Latest Posts
Showing posts with label security. Show all posts
Showing posts with label security. Show all posts

09 July 2014

Top 10 Free Vpn Services!!!



Top 10 Free VPN Servies
First of all, lets talk about what a VPN is.
VPN simply means “Virtual Private Network”. Basically it’s a private network which lets users to connect to other users or remote sites using a public network usually internet. It uses “virtual” connections routed through the Internet from the company’s private network to the remote site or employee instead of physical connections. In short , it is private network constructed within a public network infrastructure, such as the global Internet.
Why You Need VPN

To protect privacy, either on a LAN or a public hotspot.
Anonymous Internet Surfing Full anonymity by hiding your real IP address.
Bypass geographical blocks from certain websites Unlike a proxy, you get secured connection for all programs you are using Quality Network ensures your VPN service will be fast wherever you are in the world Protection against your ISP Bypass ISP Blocking for VOIP Applications like Skype.

Top 10 Free VPN Servies
1. UltraVPN
(https://www.ultravpn.fr/) It is a free VPN client/ server SSL VPN solution based on OpenVPN. It encrypts and anonymizes your network connection making your connection safe and secure. You need to download and install the client and create a (username, password) to use this service.
2. Logmein Hamachi
( https://secure.logmein.com/products/hamachi2/download.aspx )
It’s a great free VPN service from the well known guys who are behind the Logmein Service of remote apps management. It’s free for non-commercial and personal use. Features : No hardware required – A quick, simple and easy-to-use VPN that just works Secure communications – Encrypted tunneling across public and private networks Flexible networking – Combines the ease of an SSL VPN with the connectivity of an IP-sec VPN Web-based management – Deploy to anyone, manage from anywhere, access anytime Free for non-commercial usage – Absolutely free for non- commercial use.
3. Packetix
(http://www.packetix.net/en/)
Its a japanese free VPN solution with technology developed by SoftEther Corporation.You can use PacketiX.NET online test service for free.Here’s what you can do with this service. You can create your private Virtual VPN Hub. You can configure and use the hub for free.You can use all functions the PacketiX VPN software has to offer, such as creating a remote connection to your home network or uniting local networks at different sites. With our system, you won’t need to set up a VPN server with a global IP address yourself. The VPN server administration is done over an easy web interface.
4. Open VPN
( http://openvpn.net/index.php/opensource/downloads.html )
Open VPN drives UltraVPN, OpenVPN is a SSL/TLS based VPN, it provides high security and privacy. The biggest difference between PPTP VPN and OpenVPN is you need install OpenVPN client software to use OpenVPN service, and OpenVPN DO NOT work on mobile devices such as Iphone, Ipad Windows Mobile and Android. But OpenVPN works on Windows, Mac and Linux.
5. Your Freedom
( http://www.your-freedom.net/index.php?id=downloads )
This one is basically not a VPN service but its performs almost the same function with great ease, hence i included this in this list. It provides both a free and paid service. Free service limits to six hours of usage per day (up to 18 hours per week). You need to install a client on your system and a user name & password to use this.
6. Macro VPN
(http://www.macrovpn.com/)
Just like other services MacroVPN offer free VPN service for the user’s, it provides 128bit PPTP encrypted VPN Connection Service, protection on wifi hotspot. Normally assigned US based IP’s.
7. Hotspot Shield
( http://hotspotshield.com/?lg=en)
Hotspot Shield is a free VPN service which protects your entire web surfing session; securing your connection at both your home Internet network & Public Internet networks (both wired and wireless) . Hotspot Shield protects your identity by ensuring that all web transactions (shopping, filling out forms, downloads) are secured through HTTPS.Here also, you need to download and install a client to use it on your computer.
8. Its Hidden
(http://itshidden.com/)
Itshidden is part of Port 80 Limited(Seychelles) company providing both free VPN and paid services of VPN It creates a secure connection encrypting all the data protecting your privacy and securing you. You dont need to install any software. ItsHidden.com works on all Platforms including Windows, Mac, Linux, IPhone etc
9. CyberGhost
(http://cyberghostvpn.com/)
This a free VPN service from Germany which helps you route you through a German IP. The free service is limited to 10GB traffic every month, which is more than enough for surfing on websites, chatting and email.
10. Gpass
( http://gpass1.com/gpass/)
This is another free VPN service product of the World’s Gate, Inc which offers Internet solutions for information freedom in China and other regions. You need to install a software client to use this.
Read more ...

06 July 2014

How to Set Up Port Forwarding on a Router

Port forwarding opens certain ports on your home or small business network, usually blocked from access by your router, to the Internet. Opening specific ports can allow games, servers, BitTorrent clients, and other applications to work through the usual security of your router that otherwise does not permit connections to these ports. Follow this guide to forward the ports you need, regardless of your operating system.

Steps

  1. Set Up Port Forwarding on a Router Step 1 Version 2.jpg
    1
    Enter your router’s IP address into the address bar of a web browser. This will open your router’s configuration page. For most routers, this will be 192.168.0.1, 192.168.1.1, or 192.168.2.1. However, if you want to figure out the IP, here's how to do it:[1]
    • For Windows: Open the command prompt and enter ipconfig /all. The router’s IP address is usually the same as the Default Gateway.
    • For Mac: Open the terminal and enter netstat -nr.
    • For Linux: Open the terminal and enter route.
  2. Set Up Port Forwarding on a Router Step 2 Version 2.jpg
    2
    Enter your username and password. If you've already configured the security settings for your router, enter the username and password you chose then. If not, here are some of the most common default logins:[2]
    • On Linksys routers, type "admin" for both the username and the password.
    • On Netgear routers, type "admin" for the username and "password" for the password.
    • On other routers, try leaving the username empty and entering "admin" for the password.
    • You can visit sites such as RouterPasswords.com and enter in your router’s model to find the default password.
    • If you've forgotten your login information, you can press the reset button on your router to reset it to factory defaults. You can then look up the factory default settings online.
  3. Set Up Port Forwarding on a Router Step 3 Version 2.jpg
    3
    Find the Port Forwarding section. Each router will be slightly different. Common labels are Port Forwarding, Applications, Gaming, Virtual Servers. If you don't see one of these or something similar, try Advanced Settings and look for a Port Forwarding subsection.
  4. Set Up Port Forwarding on a Router Step 4Bullet1.jpg
    4
    Find a preconfigured entry. Many routers will have a dropdown menu with preconfigured options for well-known applications. If you need to open ports for one of these applications, select it from the list.
  5. 5
    Create a custom entry. If the program you want to add is not listed, you will need to create a custom port forwarding entry. Each router will have a slightly different way of doing this, although the required information is the same for any router:
    • Enter a name for the service. Name it something related to the program so that you know what the entry is for.
    • Choose the service type. This can be TCP, UDP, or both. The service type depends on what program you are unblocking. If you are unsure, select the TCP/UPD option.
      Set Up Port Forwarding on a Router Step 4Bullet3.jpg
    • Select the ports you wish to use. If you only want one port open, enter the same number in Start and End. If you wish to open a range of ports (say 5), you might type 3784 in Start and 3788 in End.
      Set Up Port Forwarding on a Router Step 4Bullet2.jpg
    • Select the internal IP address to assign the port forwarding to. This is the IP address of the computer running the application that you are unblocking. Check out the guides for PC or Mac to find your internal IP.
  6. Set Up Port Forwarding on a Router Step 5 Version 2.jpg
    6
    Save your settings. You may have an Apply button instead of Save. You might need to restart your router for them to take effect.
Read more ...

04 July 2014

Beware of NSA If You Are Privacy Conscious and Security Enthusiast Friday,

 
 
We all are aware of the National Security Agency’s (NSA) mass surveillance program to track non-Americans. Thanks to former NSA contractor Edward Snowden, who provided confidential documents about the widely spread surveillance programs conducted by the government intelligence agency such as NSA and GCHQ.
A recent story about NSA surveillance broke when a German public broadcaster ARD published that the Agency is using its surveillance program XKeyScore to target users who use encryption and traffic anonymizing software, including Tor Network for anonymous Web browsing and Linux-based Tails operating system in an effort to keep tracks of people outside the US.
XKeyScore is a powerful NSA surveillance program that collects and sorts intercepted data, which came to limelight in documents leaked by former NSA contractor Edward Snowden last summer, but the greater detail in an investigation conducted by American security expert and Tor Project member Jacob Appelbaum, Aaron Gibsom, and Leif Ryge shows that how the agency monitors people trying to protect their privacy online, may have not come from the documents Snowden provided to journalists.

Tor network offers users browse the Internet anonymously and is mostly used by activists, journalists to conceal their online activities from prying eyes. Whereas, Tails is a live media Linux distro designed boot into a highly secure desktop environment and is different because it is aimed at the privacy conscious “normal user” rather than government workers.
The documents for the NSA’s XKeyscore Internet surveillance system also indicate that the NSA was apparently capturing the traffic of anyone reading a wide range of articles on Linux Journal website and gathering up information of the visitors.
The documents provided by Snowden on X-Keyscore last year indicated that the surveillance program allowed NSA officials to obtain a person's phone number or email address, read the content of email, and track full Internet activity including browsing history without bothering the need of any warrant.
The analysis of the top-secret source code for X-Keyscore the NSA uses to conduct internet surveillance indicates that the program targeted at least two German Tor Directory Authority servers, one based in Berlin and the other in Nuremberg, as well as individuals using Tor.
It’s not just Tor and Tails the NSA is collecting data from. The report also reveals this code:
// START_DEFINITION
/*These variables define terms and websites relating to the TAILs (The Amnesic Incognito Live System) software program, a comsec mechanism advocated by extremists on extremist forums. */
$TAILS_terms=word('tails' or 'Amnesiac Incognito Live System') and word('linux' or ' USB ' or ' CD ' or 'secure desktop' or ' IRC ' or 'truecrypt' or ' tor ');
$TAILS_websites=('tails.boum.org/') or ('linuxjournal.com/content/linux*');
// END_DEFINITION
"Months of investigation by the German public television broadcasters NDR and WDR (ARD), drawing on exclusive access to top secret NSA source code, interviews with former NSA employees, and the review of secret documents of the German government reveal that not only is the server in Nuremberg under observation by the NSA, but so is virtually anyone who has taken an interest in several well-known privacy software systems," reads the ARD report.
However, the source code also reveals that the NSA has targeted a German student who runs a Tor node, under the XKeyscore program. Still, it is unclear how ARD obtained the NSA source code, and the broadcaster made no mention in its report of Snowden, or the documents he leaked.

UPDATE
In response to ARD's allegations relating to the details uncovered in the Xkeyscore source code, the NSA provided the following statement:

NSA collects only what it is authorized by law to collect for valid foreign intelligence purposes - regardless of the technical means used by foreign intelligence targets. The communications of people who are not foreign intelligence targets are of no use to the agency.

In January, President Obama issued U.S. Presidential Policy Directive 28, which affirms that all persons - regardless of nationality - have legitimate privacy interests in the handling of their personal information, and that privacy and civil liberties shall be integral considerations in the planning of U.S. signals intelligence activities.

The president's directive also makes clear that the United States does not collect signals intelligence for the purpose of suppressing or burdening criticism or dissent, or for disadvantaging persons based on their ethnicity, race, gender, sexual orientation, or religion.

XKeyscore is an analytic tool that is used as a part of NSA's lawful foreign signals intelligence collection system. Such tools have stringent oversight and compliance mechanisms built in at several levels. The use of XKeyscore allows the agency to help defend the nation and protect U.S. and allied troops abroad. All of NSA's operations are conducted in strict accordance with the rule of law, including the President's new directive.
Read more ...
Designed By Published.. Blogger Templates