Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
Midjack
Dec 24, 2007



OSI bean dip posted:

To be honest, your suggestion of having an OS that you can boot into that is there for in case you have to show something on your workstation to a border guard or whatever. It would be far simpler to just reinstall a fresh OS with nothing on it and then just access whatever is valuable via a remote session. At least then you will not have to be as concerned about your data being stolen and there will be nothing of value to extract from the machine. I don't travel with my main computer mainly because it's full of crap and instead I just keep a spare machine on hand for this very reason.

Or do a clean install on the hard disk and boot from a Windows to Go USB drive that has all your porn on it.

Adbot
ADBOT LOVES YOU

Midjack
Dec 24, 2007



apseudonym posted:

Nah, not really.

yeah really

Midjack
Dec 24, 2007



doctorfrog posted:

Just generally speaking, is it likely possible to remotely switch on a webcam (either permanently soldered to a laptop screen or connected to a desktop PC via USB) and not also switch on the little light that says it's activated?

I realize this is asking for a few assumptions about a very wide range of products, and may be stupid, so you may also think of it as me asking whether you personally put black tape over your webcams when not using them.

With most of the modules in laptops and USB cameras the LED isn't controllable separately from the camera. I wouldn't sweat it unless you have reason to suspect hardware tampering. Cell phones are a different story though.

The tape is good so you don't turn it on accidentally though.

Midjack
Dec 24, 2007



OSI bean dip posted:

I believe some drivers dictate the webcam LED just an FYI. There has been some research into this in the past

Some did, more didn't when we were looking at them.

Midjack
Dec 24, 2007



OSI bean dip posted:

If the drive is sketchy, use it on a machine you should tag as "brown" and copy files manually. The brown machine should not run Windows just to reduce attack surface and you should never access the drives with a privileged account.

You might also do the copy booted into an os running from an optical disk and don't connect to a network after you access the suspect volumes.

Midjack
Dec 24, 2007



Shroom King posted:

I have Webroot SecureAnywhere as my AV but this thread encouraged me to download Microsoft Security Essentials. So far, they play nice together. I guess 2 AV programs are better than one?

I also have a password manager that is totally secure from internet phishing/hacking: a pen and a piece of paper.

Phishing is getting tricked into disclosing your credentials to an imposter. If you can't tell the difference you'll copy your password right off the paper into the wrong website.

Midjack
Dec 24, 2007



Subjunctive posted:

As long as the binary is compiled from unmodified code.

And anybody bothered to look at the source in the first place.

Midjack
Dec 24, 2007



Crotch Fruit posted:

I mean I agree I wouldn't install McAfee, but I also definitely would not pay more to activate the trial of whatever crappy AV came on a new PC and I wouldn't want anything else to either. If someone really wants to insist on having paid AV, I assume your ISPs version of McAfee is the same as actually subscribing to McAfee, which would just be even more stupid since you're already paying for it.

If someone insists on paid av they should pay for it, not you. And the only people you should listen to for dumb requests like that should be paying you and giving you a computer anyway.

Midjack
Dec 24, 2007



uguu posted:

Isn't bitlocker only for professional and enterprise on vista? I have home premium. I know there are lots of ways around the problem, but I'd like to keep the drive as is, frozen in time, if possible.

Can you image it onto some other media and encrypt that drive with your package of choice?

Midjack
Dec 24, 2007



Your easiest answer is probably a cheap safe, honesty.

Midjack
Dec 24, 2007



uguu posted:

Initially I wanted to encrypt the disk as is and have it be bootable, so that it would remain as I last left it.
I've learned now that's not possible and my options are to just encrypt my documents on the disk or move them all over to a different disk.
I tried veracrypt but it won't install, my vista doesnt have bitlocker nor Encrypting File System and I can't find any other free and trustworthy encryption software for it.

So my question is: is there any way to encrypt files on windows vista home?

Get the last working Truecrypt from Gibson, it should work on Vista.

Midjack
Dec 24, 2007



Space Gopher posted:

There is absolutely no reason to use Truecrypt to create new encrypted volumes. Use Veracrypt instead.

If you would like to know more please reference the red banner text on the official Truecrypt homepage.

He said veracrypt didn't install, for his purposes Truecrypt is good enough.

Midjack
Dec 24, 2007



Rufus Ping posted:

imo copy the disk contents somewhere else, reformat the disk using your new PC and enable encryption (it will probably use ext4+LUKS), then copy the files back. Give up on vista, which you should have forgotten existed in 2009

This is really the best option unless you just gotta keep vista to interface with some hosed up hardware from 15 years ago.

Midjack
Dec 24, 2007



rabidcowfromhell posted:

This seems wrong but I'm not smart enough to dispute it....


The author is not considering that username=email address for many things and that emails are easy to harvest or guess as well as that login attempts can be heavily automated. Since the 25 most common passwords are about 10% of the passwords revealed in breaches, that implies that using an easy to remember (and likely commonly used) password drastically increases the chances that your account will be broken into quickly once your email is out there. There is an argument to be made that foregoing a strong password that you are unlikely to remember in favor of an easier to remember password that isn't common like "dog's name + inseam measurement + first car model" increases usability more than it decreases security but the answer to that, like all password complexity debates, is "use a password manager and don't worry about it."

Midjack
Dec 24, 2007



rabidcowfromhell posted:

I should have mentioned that this was a reply to me suggesting people use a password manger
Good luck!

Midjack
Dec 24, 2007



Saukkis posted:

Bigger problem is when you change your password and get your account locked repeatedly because of your cellphone of email client hammering the old password.

I thought every email client in the last 25 years was smart enough to stop automatic retrieval attempts after a failed login and wait for user interaction though I guess if the user just mashes "RETRY" there's not much you can do.

Midjack
Dec 24, 2007



22 Eargesplitten posted:

I'm on Linux, can I just run rm /rf ~ instead?

If you’re running Linux you already owned yourself way harder than any joke suggestions we make here would.

Midjack
Dec 24, 2007



zaepg posted:

Ok. Yeah. I changed my password and got up to date on 2 step security. Out of curiosity , is it possible for other tenants on my wireless network to pick up personal information? Is a wired connection more secure. :shrug:

Wireless traffic is easier to snoop since radio goes everywhere while a wire is harder to physically tap. But I expect your game and most websites that aren’t completely scamtastic to use TLS or similar to encrypt the connection, including your login, so even if an attacker has all your traffic they’ll still have to decrypt it.

Given what you posted it’s far more likely one of the other sites that you reused the password on got popped and someone took the password and email from there and tried popular sites until they got lucky. Get a password manager (Keepass, Bitwarden, 1password, etc) and take this opportunity to change every password to a unique strong password for each website. Turn on two-factor authentication anywhere it’s offered.

Midjack
Dec 24, 2007



Cup Runneth Over posted:

this site is impossible to use for me because I use a different vanity email address for almost every website

Doing that greatly lessens the need for it, since the paired email/password from one site can’t compromise another one.

Midjack
Dec 24, 2007



alexandriao posted:

(is it ok to ask this question here?)

Are seedboxes just like vps-es but for seeding? I don't really understand the difference :/

Yes, you take advantage of fast unthrottled bidirectional connections available at data centers to download torrents quickly as well as seed them back to the rest of the torrent pool.

Midjack
Dec 24, 2007



alexandriao posted:

Yes, but how much can I treat it like a vps. Is it just that they're designed for seeding, or is there a totally different access model or setup that prevents me using it as a vps -- is there any reason why I shouldn't do that?

It’s just a computer. If you set it up as a seed box it probably just has stuff to support doing that like a torrent client and networking services in addition to a bare bones OS. If you can ssh into it you can probably reconfigure it to do whatever you want. If you didn’t set it up yourself but instead you’re renting a “seed box” as a turnkey setup from a hosting provider then you may not have the privileges you need to change it drastically.

Midjack
Dec 24, 2007



ChickenWing posted:

Sorry, should have qualified - what does using a non-corporate VPN do? Like, is there any real reason for me, an average joe who is not a whistleblower or confidential source or policitcally important person, to subscribe to Joe's Logless VPN Hut?

Properly deployed (those words are doing a lot of work) VPNs are good for protecting your traffic against eavesdropping by people on the network between you and the VPN endpoint, such as a cafe's wireless network. Yeah okay everyone is using TLS these days but even with that an observer can still see what sites you visit and maybe you don't want that for whatever reason, like you're a whistleblower at Theranos and don't want Holmes's goon squad to shake down the cafe to see if you were on WhatsApp while you were there. If you are running your DNS over the VPN or have your own DNS on your LAN you can also use a VPN to shield your traffic from your ISP if you're concerned about them being hostile or datamining your traffic (again even if your content is encrypted they can see what sites you visit). However, as noted above you are ultimately typing your login into your bank's website and even if you're "anonymously" browsing there are a number of techniques that can be used to track your browser. So a VPN is helpful but certainly not a 100% privacy solution on its own.

Midjack
Dec 24, 2007



Zorak of Michigan posted:

My current setup is that I have a main Keepass database, which is on Dropbox, protected by a frankly suboptimal but easy to type passphrase and also by a key file. The keyfile is definitely not on Dropbox, nor is it in cloud backups. If my house ever burns down and I leave without my phone, I'm pretty well screwed. The passphrase for my Authy account, which has all my 2FA seeds in it, is in a separate Keepass database which is also not in cloud storage nor cloud backups. It exists only on my desktop PC, my phone, and my iPad. Unless I'm missing something, I'm safe unless someone gets hold of one of those devices long enough to brute force my password before I notice that there's a problem and start changing passwords. Granted, the resulting password changes would suuuuuuck.

Keyfile in a safe deposit box if you have one, or encrypted and given to your attorney or a friend or family member whom you would trust not to lose or try to crack it is an enhancement to this scheme, though depending on your circumstances you may not have any of those or wish to expend the resources to get them.

Adbot
ADBOT LOVES YOU

Midjack
Dec 24, 2007



Pile Of Garbage posted:

If you're in this category then leaving poo poo like encryption keys or MFA recovery codes in a safe deposit box or with an attorney offers no more protection than leaving them on a piece of paper or a HDD at home.

Zorak of Michigan posted:

If my house ever burns down and I leave without my phone, I'm pretty well screwed.

Key file held off premises addresses house burning down with phone in it.

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply