pulleddown
03-13-2012, 09:06 AM
On the video thread, I noted some posts about a potential virus. Thought I would write a brief bit on security when surfing porn. This may require $200 - $340 up front plus about $8 - $15/ month and either patience or a powerful machine with lots of RAM.
1) Buy VMWare Workstation 8 for $200 or find a friend who can set up the virtual machine and then you can run it with free VMWare Player. Mac users can use Fusion but I do not believe it has the encryption function yet (Workstation just introduced this as of version 8 so it may appear in a future Fusion version.)
2) Install either Linux or Windows (or both). This is where the maybe $140 comes in to buy windows.
3) If in USA or other country where law enforcement cannot force you to give up passwords, encrypt the virtual machine using VMWare’s built in encryption. I tried running the VM from a BestCrypt disk and this brought my rather powerful workstation-class machine to a crawl. Use the VMWare one. (I don’t know if VMWare Player supports encryption)
4) Put your files you download in a TrueCrypt or BestCrypt folder. If not in USA, consider the hidden partition both of these products have. This will further protect your data from prying eyes. Here, TrueCrypt runs quite OK.
5) Run reasonably frequent VMWare Snapshots. Much more robust than Windows snapshots as they are stored outside of the running virtual machine and would therefore be impervious to virus attack.
6) Use a VPN service run out of a country that does not require they maintain logs such as the Seychelles. This also allows you to get to turbobit if you are in the USA.
This should protect well against viruses – at least you can go back to a prior version if the attack is successful. To get to your files, outside ****** would need to do one of the following:
1) Install a keylogger. This would require access to the computer without your knowing. Whole disk encryption provides some protection here.
2) Hold a gun to your head (physical or virtual) and demand the password. If you use a hidden partition, you have some degree of immunity here.
3) Catch you with the Virtual Machine powered on faster than you can hit the reset button. Makes it good to have a machine where the reset button is big (or install one that is).
4) Get a very good hacker to attack from online.
If anybody has formal training in computer security, please buff up this as I am only an advanced amateur.
I don’t check the board often as my security means it takes my 5 minutes just to get through the layers to sign on.
1) Buy VMWare Workstation 8 for $200 or find a friend who can set up the virtual machine and then you can run it with free VMWare Player. Mac users can use Fusion but I do not believe it has the encryption function yet (Workstation just introduced this as of version 8 so it may appear in a future Fusion version.)
2) Install either Linux or Windows (or both). This is where the maybe $140 comes in to buy windows.
3) If in USA or other country where law enforcement cannot force you to give up passwords, encrypt the virtual machine using VMWare’s built in encryption. I tried running the VM from a BestCrypt disk and this brought my rather powerful workstation-class machine to a crawl. Use the VMWare one. (I don’t know if VMWare Player supports encryption)
4) Put your files you download in a TrueCrypt or BestCrypt folder. If not in USA, consider the hidden partition both of these products have. This will further protect your data from prying eyes. Here, TrueCrypt runs quite OK.
5) Run reasonably frequent VMWare Snapshots. Much more robust than Windows snapshots as they are stored outside of the running virtual machine and would therefore be impervious to virus attack.
6) Use a VPN service run out of a country that does not require they maintain logs such as the Seychelles. This also allows you to get to turbobit if you are in the USA.
This should protect well against viruses – at least you can go back to a prior version if the attack is successful. To get to your files, outside ****** would need to do one of the following:
1) Install a keylogger. This would require access to the computer without your knowing. Whole disk encryption provides some protection here.
2) Hold a gun to your head (physical or virtual) and demand the password. If you use a hidden partition, you have some degree of immunity here.
3) Catch you with the Virtual Machine powered on faster than you can hit the reset button. Makes it good to have a machine where the reset button is big (or install one that is).
4) Get a very good hacker to attack from online.
If anybody has formal training in computer security, please buff up this as I am only an advanced amateur.
I don’t check the board often as my security means it takes my 5 minutes just to get through the layers to sign on.