New and Used Car Talk Reviews Hot Cars Comparison Automotive Community

The Largest Car Forum in the Philippines

Page 30 of 42 FirstFirst ... 2026272829303132333440 ... LastLast
Results 291 to 300 of 411
  1. Join Date
    Sep 2010
    Posts
    1,818
    #291
    Snowden and Tor - might not be the same as you and me using tor.
    snowden might have a tor end node from a trustworthy friend or accomplice.
    it is only *reliable* if you know the end node is reliable.

  2. Join Date
    Apr 2014
    Posts
    5,246
    #292
    Come to think of it. Tor always defaults to eu. It just adds another layer of security since the public ip is located somewhere ala vpn.

    For all we know, the tor server where the data is transmitted to and from is also collecting data.


    Sent from my BLL-L22 using Tapatalk

  3. Join Date
    Jan 2009
    Posts
    6,233
    #293
    Quote Originally Posted by brushless View Post
    Nope. An attack can occur on Twitter, YouTube and Instagram. In fact, it can occur on any website the hacker wishes to monitor on its users. You'll be amazed by how much info they can get from you. They can even have access to your mobile phone and turn it into a listening device.
    Well, that's why you have a whole suite of security products working for you. You won't have to sacrifice convenience for security.

    I guess you're not of interest to them.
    I guess not. I'm well-behaved on the Net. Unlike some people I know.

    Are you still studying?
    I'm always studying and working on new stuff, even though I'm already in my mid-40s.

    Don't tell me you've stopped learning?

    When mobile, like at the airport, I simply call my agent in Hong Kong to prepare the contract for the factory in Chaozhou and have it faxed or emailed to me. I'll sign it later or he can sign it on my behalf.

    People can do the work for you in the office you know. Lol
    I presume that all your 'people' follows the same security protocol as you do? Namely, one computer for work, another one for online use?

    You still have to connect to an email service to receive the documents. Also, some fax machines can store a finite number of pages that was either sent or received. I'm sure you've taken great lengths into ensuring that no unauthorized copies of your docs exists?

    Sorry, it's just not the case for me. I can still work fine, no problem. How hard would it be copying files from USB to USB? Thanks for the advice though.
    You obviously haven't had the misfortune of a USB drive die on you. Or the idea that it actually makes it easy for viruses and malware to propagate through USB.

    Firewall? Anti Malware/Spware/AV? Are you kidding me?
    I kid you not. I hope you're not that ignorant about data security tools. As with physical security, wherein you have a main gate, probably some CCTVs, an alarm, guard dogs, security personnel, a deadbolt on the front door, etc., data security is deployed in layers. The network layer is protected initially by your firewall. Malware and other viruses are caught by the UTM. Wickedly evil attachments are caught by your email server's anti-spam and anti-malware engines. Any surviving threat or threats that got through the other layers, or virus payloads that entered through the USB drive (aha!) or from network file transfers are taken cared of by your local AV and personal firewall (endpoint or client protection).

    Data security, similar to data privacy, is a concerted effort of different disciplines and solutions working together.

    You know how much time is wasted cleaning the virus or malware? When you thought you've cleaned it, it pops up again in your browser. You don't know what files it has infected in your system. What is worst is that after cleaning, your system does not work fine anymore. Either it freezes on you or simply too slow to work on. You then do some troubleshooting and hairpulling. The best remedy for this is to simply nuke the hardisk and start from backup. How many hours wasted.

    You talk about productivity loss, this is productivity loss.
    Then I'd say, you're not doing it right. Done properly, all these are transparent to the user. They may not even get a notification about a mundane infection for as long as it was successfully removed (only the IT people would likely get the notif). Also, we''re no longer talking about Windows XP or versions before it, which were virus magnets. Windows 10 is a whole new world. I've never had a displeasure of cleaning a virus for years. Don't make it sound worse than it really is. But yes, backups are there as a safety net.

    If you think this can work effectively, why would Snowden use TOR?
    For being one of the world's most wanted high profile individual that is actively being surveilled, tracked, and pursued by the US government, I would too. But that is not the case for the great majority of people using the Net.

    Though, I'm not oblivious to the concept. I use a VPN service if I need anonymity. I can just "show up" anywhere around the world, if I wanted to. I just pick the country I need to be in and boom! Beam me up, Scotty!

    Good luck on your backups though. I never have to do that anymore due to an attack or infection. I do it because the hardisk is going to go anytime. Lol!
    Oh thank you. Backups are there as a last resort. Whether it be due to a software glitch, a virus infection, a hard disk takes a dive, or as simple as trying to recover a file that was deleted months ago, a backup affords some insurance against data loss.
    Last edited by oj88; April 17th, 2018 at 02:12 AM.

  4. Join Date
    Dec 2017
    Posts
    1,018
    #294
    Quote Originally Posted by xwangbu View Post
    Snowden and Tor - might not be the same as you and me using tor.
    snowden might have a tor end node from a trustworthy friend or accomplice.
    it is only *reliable* if you know the end node is reliable.
    He is using Tails actually. TOR is configurable according to your needs. I haven't tinkered with it yet, just the default.

  5. Join Date
    Sep 2015
    Posts
    13,917
    #295
    Quote Originally Posted by brushless View Post

    Online banking, NOPE.
    Passbook, YES.
    No ATM.

    Walandyo may kapareha pala ako dito.

    No credit card ako.

    No ATM

    Withdraw sa bank teller.

    Pero nastress ako sa pinaguusapan nyo. Ang hightech masyado.

  6. Join Date
    Dec 2017
    Posts
    1,018
    #296
    Quote Originally Posted by oj88 View Post
    Well, that's why you have a whole suite of security products working for you. You won't have to sacrifice convenience for security.
    The don't work all the time. Eset, Norton, Avast, Malwarebyte, Commodo, etc. You name it, I've tried it all.

    They can still see you.

    I guess not. I'm well-behaved on the Net. Unlike some people I know.
    It's not about being well behaved, rather, it's all about wanting to play with you for no reason at all. Random. It could be a pimploid teenager from Ukraine practicing their skills on your connection or it could be the real deal - credit card syndicates.

    I presume that all your 'people' follows the same security protocol as you do? Namely, one computer for work, another one for online use?
    It's actually my private work that is senstive and not company related. Maybe, I wasn't clear when I explained it. Made you confused there. Lol.

    You still have to connect to an email service to receive the documents. Also, some fax machines can store a finite number of pages that was either sent or received. I'm sure you've taken great lengths into ensuring that no unauthorized copies of your docs exists?
    No problem in accessing email services. I'm using Tails OS, not Windows.

    You can receive fax in your computer via fax/modem. It doesn't have to be a fax machine.

    You obviously haven't had the misfortune of a USB drive die on you. Or the idea that it actually makes it easy for viruses and malware to propagate through USB.
    It's actually Windows that makes it easy for viruses and malware to do havoc. It's really an unsafe OS to put online. You can install all the best firewalls/AV's/Mallwares/Sandbox and what not, all you can eat. They can still see you, bro.

    They don't even need malware/spyware/virus installed in your system in order to spy on you. There mere fact you're connected to the internet, that's more than enough. No need to go through all that hassles.

    Thus, I only use Tails. They'll be hopping from South Africa to China to Israel ot India, computer to computer and it will frustrate them and they will simply move to an easier target. I'm a waste of their time.

    I kid you not. I hope you're not that ignorant about data security tools. As with physical security, wherein you have a main gate, probably some CCTVs, an alarm, guard dogs, security personnel, a deadbolt on the front door, etc., data security is deployed in layers. The network layer is protected initially by your firewall. Malware and other viruses are caught by the UTM. Wickedly evil attachments are caught by your email server's anti-spam and anti-malware engines. Any surviving threat or threats that got through the other layers, or virus payloads that entered through the USB drive (aha!) or from network file transfers are taken cared of by your local AV and personal firewall (endpoint or client protection).
    Like I said, they don't need to drop a virus/malware/spyware/email attachment in your system. They don't need it.

    For being one of the world's most wanted high profile individual that is actively being surveilled, tracked, and pursued by the US government, I would too. But that is not the case for the great majority of people using the Net.
    The funniest thing is, TOR was created by the NAVY and was funded by the National Defense. Snowden merely made use of their system. LOL.

    If fact, I'm using Tails right now typing this out.

    TOR was turtle slow before. It's hardly usuable. Now, it's rather fast. Perhaps, it's my connection.

    If you really want to be safe online, either turn off your modem or use TOR.

    However, most people do not bother turning off their modem. They just leave it unattended when not in use or when they are sleeping. Your connection is open 24/7 for possible attacks and eavesdropping. So, kindly turn off your modem every time you don't use it. You'll be adding more security to your system.

  7. Join Date
    Dec 2017
    Posts
    1,018
    #297
    Quote Originally Posted by kagalingan View Post
    Walandyo may kapareha pala ako dito.

    No credit card ako.

    No ATM

    Withdraw sa bank teller.
    I have credit cards. But, no to ATM. I've heard a lot of horror stories with regards to that. The bank can't even protect you. Passbook all the way for me. It's really much safer if you have paper evidence of deposits and withrawals, machine validated by the pretty teller, face to face, eyes to eyes, smile to smile, with CCTV cameras on you. Lmao!

  8. Join Date
    Sep 2015
    Posts
    13,917
    #298
    sa credit card ano pwede maging problema and ano dapat safety?

  9. Join Date
    Sep 2010
    Posts
    1,818
    #299
    Quote Originally Posted by kagalingan View Post
    sa credit card ano pwede maging problema and ano dapat safety?
    skimming and theft.
    get an Rfid sleeve para di ma-scan card mo.
    dapat me notification feature yung account mo at least
    para alerted ka sa mga transactions.
    better yet, use a virtual CC.

  10. Join Date
    Dec 2017
    Posts
    1,018
    #300
    Quote Originally Posted by kagalingan View Post
    sa credit card ano pwede maging problema and ano dapat safety?
    A reliable cc company should text and email you on every transaction made on your cc, small or big. They should also have an anti-fraud department to monitor your buying pattern and should it detect something odd, they will notify you immediately. If it's a fraud attempt, they will cancel your cc and issue you a new one. When buying online, they should have an OTP system, where they text you a one time pin (OTP) so you can complete the payment.

    Always keep your cc safe. If you are going to places like Divisoria, leave your CC at home. Just bring cash.

Tags for this Thread

Desktop PCs - Do You Still Have Them?