will stop you from using this method of increasing the security of web surfing.

Through such a browser you can access any website and not worry about security. The main thing is not to fall for tempting offers and outright deception; you can only protect yourself from this by saying “No”.

Finally, I would like to say that when visiting sites while surfing, minimize your actions on the site that opens. Do not follow the links, do not start downloading, but rather wait until the time is up and close the tab with the site you were viewing.

You might also be interested in:


Nowadays, SEO optimization of websites, obtaining good positions in search engines and increasing resource traffic are of great importance. To increase these indicators, many webmasters use active advertising systems (ADS) or mailers, and ordinary users use these systems to generate additional income.

Both sides are pursuing their own goals. Web owners are seeing increased traffic, increased relevance for search engines, and attracted additional clients. ATS intensively directs traffic to the site for many systems that sell sites with links.

But there is another side to this coin. After all, all ATS sites are staffed by users who intensively click on links and create traffic. Unfortunately, no one thinks about them. Many people were attracted to active advertising systems by the promise of fabulous earnings. But one click on the link costs 2 kopecks on average. Imagine how much they have to work to at least cover the costs of electricity and Internet.

Surfing safety

Unfortunately, the low cost of their labor is only half the problem. The second half are sites with malicious code on them. Even when using an antivirus with up-to-date databases, the chance of becoming infected with computer viruses is high. This leads to theft of personal data, failure of the operating system, etc.

More and more users are becoming disillusioned with this type of earnings, although with a competent security system, earnings are possible.

What should I do? Decent owners of promoted ATS to some extent care about quality control of advertised sites. But this is ideal. It’s better to think through your security strategy and follow some tips on this matter.

  • Do not access the Internet under a computer administrator account. A guest account is more suitable for this; a guest account with limited rights is more suitable. Even a beginner can do this in the control panel.
  • For each mailer you use, assign an individual login and password.
  • Do not enter or share your virtual wallet details with others.
  • Use proven antivirus programs.
  • Use utilities that allow the user to work with a “clone” of their operating system, rather than with its original. For example, the Shadow Defender program, which will help even the “uninitiated” to keep his system intact. Shadow Defender allows you to put the system in shadow mode. Which is called Shadow mode, in which the user will not be in danger of losing important information or being attacked by viruses.
  • Work with trusted and well-known sites that have a lot of reviews online and have a lot of traffic. The number of registered visitors and the age of the CPA are the main indicators of safe work in surfing.

Safe surfing sites

In conclusion, I would like to give you my list of surfing sites I have personally tested. There are few of them, but they are the best!

Data storage.

Computer.

The first, and perhaps the best thing you can do is not use Windows. An alternative OS can be the well-known Linux distribution - Ubuntu.

There are plenty of articles on installing this OS; there, during installation, you can encrypt the entire operating system. Also here are more detailed instructions. However, there is one tip - after installation, open in Dash (Ubuntu logo on the left) and enter Privacy there. In the open window, turn off searching for web results and saving any activity in principle. At the same time, disable sending crash logs in Diagnostics.

In the field of protecting information stored on a hard drive, of course, there is nothing better or safer than an open and free program TrueCrypt. TrueCrypt can be installed on any operating system and can easily mount volumes created on another operating system. If you need to provide the ability to connect the TrueCrypt container to Android, then there is a utility EDS Lite providing full compatibility with TrueCrypt.

(MRTC Note: Although Truecrypt has not yet been convicted of anything reprehensible, however, as far as can be judged, no one has yet carried out a full audit of its source code. In addition, it is not known for certain who the developer of TrueCrypt is. Currentlyinitiative is unfolding for a comprehensive review of this program. That is, you can use it, but still with some caution.)

If you need to encrypt data on a flash drive or SD drive, then this instruction.



1. Everything must be done under Windows 7.

2. CD or DVD disc. After completing this instruction, this disk will need to be given to some reliable person who will not be searched (a school friend, relative) or even destroyed, because with the help of this disk it will be possible to gain access to your encrypted data. In the latter case, in the event of a serious failure or a forgotten password, complete loss of data on the hard drive is possible.

3. For several operating systems, TrueCrypt will encrypt only Windows, and only if you have a Windows bootloader installed, and not Grub, for example. How to combine encrypted Ubuntu with encrypted Windows 7 read here. Only don't comply Step 4 - after this, anyone will be able to open your TrueCrypt-encrypted disk, because... Login will be carried out through an iso image that stores the master password.

Instructions for regular full disk encryption can be found here. read here. However, there is a warning - due to the fact that the keys to your disk will be cached in RAM, try to turn off the computer and not put it into sleep mode. Otherwise, highly specialized professionals will have the opportunity to gain full access to the OS and, as a result, your data.

Smartphone. Android.

The latest versions of Android allow you to enable full disk and SD card encryption. To do this, you need to go to Settings and first set a lock password if you don’t have one. And then, while charging the device, enable encryption of the disk or SD card.

After this, every time you turn it on or lock it, the phone will ask for a password to enter.

Safe communication.

First of all, of course, it is better to choose among mail servers https://riseup.net, however, it is necessary that either you provide information about your activities, or two people vouch for you. Instructions for creating an account can be found find here.

Also here You can find instructions for installing Thunderbird using GnuPG encryption, which is impenetrable to cryptanalysts. The problem is that for such communication it is necessary to exchange keys in advance, which must be exported and re-imported when reinstalling the system. Such mail can only be read together with the key and the necessary software for GnuPG encryption. But any mail server will see only a set of data that cannot be decrypted.

For one-time registrations you can use 10 min mail, it will automatically self-destruct after waiting 10 minutes. However, some registrations on sites do not pass the spam filter, so this option does not always help.

Instant messaging

Without a doubt, our first choice will be the XMPP protocol, popularly known as Jabber. At the moment, both Google and Facebook use it, but there are many more XMPP servers. Plus, there is a widely used OTR (Off The Record) encryption algorithm that allows you to not think too much about creating keys by creating a pair of keys on the fly.

First you need a client - this is Pidgin and together with OTR plugin for him.

Installation Instructions can be downloaded or viewed from our website.

Onetimesecret.com

This site allows you to create messages that, once read, will self-destruct on the server and will subsequently be inaccessible. To do this, simply enter the required text, set a password (if you are not sure that someone else will not immediately follow the link) and send it all to the recipient.

Despite the fact that there are many questions about use, sometimes it really helps when communicating through various social networks or with a person who does not have secure means of communication (XMPP, riseup mail).

Safely surf the Internet

Today, everyone seems to know about the existence of the Tor system. It is installed in the simplest way - Download link, launch the unpacked program and now you are already using Tor. Any of your movements on the Internet through it will be inaccessible to our KGB.

Setting up Firefox

For users Firefox, as the most secure browser (which was used by the Tor Bundle as a basis), you can also configure it for regular surfing in such a way as to complicate the life of our intelligence services.

First of all, you can turn off history. Go to Settings → Privacy and select will not remember history.

Secondly, there is a set of plugins, a list of which can be view on the website Safety-in-a-box. Pay special attention to the HTTPS Everywhere and NoScript plugins.

General information

Of course, no information security system will help if you tell strangers a lot yourself, if you choose overly simple passwords (the desired password length is at least 10 characters, with capital letters and numbers) and if you use computers unknown to you. Install an antivirus of your choice (Nod 32, Avast, Kasperky), can be installed additionally anti-spyware programs And firewall. Don't trust anyone with your passwords, just like don't leave anyone at your computer unattended for a long time.

Try not to store particularly important data on the computer at all, but to remember it yourself.

At the moment, the Belarusian state places more emphasis on the agent network than on the control of electronic information. However, when there are no agents and are not expected, when the agent cannot obtain any information, when the SIM card and telephone operator logs do not provide anything interesting, law enforcement agencies resort to modern technologies. It is important to always be one step ahead of them in everything, so that you can then deal a crushing blow to the system of oppression and injustice.



tell friends