Hackers Secret Weapons - Virtual Private Networks

T

Tracker

For one, if your on a Windows Platform and you didn't disable a number
of services which are enabled by default, including file and print
sharing, the chances of your computer being hacked/owned are very high.
Also, if you haven’t secured your browser or e-mail programs this can
cause your computer to be hacked/owned. Not disabling these services
and not having a firewall or anti-virus program from the beginning of
your computer going on the internet, is a loss cause. Backdoors and
Trojan Horses disable your anti-virus and firewalls. So checking for
open ports no matter where you go or how you test your ports will not
give you accurate results. GRC shields-up has on one occasion showed my
computer as having port 110 open. The reason for this is because a
malicious hacker was using my e-mail application at the time my computer
was checked for open ports.

If your on a Windows Platform (minus XP and NT), select Start, Settings,
Control Panel, Folder Options, View and make sure you select and have a
dot in the circle where it says Show Hidden Files and Folders.

Select Start, Control Panel, Network, and if you see two AOL adapters,
two TCP/IP, two dial-up adapters, one or two Virtual Private Network
adapters your computer has what hackers install called a Virtual Private
Network, BEWARE!

If you find your system re-boots itself from time to time, this
is another sign that an Administrator (hacker) has to update your
hacked system.

Select Start, type regedit, select Registry, Export Registry, and in
the box type say 3-12-02.txt and say OK. Then open this file with
a text editor or word application and you might be "shocked" to find
what
really is installed on your system. Check the bottom of this file,
since
hackers love to install a bunch of their crap here.

What these hackers do is disable your anti-virus program using Trojan
Horses, which makes checking for viruses or trojans useless. If running

a software firewall, the hackers install another version of what your
running
and program it so you aren't able to see their activities.

Once these factors take into play, the best bet to keep the hackers
out of your system is to perform the below.
My suggestion would be to keep the hard drive (sent it to the FBI, minus
your
personal files). Or make a copy of your entire hard drive, this way if
the hackers have destroyed any system using your computer, at least you
have evidence if the FBI ever come knock on your door. The Trackers
would like a copy, but that's another story in itself.

You might want to format the hard drive, install from CD-ROM only and
obtain a free port scanner for your operating system. You can download
one from zdnet.com, and before you go online, port scan your own
computer to check for any open ports. Backdoors, Trojan Horses and
Viruses are not the consideration you need to be concerned with when
your system is hacked. Your system can also be running a Proxy Server,
NNTP Server, SMTP Server, Web Server, SQL Server and a Virtual Private
Network. All of these factors need to be taken into consideration.

Tracker

The Best Kept Secrets of Backdoors, Cracking, Firewalls, Hacking,
Proxies, The Internet, Trojan Horses, Virtual Private Networks, Virus,
Windows and different types of Servers can be found at:
http://geocities.com/secure2003222000
 
H

Heather

Aha.......I see you know Debbie and her ferrets well!! We get her
ramblings on alt.comp.virus and she has managed to figure out how to
crosspost there.

There is no point in explaining anything to her......she won't
understand it. In the same manner as she doesn't have a clue what she
is talking about in this socalled book she is peddling (which only has
an index).

Off I go looking for her picture which surfaced after she started
signing herself as "Beef's Old Lady".........now, doesn't that give you
a lovely visual??? Bwa ha ha!! The Biker Babe, Beef and the
ferrets......ROFL!!

Heather
 
R

Richard G. Harper [MVP Win9x]

I wasn't bothering to try to enlighten Debbie, you can't educate a wall.
But the lurkers, I figured, would benefit from some balanced enlightenment.
<VBSEG>
 
P

PCR

| Sure, let's break our home network. Any REAL security expert knows
that all
| you need to do to remove this risk is remove Client for Microsoft
Networks
| and File and Printer Sharing bindings from your active Internet
connection.
| That keeps the network intact and denies anyone hacking rights.

Client for Microsoft Networks is required by NetZero, or so their docks
say. Suppose I just disable sharing-- good enough? (Well, they are
already unchecked.)

Here are my settings at "Control Panel, Network", as "required" by
NetZero (although some of it was not always like this)...

....Configuration tab...
Client for Microsoft Networks
Dial-Up Adapter
TCP/IP

....My Bindings are...
Dial-Up Adapter to TCP/IP.
TCP/IP to Client for Microsoft Networks.

....Dial-up Adapter, Properties...
....Advanced button....
Enable Point To Point IP Yes
IP Packet Size Large
Record a log file No
Use IPX header compression No

....TCP/IP Properties...
DNS Configuration tab...... Disable DNS
WINS Configuration tab... Disable WINS
Advanced tab... Allow Binding to ATM... No

--
Thanks or Good Luck,
There may be humor in this post, and,
Naturally, you will not sue,
should things get worse after this,
PCR
(e-mail address removed)
| You again? At least this time you didn't crosspost to all those nasty
ALT
| newsgroups.
|
| > Select Start, Control Panel, Network, and if you see two AOL
adapters,
| > two TCP/IP, two dial-up adapters, one or two Virtual Private Network
| > adapters your computer has what hackers install called a Virtual
Private
| > Network, BEWARE!
|
| Pish-posh. What you have is a VPN adapter that lets your computer
establish
| a PPTP (Point to Point Tunneling Protocol) secure connection to
another
| network, usually a work network. This is a CLIENT-SIDE connection,
meaning
| it can only MAKE a connection to a host. It cannot ACCEPT a
connection and
| is no security risk whatsoever.
|
| > For one, if your on a Windows Platform and you didn't disable a
number
| > of services which are enabled by default, including file and print
| > sharing, the chances of your computer being hacked/owned are very
high.
|
| Sure, let's break our home network. Any REAL security expert knows
that all
| you need to do to remove this risk is remove Client for Microsoft
Networks
| and File and Printer Sharing bindings from your active Internet
connection.
| That keeps the network intact and denies anyone hacking rights.
|
| > If you find your system re-boots itself from time to time, this
| > is another sign that an Administrator (hacker) has to update your
| > hacked system.
|
| Yep. Watch for the black helicopters and you'll see them using their
| wireless devices to hack your network, too.
|
| > Select Start, type regedit, select Registry, Export Registry, and in
| > the box type say 3-12-02.txt and say OK. Then open this file with
| > a text editor or word application and you might be "shocked" to find
| > what really is installed on your system. Check the bottom of this
| > file since hackers love to install a bunch of their crap here.
|
| This almost makes some sense, except that the paranoid will see stuff
in
| there that is of no consequence to anyone or anything. The Registry
stores
| lists of recently used files, recent shortcuts, recent Web pages
visited ...
| and this is all by design, for your convenience. This data is not
| accessible to anyone by any means short of an actual security
penetration of
| your system ... and if that happens it's too late anyway since the
hacker
| will probably not care what Web pages you visit, they're looking to
trash
| your system.
|
| > Once these factors take into play, the best bet to keep the hackers
| > out of your system is to perform the below.
| > My suggestion would be to keep the hard drive (sent it to the FBI,
minus
| > your personal files). Or make a copy of your entire hard drive,
this way
| if
| > the hackers have destroyed any system using your computer, at least
you
| > have evidence if the FBI ever come knock on your door. The Trackers
| > would like a copy, but that's another story in itself.
|
| Why not just use one of these:
|
| http://zapatopi.net/afdb.html
|
| What you suggest would be of no benefit to denying hackers access to
your
| system, and I'll bet that if you walk into your local FBI office with
your
| hard drive claiming you've been "hacked" or "owned" they'll laugh you
right
| back out the door again.
|
| > Viruses are not the consideration you need to be concerned with when
| > your system is hacked. Your system can also be running a Proxy
Server,
| > NNTP Server, SMTP Server, Web Server, SQL Server and a Virtual
Private
| > Network. All of these factors need to be taken into consideration.
|
| Just unplug your system and do us all a favor. OK?
|
| --
| Richard G. Harper (MVP Win9x) (e-mail address removed)
| * PLEASE post all messages and replies to the newsgroup so all may
| * benefit from the discussion. Private mail is usually not replied
to.
| Help US help YOU ... http://www.dts-l.org/goodpost.htm
|
|
 
R

Richard G. Harper [MVP Win9x]

What I meant was, uncheck only the Client for Microsoft Networks -> (your
Internet connection device) entry. You don't have to remove CfMN, just
un-bind it from the Internet connection device.
 
P

PCR

So, looking at my settings again, I remove the binding of TCP/IP to
CfMN-- & everything might still work?

Here are my settings at "Control Panel, Network", as "required" by
NetZero (although some of it was not always like this)...

....Configuration tab...
Client for Microsoft Networks
Dial-Up Adapter
TCP/IP

....My Bindings are...
Dial-Up Adapter to TCP/IP.
TCP/IP to Client for Microsoft Networks.

....Dial-up Adapter, Properties...
....Advanced button....
Enable Point To Point IP Yes
IP Packet Size Large
Record a log file No
Use IPX header compression No

....TCP/IP Properties...
DNS Configuration tab...... Disable DNS
WINS Configuration tab... Disable WINS
Advanced tab... Allow Binding to ATM... No

--
Thanks or Good Luck,
There may be humor in this post, and,
Naturally, you will not sue,
should things get worse after this,
PCR
(e-mail address removed)
| What I meant was, uncheck only the Client for Microsoft Networks ->
(your
| Internet connection device) entry. You don't have to remove CfMN,
just
| un-bind it from the Internet connection device.
|
| --
| Richard G. Harper (MVP Win9x) (e-mail address removed)
| * PLEASE post all messages and replies to the newsgroup so all may
| * benefit from the discussion. Private mail is usually not replied
to.
| Help US help YOU ... http://www.dts-l.org/goodpost.htm
|
|
| | > I guess I am safe, then. Some day, I may try a firewall, anyway,
just to
| > see what that is like. Without CfMN in there, I would have nothing
to
| > bind to. I suppose it is OK as is. Thanks.
| >
| > --
| > Thanks or Good Luck,
| > There may be humor in this post, and,
| > Naturally, you will not sue,
| > should things get worse after this,
| > PCR
| > (e-mail address removed)
message
| > | > | Disabling F&PS will prevent anyone from browsing your network for
| > shares.
| > | You can always try un-checking Client for Microsoft Networks and
| > connecting
| > | to Netzero ... if it doesn't work you know what to fix. :)
| > |
| > | --
| > | Richard G. Harper (MVP Win9x) (e-mail address removed)
| > | * PLEASE post all messages and replies to the newsgroup so all may
| > | * benefit from the discussion. Private mail is usually not
replied
| > to.
| > | Help US help YOU ... http://www.dts-l.org/goodpost.htm
....snip
 
R

Richard G. Harper [MVP Win9x]

I think I mis-spoke myself in the last post so let me back up a step and try
again.

Highlight the "TCP/IP -> (your Internet connection)" entry and select
Properties. You'll get a warning that you're about to change global TCP
properties, and that's OK. On the Bindings tab, you'll find "Client for
Microsoft Networks" and "File and Printer Sharing" - both should be able to
be un-checked without any problems. Save and exit, restart the system when
prompted.

If for some reason the Internet connection does fail, reverse the above and
re-check the "Client for Microsoft Networks" entry. Leaving "File and
Printer Sharing" unchecked should provide a reasonable level of protection.

Of course, if you wanted to get completely paranoid about the subject, you
could always install IPX/SPX or NetBEUI and bind them to Client for
Microsoft Networks, then remove TCP/IP from the Client for Microsoft
Networks. I generally don't recommend this because IPX and NetBEUI each
have their own little peccadilloes that make troubleshooting a network based
on them more complex than if you just stick with TCP/IP.
 
P

PCR

OK, I fully understand now, if not before. I think I am happy enough
with the protection I get with "File and Printer Sharing" already
unchecked. I do know I was happy to see how spare I already was in
"Control Panel, Network, Configuration tab", even when I still had "MS
Family Logon" in there. Now, with just those three left, I think I'm
happy/safe enough-- "a reasonable level of protection", as you put it.

OK, thanks, Harper.

--
Thanks or Good Luck,
There may be humor in this post, and,
Naturally, you will not sue,
should things get worse after this,
PCR
(e-mail address removed)
| I think I mis-spoke myself in the last post so let me back up a step
and try
| again.
|
| Highlight the "TCP/IP -> (your Internet connection)" entry and select
| Properties. You'll get a warning that you're about to change global
TCP
| properties, and that's OK. On the Bindings tab, you'll find "Client
for
| Microsoft Networks" and "File and Printer Sharing" - both should be
able to
| be un-checked without any problems. Save and exit, restart the system
when
| prompted.
|
| If for some reason the Internet connection does fail, reverse the
above and
| re-check the "Client for Microsoft Networks" entry. Leaving "File and
| Printer Sharing" unchecked should provide a reasonable level of
protection.
|
| Of course, if you wanted to get completely paranoid about the subject,
you
| could always install IPX/SPX or NetBEUI and bind them to Client for
| Microsoft Networks, then remove TCP/IP from the Client for Microsoft
| Networks. I generally don't recommend this because IPX and NetBEUI
each
| have their own little peccadilloes that make troubleshooting a network
based
| on them more complex than if you just stick with TCP/IP.
|
| --
| Richard G. Harper (MVP Win9x) (e-mail address removed)
| * PLEASE post all messages and replies to the newsgroup so all may
| * benefit from the discussion. Private mail is usually not replied
to.
| Help US help YOU ... http://www.dts-l.org/goodpost.htm
|
|
| | > So, looking at my settings again, I remove the binding of TCP/IP to
| > CfMN-- & everything might still work?
| >
| > Here are my settings at "Control Panel, Network", as "required" by
| > NetZero (although some of it was not always like this)...
| >
| > ...Configuration tab...
| > Client for Microsoft Networks
| > Dial-Up Adapter
| > TCP/IP
| >
| > ...My Bindings are...
| > Dial-Up Adapter to TCP/IP.
| > TCP/IP to Client for Microsoft Networks.
| >
| > ...Dial-up Adapter, Properties...
| > ...Advanced button....
| > Enable Point To Point IP Yes
| > IP Packet Size Large
| > Record a log file No
| > Use IPX header compression No
| >
| > ...TCP/IP Properties...
| > DNS Configuration tab...... Disable DNS
| > WINS Configuration tab... Disable WINS
| > Advanced tab... Allow Binding to ATM... No
| >
| > --
| > Thanks or Good Luck,
| > There may be humor in this post, and,
| > Naturally, you will not sue,
| > should things get worse after this,
| > PCR
| > (e-mail address removed)
message
| > | > | What I meant was, uncheck only the Client for Microsoft
Networks ->
| > (your
| > | Internet connection device) entry. You don't have to remove CfMN,
| > just
| > | un-bind it from the Internet connection device.
| > |
| > | --
| > | Richard G. Harper (MVP Win9x) (e-mail address removed)
| > | * PLEASE post all messages and replies to the newsgroup so all may
| > | * benefit from the discussion. Private mail is usually not
replied
| > to.
| > | Help US help YOU ... http://www.dts-l.org/goodpost.htm
| > |
| > |
| > | | > | > I guess I am safe, then. Some day, I may try a firewall, anyway,
| > just to
| > | > see what that is like. Without CfMN in there, I would have
nothing
| > to
| > | > bind to. I suppose it is OK as is. Thanks.
| > | >
| > | > --
| > | > Thanks or Good Luck,
| > | > There may be humor in this post, and,
| > | > Naturally, you will not sue,
| > | > should things get worse after this,
| > | > PCR
| > | > (e-mail address removed)
| > message
| > | > | > | > | Disabling F&PS will prevent anyone from browsing your network
for
| > | > shares.
| > | > | You can always try un-checking Client for Microsoft Networks
and
| > | > connecting
| > | > | to Netzero ... if it doesn't work you know what to fix. :)
| > | > |
| > | > | --
| > | > | Richard G. Harper (MVP Win9x) (e-mail address removed)
| > | > | * PLEASE post all messages and replies to the newsgroup so all
may
| > | > | * benefit from the discussion. Private mail is usually not
| > replied
| > | > to.
| > | > | Help US help YOU ... http://www.dts-l.org/goodpost.htm
| > ...snip
| >
| >
|
|
 
R

Richard G. Harper [MVP Win9x]

Happy to have been of assistance. Now upgrade to XP so you can be really
safe.

<VD&RVVF>
 
P

PCR

Ahhhhhh! Never!

--
Thanks or Good Luck,
There may be humor in this post, and,
Naturally, you will not sue,
should things get worse after this,
PCR
(e-mail address removed)
| Happy to have been of assistance. Now upgrade to XP so you can be
really
| safe.
|
| <VD&RVVF>
|
| --
| Richard G. Harper (MVP Win9x) (e-mail address removed)
| * PLEASE post all messages and replies to the newsgroup so all may
| * benefit from the discussion. Private mail is usually not replied
to.
| Help US help YOU ... http://www.dts-l.org/goodpost.htm
|
|
| | > OK, I fully understand now, if not before. I think I am happy enough
| > with the protection I get with "File and Printer Sharing" already
| > unchecked. I do know I was happy to see how spare I already was in
| > "Control Panel, Network, Configuration tab", even when I still had
"MS
| > Family Logon" in there. Now, with just those three left, I think I'm
| > happy/safe enough-- "a reasonable level of protection", as you put
it.
| >
| > OK, thanks, Harper.
| >
| > --
| > Thanks or Good Luck,
| > There may be humor in this post, and,
| > Naturally, you will not sue,
| > should things get worse after this,
| > PCR
| > (e-mail address removed)
message
| > | > | I think I mis-spoke myself in the last post so let me back up a
step
| > and try
| > | again.
| > |
| > | Highlight the "TCP/IP -> (your Internet connection)" entry and
select
| > | Properties. You'll get a warning that you're about to change
global
| > TCP
| > | properties, and that's OK. On the Bindings tab, you'll find
"Client
| > for
| > | Microsoft Networks" and "File and Printer Sharing" - both should
be
| > able to
| > | be un-checked without any problems. Save and exit, restart the
system
| > when
| > | prompted.
| > |
| > | If for some reason the Internet connection does fail, reverse the
| > above and
| > | re-check the "Client for Microsoft Networks" entry. Leaving "File
and
| > | Printer Sharing" unchecked should provide a reasonable level of
| > protection.
| > |
| > | Of course, if you wanted to get completely paranoid about the
subject,
| > you
| > | could always install IPX/SPX or NetBEUI and bind them to Client
for
| > | Microsoft Networks, then remove TCP/IP from the Client for
Microsoft
| > | Networks. I generally don't recommend this because IPX and
NetBEUI
| > each
| > | have their own little peccadilloes that make troubleshooting a
network
| > based
| > | on them more complex than if you just stick with TCP/IP.
| > |
| > | --
| > | Richard G. Harper (MVP Win9x) (e-mail address removed)
| > | * PLEASE post all messages and replies to the newsgroup so all may
| > | * benefit from the discussion. Private mail is usually not
replied
| > to.
| > | Help US help YOU ... http://www.dts-l.org/goodpost.htm
| > |
| > |
| > | | > | > So, looking at my settings again, I remove the binding of TCP/IP
to
| > | > CfMN-- & everything might still work?
| > | >
| > | > Here are my settings at "Control Panel, Network", as "required"
by
| > | > NetZero (although some of it was not always like this)...
| > | >
| > | > ...Configuration tab...
| > | > Client for Microsoft Networks
| > | > Dial-Up Adapter
| > | > TCP/IP
| > | >
| > | > ...My Bindings are...
| > | > Dial-Up Adapter to TCP/IP.
| > | > TCP/IP to Client for Microsoft Networks.
| > | >
| > | > ...Dial-up Adapter, Properties...
| > | > ...Advanced button....
| > | > Enable Point To Point IP Yes
| > | > IP Packet Size Large
| > | > Record a log file No
| > | > Use IPX header compression No
| > | >
| > | > ...TCP/IP Properties...
| > | > DNS Configuration tab...... Disable DNS
| > | > WINS Configuration tab... Disable WINS
| > | > Advanced tab... Allow Binding to ATM... No
| > | >
| > | > --
| > | > Thanks or Good Luck,
| > | > There may be humor in this post, and,
| > | > Naturally, you will not sue,
| > | > should things get worse after this,
| > | > PCR
| > | > (e-mail address removed)
| > message
| > | > | > | > | What I meant was, uncheck only the Client for Microsoft
| > Networks ->
| > | > (your
| > | > | Internet connection device) entry. You don't have to remove
CfMN,
| > | > just
| > | > | un-bind it from the Internet connection device.
| > | > |
| > | > | --
| > | > | Richard G. Harper (MVP Win9x) (e-mail address removed)
| > | > | * PLEASE post all messages and replies to the newsgroup so all
may
| > | > | * benefit from the discussion. Private mail is usually not
| > replied
| > | > to.
| > | > | Help US help YOU ... http://www.dts-l.org/goodpost.htm
| > | > |
| > | > |
| > | > | | > | > | > I guess I am safe, then. Some day, I may try a firewall,
anyway,
| > | > just to
| > | > | > see what that is like. Without CfMN in there, I would have
| > nothing
| > | > to
| > | > | > bind to. I suppose it is OK as is. Thanks.
| > | > | >
| > | > | > --
| > | > | > Thanks or Good Luck,
| > | > | > There may be humor in this post, and,
| > | > | > Naturally, you will not sue,
| > | > | > should things get worse after this,
| > | > | > PCR
| > | > | > (e-mail address removed)
in
| > | > message
| > | > | > | > | > | > | Disabling F&PS will prevent anyone from browsing your
network
| > for
| > | > | > shares.
| > | > | > | You can always try un-checking Client for Microsoft
Networks
| > and
| > | > | > connecting
| > | > | > | to Netzero ... if it doesn't work you know what to fix.
:)
| > | > | > |
| > | > | > | --
| > | > | > | Richard G. Harper (MVP Win9x) (e-mail address removed)
| > | > | > | * PLEASE post all messages and replies to the newsgroup so
all
| > may
| > | > | > | * benefit from the discussion. Private mail is usually
not
| > | > replied
| > | > | > to.
| > | > | > | Help US help YOU ... http://www.dts-l.org/goodpost.htm
| > | > ...snip
| > | >
| > | >
| > |
| > |
| >
| >
|
|
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Similar Threads


Top