LinuxQuestions.org
Help answer threads with 0 replies.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 01-15-2015, 10:48 AM   #16
Habitual
LQ Veteran
 
Registered: Jan 2011
Location: Abingdon, VA
Distribution: Catalina
Posts: 9,374
Blog Entries: 37

Rep: Reputation: Disabled

Quote:
Originally Posted by djnidec View Post
i looking for the strongest linux firewall i heard IPTABLES NOT BAD
Can somebody offer me a better firewall please ???
Better than your ZYXEL USG20 W. PHISICAL FIREWALL?
 
Old 01-15-2015, 10:52 AM   #17
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,659
Blog Entries: 4

Rep: Reputation: 3939Reputation: 3939Reputation: 3939Reputation: 3939Reputation: 3939Reputation: 3939Reputation: 3939Reputation: 3939Reputation: 3939Reputation: 3939Reputation: 3939
Good person, we can easily work with people whose command of the English language is less-than-good.

What's still missing is: "exactly what do you think the problem is, and why?" Then, "what are you doing about it, what have you tried to do, and why?" When you (repeatedly) say, "3G," what makes you think so? (Let's assume, for the sake of argument, that you're right! Why do you think you're right?)

Then ... a call to action for "all the rest of us." What can we do, given what you've told us, to help you understand your problem and/or to steer your way clear of it? A simple, un-emotional, statement of the problem. Something that we can a-c-t upon. A question we can answer. Advice that we can give. A point-of-view to help make things more clear.

This forum exists to help people. Not to close threads. It's been helping people for years.

Even if you posted in your own native tongue, someone could probably translate it and post an English translation as a reply. This is an International forum, and "the language issue" can be dealt with.

Last edited by sundialsvcs; 01-15-2015 at 10:55 AM.
 
Old 01-15-2015, 11:12 AM   #18
dt64
Member
 
Registered: Sep 2012
Distribution: RHEL5/6, CentOS5/6
Posts: 218

Rep: Reputation: 38
maybe the answer he is looking for is a bit smelly:
<°)))><
 
Old 01-15-2015, 02:49 PM   #19
urbanwks
Member
 
Registered: Sep 2003
Distribution: Slackware64-Current, FreeBSD 12.1, Alpine 5.4, Manjaro 19, Alpine on WSL [Win10]
Posts: 194

Rep: Reputation: 213Reputation: 213Reputation: 213
I posted this on one of the many other threads you started in another forum on this site, but if it's true like you mentioned in that thread that they have a PHYSICAL KEY TO YOUR HOUSE and are DESTROYING YOUR PROPERTY, then you need to CALL THE POLICE.

Again, NO FIREWALL is going to prevent them from putting a key in your door and opening it. iptables is not a home security system.
 
Old 01-15-2015, 03:37 PM   #20
John VV
LQ Muse
 
Registered: Aug 2005
Location: A2 area Mi.
Posts: 17,624

Rep: Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651
the OP dose indeed sound like my EX. when she gos off her meds ( yes she dose suffer from schizophrenia )
she often starts sounding like the OP on those occasions


if that is the case

there is NO way we can help the OP
 
Old 01-16-2015, 03:18 AM   #21
dugan
LQ Guru
 
Registered: Nov 2003
Location: Canada
Distribution: distro hopper
Posts: 11,222

Rep: Reputation: 5320Reputation: 5320Reputation: 5320Reputation: 5320Reputation: 5320Reputation: 5320Reputation: 5320Reputation: 5320Reputation: 5320Reputation: 5320Reputation: 5320
Quote:
Originally Posted by rokytnji View Post
It almost sounds like you are a victim of cryptolocker.
I have repeatedly asked for screenshots, which would have made something like this clear.

djnidec, you have an Internet-connected phone (as you've said in another thread), and your systems are intact enough for you to post here. You can take a picture of your computer screen and attach it.

Last edited by dugan; 01-16-2015 at 03:42 AM.
 
Old 01-16-2015, 04:19 AM   #22
pan64
LQ Addict
 
Registered: Mar 2012
Location: Hungary
Distribution: debian/ubuntu/suse ...
Posts: 21,830

Rep: Reputation: 7308Reputation: 7308Reputation: 7308Reputation: 7308Reputation: 7308Reputation: 7308Reputation: 7308Reputation: 7308Reputation: 7308Reputation: 7308Reputation: 7308
I was thinking about this story and I guess those people (he was talking to the hacker) explained him a lot of things, but they simply misguided the OP. The most important thing is to understand that they did not tell the truth but an unreal tale about those incidences. I don't know why.
 
Old 01-17-2015, 04:48 AM   #23
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
DONT

Quote:
Originally Posted by John VV View Post
the OP dose indeed sound like my EX. when she gos off her meds ( yes she dose suffer from schizophrenia )
she often starts sounding like the OP on those occasions
Some of you posting in ths thread should have noticed by now that I have closed several duplicate threads, moved several replies to separate threads as unsuitable ( https://www.linuxquestions.org/quest...5D-4175531027/, https://www.linuxquestions.org/quest...5D-4175530935/) and have asked the OP to inform us in a way that we can help him. Especially in techically-oriented forums please keep your (repeated) Off Topic banter to yourself.

Thanks all in advance for your cooperation.
 
Old 01-17-2015, 06:20 AM   #24
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Quote:
Originally Posted by pan64 View Post
I was thinking about this story and I guess those people (he was talking to the hacker) explained him a lot of things, but they simply misguided the OP.
I must say that's an excellent remark and definitely something to consider, yes.
 
Old 01-17-2015, 07:40 AM   #25
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
@djnidec: please do not create more threads. That is highly inefficient. Post your replies only in this thread. Now let's see if we can speed things up. Since you do not know how to diagnose things let's start the easy way:
- What kind of connection (modem, cable, xDSL, other) does your Internet Service Provider provide?
- Can you reboot 1 machine (laptop or PC doesn't matter) then post contents of running (as root) the following commands:
Code:
dmesg
iwconfig
ifconfig
cat /etc/resolv.conf
ping -c 1 google.com
traceroute www.yahoo.com
*Do obfuscate your IP address if necessary.
 
Old 01-18-2015, 07:58 PM   #26
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,659
Blog Entries: 4

Rep: Reputation: 3939Reputation: 3939Reputation: 3939Reputation: 3939Reputation: 3939Reputation: 3939Reputation: 3939Reputation: 3939Reputation: 3939Reputation: 3939Reputation: 3939
Also, let's be aware of any potential terminology issues here.

For example, to my ordinary vocabulary, "3G" refers specifically to a form of cell phone networking. These radio signals can't even be intercepted by computer hardware other than a properly enabled portable device such as a cell-phone or some tablets.

On the other hand, the term might be used (incorrectly, but "as slang") to refer to wireless connections in-general. (Which might be what UnSpawn is driving-at by asking for information from iwconfig.)

The post has now been made several times ... so it must be presumed to be serious. It has never yet been clearly expressed, to an English speaker. It has never, so far as I've yet seen, used the relevant technical terminology "correctly."

But terminology, and language, are human-communication obstacles that can be overcome.

(And, when your system is being hacked, and you [think you] know it but you don't know why or how, you can be forgiven for being distraught ...)

If the OP would post a description of the matter, in his/her own words, and in his/her native language, that response could be translated. And maybe, then, the communication obstacles could be overcome and the issue resolved to the satisfaction of all. (A PM from the Moderator team, backed-up by an accompanying e-mail??)

We definitely can't dismiss ... and certainly, are not dismissing or "dissing" ... the very real possibility of, say, someone who is deliberately trying to hijack the RF radio signal. This is actually a very serious vulnerability in public places like airports and coffee shops. If someone in the shop has a more-powerful radio transmitter than the shop does, he can, indeed, "hijack" the communications of other people in the shop such that he becomes the "man in the middle." If this sort of thing is, in fact, what the OP is describing (and, facing), then what he is talking about is, or can be, quite real.

So, let's see if we can find a way to overcome the human-communications issues and get to the bottom of this thing.

Last edited by sundialsvcs; 01-18-2015 at 08:09 PM.
 
Old 01-19-2015, 07:35 AM   #27
rtmistler
Moderator
 
Registered: Mar 2011
Location: USA
Distribution: MINT Debian, Angstrom, SUSE, Ubuntu, Debian
Posts: 9,882
Blog Entries: 13

Rep: Reputation: 4930Reputation: 4930Reputation: 4930Reputation: 4930Reputation: 4930Reputation: 4930Reputation: 4930Reputation: 4930Reputation: 4930Reputation: 4930Reputation: 4930
Yeah, but if someone's blocking or interfering with signal near this person, there are no recommendations we could offer except to get away from the area or if the activity is illegal, try to prove it and involve the authorities. For instance, cell phone blocking is illegal in the US, but a person may use that intermittently or in either case, I'm pretty sure if I call the local police, it's not like they'll have DF equipment, they'd probably have to call the FBI or some other agency and then they'd have to be pretty well convinced that something bad was going on; like they'd have to have received several complaints.

And if someone's hijacking signal and providing a replacement network. Similar problem. Solution is to get away and/or don't be a feeder station for their network. If the OP is handicapped and can't get away, I'm very sorry for their situation.

If I was in a situation where I could never trust my network, I'd have to live without being able to use that network and only be able to get back in to using INET services once I'd found a viable alternative that I could trust.
 
Old 01-19-2015, 06:50 PM   #28
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,659
Blog Entries: 4

Rep: Reputation: 3939Reputation: 3939Reputation: 3939Reputation: 3939Reputation: 3939Reputation: 3939Reputation: 3939Reputation: 3939Reputation: 3939Reputation: 3939Reputation: 3939
If the signal is cell phone, as "3G" implies, then it would be illegal to interfere with that signal, and (in the United States) a call to the local field-office of the Federal Communications Commission (FCC) would be a good place to start.

But ... "cell phone" implies that the device that's being hijacked is capable of participating on a cell-phone data network in the first place. I don't see clearly that this is the case.

If someone has simply set up "a fake wireless router" with a more-powerful signal strength ... actually quite easy to do ... then this would actually be a fairly familiar(!) attack strategy, especially in (say ...) an apartment building or certainly any coffee-shop.

Just hoping to hear from the OP soon ... in whatever (human) language breaks down the barrier and gets this issue disposed-of.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
HACKERS attacking me via their own 3g antenna [OT] John VV Linux - Security 5 01-14-2015 12:54 PM
Hackers attacking me via their own 3g antenna in ip6 i think [OT] pan64 Linux - Security 3 01-13-2015 05:36 PM
HACKERS attacking me via their own 3g antenna djnidec Linux - Security 11 01-13-2015 04:59 PM
Hackers attacking me via their own 3g antenna in ip6 i think djnidec Linux - Security 1 01-12-2015 06:09 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 12:54 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration