LinuxQuestions.org
Review your favorite Linux distribution.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 11-28-2008, 11:42 AM   #16
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600

Quote:
Originally Posted by SaraiKhan View Post
at least the partition that root runs on.
That would be rather useless since you should not be using the root account for regular tasks in the first place.


Quote:
Originally Posted by SaraiKhan View Post
how safe is TOR?
Define "safe" from your perspective?.. Or at least tell us what doubts you have? What I mean is that if you have concerns like these you should do some research yourself, read about things so you know what you're talking about and *then* ask. That way you can easier spot errors, caveats, omissions, assumptions et cetera. If you don't do any research yourself you'll be relying on the answers to be either correct, correct in some circumstances or in a parallel universe.


Quote:
Originally Posted by SaraiKhan View Post
How do I checksum the entire user profile
Like 'sha1deep -r /pathname' or 'find /pathname -type f|xargs sha1sum 2>/dev/null'.
 
Old 11-28-2008, 10:01 PM   #17
SaraiKhan
LQ Newbie
 
Registered: Nov 2008
Posts: 28

Original Poster
Rep: Reputation: 15
Quote:
Define "safe" from your perspective?.. Or at least tell us what doubts you have? What I mean is that if you have concerns like these you should do some research yourself, read about things so you know what you're talking about and *then* ask. That way you can easier spot errors, caveats, omissions, assumptions et cetera. If you don't do any research yourself you'll be relying on the answers to be either correct, correct in some circumstances or in a parallel universe.
Well, what I want to achieve, basicly is minimize the chances of either the ISP or tertiary personas spotting my research data I enter into my machine. I am indeed currently reading and researching this matter, but I have received some replies from some people over the IRC that TOR might really be unsafe. What I basicly want, is to minimize the chances of someone gaining access to my machine, or snooping my network traffic. I am also considering to crypt ALL messages coming and going through my lan. I read about IPSec but I am quite clueless on how to setup it on my linux and windows boxes. I succeeded in encrypting today my entire hdd and successfully used TOR, however sometimes it is kind of slow. Nevertheless, it's not like im downloading movies, so i guess it works ...
Regarding IPSec, I could not find a good info on how to set it up.
Regarding TOR, I am currently reading about onion routing and RFC 793.
I also browsed some CISCO stuff, and I found the info really helpfull. I already got some interesting ideas.
 
Old 11-29-2008, 06:53 PM   #18
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Quote:
Originally Posted by SaraiKhan View Post
I have received some replies from some people over the IRC that TOR might really be unsafe.
Without providing any details, the same thing could be said about pretty much any software. Besides, last time I looked at the Tor website they seemed to make it pretty clear that you shouldn't rely on Tor if, like, your life depended on it. Having said that, Tor is indeed a dangerous tool when used inappropriately. Perhaps this is what your IRC friends were referring to. Users need to understand that Tor is only designed to provide anonymity (not security). Apparently, there's tons of people who believe that Tor magically provides them with end-to-end encryption when surfing the Web.

Personally, whenever I use Tor with a HTTP (without SSL) connection, I not only make sure I don't transfer any personal information, I also make sure I use a bolted-down NoScript and a disposable user account. I think it's important for all Tor users to assume that their exit nodes *will* inject malicious code whenever possible.

Last edited by win32sux; 11-29-2008 at 07:09 PM.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
clearing cache on squid proxy shadowsurfer Linux - Newbie 9 04-15-2008 11:33 PM
clearing CD cache grayFalcon Programming 1 09-21-2006 04:55 PM
clearing cache, web cache on linux varunbihani Linux - General 2 12-08-2005 12:02 PM
DNS cache clearing n.antonio Linux - Software 0 05-11-2003 08:44 PM
clearing cache waxiem Linux - General 1 03-02-2003 09:42 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 12:40 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration