Monday, November 12, 2007

Is It Ok To Eat The Mold On Salami ?

how you intercept the computer .....!!!!

THE COMPUTER: A separate chapter is worth the computer. In other pages of this site there are several insights and demo software, even if the topic merits a discussion of the Bible. In this handbook we simply point out that using a PC to process, store or transmit confidential data really is the worst idea you can get! Unlike environmental espionage and telephone, computer espionage techniques is too complex for most users (but also for many experienced or assumed!); Possible attacks are so varied and extensive as to prohibit the DIY, especially in the event of significant economic or professional interests at stake.
comes to mind what has been learned recently from a publication concerning a man who had wanted to protect corporate data stored in the major pharmaceutical research and PC with expensive and sophisticated firewalls, scanners, systems encryption by National Security Agency, and then he was spied by a trivially small program freeware from a few bytes that "photographing" moderately active on a regular PC screens (hence the lyrics when they were not encrypted as being developed at that time ). Today you no longer need to be a hacker to break into our portentous secret information, perhaps by hundreds of miles away. Are there any programs that "geek" (which likes to call himself a hacker, but is little more than a praticone any) with a little 'practice can be used to steal information without our knowledge, internet, network, or with physical access and short spot to the PC, without leaving a trace. In
principle, we can recommend to dedicate a PC to private functions only if absolutely necessary, without activating the network functionality and without installing the network card, including the Internet that requires a protocol (TCP / IP) developed by Microsoft that is a veritable sieve in terms of confidentiality.
Take good habit to encrypt files, directories or entire hard disks that contain only secondary data systems with digital encryption min. 128-bit (see further information on this site), I'm not sure the safe solution for excellence, but serve to make life difficult for burglars. Dedicate
always a second hard drive (called secondary or slave) to your confidential data without activating no reason for "sharing" in the case (not recommended) in which you have enabled network capabilities.
Guard your PC in a locked room, do not ever let on and / or unattended, make use of passwords (not trivial), including those for screen-saver, which may serve to discourage or delay the action of those who must extract data quickly.
Never rely on only the password of Windows or Office (Excel / Word / PowerPoint / Access / Winzip, and other common programs) are easily breakable in seconds. Do not throw
floppy disk or CD ROM (although apparently no longer work) without them physically destroyed.
Keep backup of data, preferably on a CD ROM in a safe and reliable of a major bank. Do not rely on hiding the "smart" or unexpected.
The most delicate moment is when a fault occurs. If you can get ready before the technician taking care to remove all your confidential data, including e-mail. For example:
Activate one of the many programs WIPE ERASING (excellent example that came with Pretty Good Privacy) that do not just delete the data, but overwrites them to cancel the effect of any data recovery software deleted (see further information on this site).
If you can do it physically removed the secondary hard drive (the one containing the encrypted data above), especially if your PC is completely out of order, otherwise make it a gauge backup on CD-ROM without decrypting the data, and format it to zero (zero ATTENTION! level formatting is NOT the one offered by Windows, but a special kind of formatting that each hard disk manufacturers make available to customers for its products, see the website of the hard disk manufacturer to download a simple software useful for this purpose).
Always check the credentials of maintenance or repair. Do not trust friends, acquaintances, relatives or assistance "low cost" in general.
not hesitate to request the submission of your eyes to remove the primary hard disk or "master" Computer, prior to the repair of hardware damage necessitating intervention in the laboratory, even if you had already deleted the encrypted data from the hard disk secondary (or slave) or had already removed physically. Although all the sensitive data stored on the hard disk secondary, some leave traces when opening software, compression, decompression or back up files, including primary hard disk. The hard disk usually appears as a small metal box or wrapped in a thin layer of rubberized cm. 10x14x2, 5 alt. and can easily be removed and kept separately from the PC. Just reinstalled, the PC will regain all its normal functions, without losing anything. If you a serious company will understand, and can repair a defect of PC hardware including placing a temporary hard disk, with a slight rise in costs in the worst case. If this is not possible (for example, the damage may not be hardware but software, in the sense that it becomes necessary to reinstall your operating system or work on it) requires that the entire operation is carried out so that you can personally follow all phases, without specifying that maybe you will not want crabs and diverting any specific technical questions or comments. Repair or reinstall an operating system is an operation that can also be done at the customer. The only your presence, combined with doubts about the technical your real knowledge, it is a deterrent to the installation of such a program from the control (see further information on this site) or the attempt to search for deleted files (technical operations are not possible but that requires fast and that can hardly pssare unnoticed even at a untrained eye).
If you know you have already made that back up your data before surgery, given the go-ahead to a possible technical assistance to reformat the primary hard disk to play without his additional back up of any kind. Work is finished reinstall your personal files encrypted by the backup on CD ROM or re-introduce the secondary hard drive in your care.
Privileged use of Laptop or Notebook with easily removable hard disk, you can hide or lock up in a safe (the entire notebook or hard drive only), more than you can do with a traditional desktop.
audio-visual equipment: Progress incredibly short, after years of stagnation, has recently focused on the most common audio-visual equipment, from bugs. The prices of infrared viewers (which allows the human eye or an audiovisual tool to see perfectly in complete darkness) are in free fall. Many people do not know and do not imagine that with modest costs today to buy amazing tools, with power approaching that until a few years ago were considered science fiction for those costs. A video camera with zoom 128x "now costs just over 700,000 pounds, and is a common object. With similar apparatus can be conveniently read the license plate of a car from a mile away, or see the presence of a coin from a mile away! Many of these cameras are now at 0 LUX, which simply means that with a little 'infrared light easily generated by ordinary infrared LED illuminators or a few thousand pounds, see and reproduce well in total darkness. Obviously, the infrared light is not seen by the human eye, which continues to see only darkness where there is darkness. Avoid appointments "reserved" in parks and outdoor locations (the "classical" bench). There are systems for capturing voice signals to detect a quiet conversation with a middle voice also carried out to 100 feet away, allowing easy recording. Preferring the conversation moving with constant moderate voice in the crowded streets and traffic. Do not go home "him" or "her" the first chance meeting. More and more cases of hidden SPY CAM, resulting in the production of erotic material or the public via the Internet for millions of fans of voyeurism, they pay handsomely for these goodies "home made". Finally, avoid the car for meetings or private conversations. It 'all too easily controlled with simple bugs (also unlimited scope via GSM network) and locates easily with GPS systems or determination.

0 comments:

Post a Comment