Author: John Durret

  • Stop spyware and tracking cookies with SpywareBlaster

    Stop spyware and tracking cookies with SpywareBlaster

    Spywareblaster is a free program to stop spyware from being installed in your computer, instead of allowing tracking artifacts to sneak in and having to scan your hard disk to remove them, Spywareblaster stops tracking software from installing in the first place, protecting the computer against adware, browser hijacks (anchoring your homepage), malicious ActiveX scripts, tracking cookies and flash content. You can enable and disable displaying of flash content through the easy to use Spywareblaster interface, another section allows you create your own custom list of blocked ActiveX controls and another section stores a backup of the Hosts file, a file used by your operating system to resolve IP addresses to an URL, commonly tampered with by malware to redirect you to other pages, the Hosts file can be rolled back to a certain time and date if that ever happens.

    Spywareblaster stops adaware
    Spywareblaster stops adaware

    This software consumes very few computer resources and can be used in conjunction with a firewall, antivirus and other antispyware tools without any compatibility problems, it should save you time in the long term by not having to continuously scan the hard disk searching adware. Unfortunately browser support is somewhat limited to those using Internet Explorer rendering engine (Maxthon, Avant, IE, etc) and Mozilla Firefox, Opera and Chrome users have been left out, if you do most of your Internet browsing with something other than Internet Explorer or Firefox, protection will be very limited.

    The necessary database updates to keep up with the latest Internet threats are only automatic in the paid for version of this program, the free version has to be updated manually which is easy to forget, I wasn’t too impressed with Spywareblaster, is not bad but I do not see this as a must have, my main grudge is the lack of support for browsers other than IE and Firefox.

    Visit Spywareblaster homepage

  • Computer IPv6 addresses & privacy

    Computer IPv6 addresses & privacy

    The current 32-bit IPv4 protocol, created in 1981, can have up to 4 billion of IP addresses, every device connected to the Internet needs one of them, including mobile devices, going beyond everyone’s foresight, the Internet is now running out of IP addresses, by the end of 2012 all available IPv4 addresses could have been given.

    IPv6 is a brand new version of Internet Protocol set to succeed IPv4, it isn’t an upgrade since networks using both protocols are largely incompatible at packet level and can not communicate in between them, IPv6 is based on 128bit addresses, it will provide users with a near inexhaustible number of IP addresses. You can easily identify an IPv6 address because unlike IPv4 composed of four groups of numbers separated by dots, an IPv6 address is composed of eight groups of alphanumeric characters separated by colons.

    Tip: Some IPv4 routers can be converted to IPv6 with a simple firmware update.

     IPv6 addresses advantages

    Efficiency: Data packet headers and packet forwarding through routers has been simplified to make it more efficient

    Multicast: The transmission of a packet to multiple locations in a single send operation, aka multicast, is a base specification in IPv6 (optional in IPv4)

    SLAAC (Stateless Address Auto Configuration): A standard IPv6 feature that allows IPv6 hosts to autoconfigure when connected to an IPv6 router, it is able to automatically assign IP addresses and device numbering.

    Jumbograms: A jumbogram is a transmission data packet exceeding the standard Maximum Transmission Unit (MTU) IPv6 jumbograms contain a payload larger than the IPv4 limit of 65,535 eight-bit bytes (aka octets).

    Geolocation:  IPv6 address have more geolocation options than IPv4, the new IPv6 latitude and longitude system can be scaled down to nearly microscopic pinpointing.

    Computer IPv6 address
    Computer IPv6 address

    IPSec (Internet Protocol Security): Originally designed for IPv6, and later expanded to IPv4, this Internet protocol secures communications encrypting and authenticating data packets for each session, IPSec is optional in IPv4 and mandatory in IPv6.

    Mobile IPv6 (MIPv6): The MIPv6 protocol enables a mobile device to switch between networks, mobile devices are identified by their home address regardless of physical location, IPv4 sends the data packets to a proxy server for relaying to the target device.

    IPv6 address examples: 2001:db8:ffff:1:201:02ff:fe03:0405  OR 2607:f298:1:109::7ba:1bd8 OR 2001:41d0:1:1b00:213:186:33:87

    Note: IPv6 addresses will be rolled out progressively and they are expected to coexist side by side with IPv4 networks for a long time, it is the ISP responsibility to implement IPv6, not the user.

    IPv6 privacy concerns

    When an IPv4 user reboots the computer a new IP address is assigned by his Internet Service Provider DHCP server, with IPv6 making billions of IP addresses available there will be no need to request a new IP when the computer boots up and dynamic IP addressing (DHCP) should eventually disappear. The first half of an IPv6 address is static, identifies the network and it never changes, it can be stored, the second half of the IP is created by an IPv6 enabled device (i.e. your computer+operating system).

    IPv6 128bit computer address
    IPv6 128bit computer address

    IPv6 stateless configuration uses the hardware device unique MAC address to create the IP last 64 bits, this means that your computer MAC address is exposed to the Internet, since any website you visit logs your IP they can also figure out your physical network card MAC address. IPv6 has something called Privacy Extensions (RFC 4941), enabled by default in Windows (not enabled in Linux and Mac OS X before Lion), it uses a random number generated by a computer algorithm to dynamically assign a varying address block when creating the IPv6 address so that your computer MAC address is not used and remains hidden.

    Example of traceable IPv6 computer address 2001:0db8:1:2:60:8ff:fe52:f9d8

    • Take the last 64 bits (the host identifier) and add leading zeros: 0060:08ff:fe52:f9d8
    • Strip the ff:fe part from the middle. If these bytes are not there, then there’s no MAC address.
    • For the first byte: complement the second low-order bit (the universal/local bit; if the bit is a 1, make it 0, and if it is a 0, make it 1). So: 0x00 (00000000) becomes 0x02 (00000010).
    • Result: 60:8ff:fe52:f9d8 translates back to computer MAC address 02:60:08:52:f9:d8

    Tip: If you see the characters “ff:fe” in the middle of your IPv6 address then your network card MAC address has been used to create it, if the characters are not there, privacy extensions is enabled and you do not need to worry.

    IPv6 useful websites 

    Test IPv6: Runs a quick test giving you all kind of technical information on your IPv6 address indicating a score of your IPv6 and IPv4 stability and readiness

    IPv6 Test: Checks your IPv6 and IPv4 speed and diagnoses connection problems, it tells you if  a computer is using IPv6, it can test your ping latency and compare IPv4 against IPv6 performance, it can also test if a website is reachable using IPv6.

    TunnelBroker: Free Tunnel Broker service enabling people to reach the IPv6 Internet by tunneling over existing IPv4 connections from an IPv6 enabled host or router to one of their IPv6 routers.

    SixXS: Offers IPv6 Tunnel Broker managing and a number of IPv6 Tunnel Servers to end users.

  • Remove Windows user password with Advanced Password Recovery

    Remove Windows user password with Advanced Password Recovery

    This free password recovery software does not need installation and can be run from a USB thumbdrive but it requires administrator rights, once you execute it, you can remove the password for any Windows user using a drop down menu, you can enable or disable Windows account manager or change the Windows logon password without using the Windows control panel.

    Advanced Password Recovery can retrieve stored wireless networks passwords, Instant Messenger account passwords from MSN, Yahoo Messenger, Google Talk, ICQ, Trillian and others, Windows Office password recovery for Microsoft Office software and  Microsoft Exchange Server, and Internet browsers password recovery for all of the major browsers like Opera, Firefox, Internet Explorer and Chrome.

    Advanced Password Recovery
    Advanced Password Recovery

    Advanced Password Recovery also includes a basic password generator where you can specify password length and spawning of numeric or alphanumeric passwords, this is a nice bonus but you will be better off using a specialist password generator tool if you are going to use it often, the one included has very basic configuration options, there is no support for password lists or presetting password suffixes.

    The software includes a utility called Password Encrypter to encrypt text , there is no documentation explaining how it is implemented, it does not not look like strong encryption, probably more indicated to stop the occasional coworker spying or someone who doesn’t have the time and motivation to try and break it.

    Visit Advanced Password Recovery homepage

  • Free Windows SSH server MobaSSH

    Free Windows SSH server MobaSSH

    This Windows SSH server built around CygWin (Linux environment for Windows) comes as a single executable and it is very easy to install, you can configure an SSH server on any Windows PC with just a couple of clicks, MobaSSH is registered as a Windows service it can be monitored like any other normal service, it will help you supervise and manage your Windows PC remotely allowing you to run commands and securely transfer files from any other operating system using a secure encrypted SSH tunnel, all you need is an SSH client on your end (OpenSSH, PuTTY, KiTTY) and MobaSSH installed in the computer you would like to have access to.

    You will be able to administer a Windows machine using Unix commands as if it were a Linux operating system, the most useful GNU utilities are all included, the tool appears directed towards system administrators but home users with a small network at home can make good use of it too, you could for example, install MobaSSH on your home computer and securely connect to it from work or an Internet café using a portable SSH client on a thumbdrive to create an SSH tunnel and retrieve forgotten files or upload them to your home computer.

    MobaSSH Windows SSH server
    MobaSSH Windows SSH server

    Commonly performed functions with MobaSSH include:

    Use a Windows machine as a central backup server: With scp/sftp you can securely transfer files to the central server or write a script that will automatically run backing up a folder to the other offsite computer.

    Manage a computer remotely without the logged in user even noticing: When you remotely log into a Windows machine remotely where MobaSSH is installed nothing is displayed on the screen, everything runs silently in the background, the user will be able to carry on working as normal.

    Monitor what a Windows computer is doing: You can look at what programs/daemons are running on the computer and display the data packets crossing the network card in real time using TCPCapture, the network connection can be probed too using ftp/telnet/rlogin/wget/ping, etc.

    Remotely run scripts on a Windows machine: Using bash, vim, chmod, cut, etc you can suddenly start an inactive script on a Windows computer, this can be done while a user is logged in.

    MobaSSH main features

    • Execute commands on a remote Windows computer
    • Transfer files through an encrypted SSH tunnel
    • Retrieve information about the remote computer
    • Make backups of your computers over the network
    • Silently install software on remote Windows computers
    •  Silently administer a remote Windows computer

    The free version is for personal use only and it does not have advanced logging options, Samba domain users, hosts allow/deny configuration and service Keep Alive can only be found in the pro version. MobaSSH includes an easy to understand manual with screenshots, but you need to have a working knowledge of the Unix (Linux) command line in order to operate this tool, this is not difficult to learn.

    Visit MobaSSH homepage

  • Computer MAC addresses explained

    Computer MAC addresses explained

    Any hardware with a communications network interface card (NIC) will have been assigned by the manufacturer of the card a unique Media Access Control (MAC) address embedded on the network card, this address includes the manufacturer identification number, the make and model of the device could be embedded too. A MAC address takes the viewable form of six groups grouped in blocks of two hexadecimal digits (composed of numbers from 0 through 9 and letters from A up to F) separated by hyphens or colons.

    Example MAC addresses: 00-B0-D0-86-BB-F7, 09:00:07:A9:B2:EB, D1-AD-04-EF-C1-02

    A network interface card MAC address does not contain user information and it is not visible on the Internet, it remains behind the router, a router will use a device MAC address to identify a local computer, the router will be able to see and log the device MAC address when connected to, if you are using a public wireless access point for example, the access point will log your network card MAC address, time and date.

    A network administrator could use this information to link your machine, i.e. laptop, mobile device, etc, with a particular Internet session, in order to do that you would have to lose control of the device and allow someone to examine it, using a VPN on a Wi-fi connection will not hide your MAC address.

    Note: A computer MAC address is not related to Apple Macintosh computers, it is related to network cards.

    How to find out a computer MAC address 

    Windows MAC address: Go to the command line (Run>cmd) and type ipconfig /all you will see a line that says “Physical address”, that is your network card burned-in address, aka MAC address, if  you have a wireless router you will see more than one physical address, one belongs to the ethernet wired connection and the other to the wireless connection.

    Apple Macintosh MAC address: Go to System Preferences>Network Icon>Show (select Built-in Ethernet)>Ethernet Card, the MAC address is listed next to Ethernet ID:, to determine the MAC address of a Wi-fi card select Show: Airport>Airport the address is listed next to Airport ID:

    Linux MAC address: Become root at the command line (typing su or root) and type ifconfig -a the MAC address will be listed next to HWaddr on the first line, or type /sbin/ifconfig | grep HWaddr

    FreeBSD MAC address: Type dmefg to see display MAC address or grep eth0 /var/log/dmesg or type ifconfig and look for the ether line, the MAC address will be written next to that.

    Note: A hard coded MAC address is meant to be unique in the world, there can only be one NIC card with that number, if  you spoof a network MAC address and it coincides with that of another device in the same local network there could be serious networking problems, or data could be forwarded to both devices, the consequences will depend on how the switch handles it.

    How do I change my MAC address? 

    To physically change a network card MAC address it is necessary to remove the NIC card flash chip, re-programming it with new MAC address and putting it back on the card, changing your device network card will also change the hard coded MAC address, the easiest and quickest way to change a MAC address is by using special MAC address changing software:

    DynaMAC: Freeware application to view and change any computer MAC address, including wireless cards, the user can specify the MAC address that should be used, the old address can easily be reset to the original one with a single click.

    After downloading DynaMac choose custom installation to stop your homepage and default search engine from being changed (Ad-aware).

    DynMAC free MAC address changer
    DynMAC free MAC address changer

    Technitium Tmac: Highly configurable MAC address changer, it provides complete information on all of your network cards MAC addresses, you can select a random MAC address from the list of manufacturers that Tmac includes, it makes for a perfect MAC spoofing if you match it with your network card manufacturer brand.

    Change computer MAC address manually 

    Change a MAC address in Windows: Go to Start>Network Connections>Network Sharing Center (Vista) (Network and Dial-up on XP)>, choose Adapter Settings, right click and choose Properties>Configure, Network Connection Properties>Advanced tab, review the list for “Physical Address” or “Ethernet Address” (each NIC utilizes a different name), click on Properties once you have found it, click next to Value and  input your desired MAC address, the computer will have to be rebooted for the changes to take effect.

    Change a MAC address editing the registry: You could change a network card MAC address editing the Windows registry, the address will be found around HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\ one of the subkeys labeled NetworkAddress contains it, you could cause serious damage to your operating system and need to reinstall it if you make a mistake editing the registry.

    Change MAC address in Linux: Become root and use the ifconfighw command or GNU MAC changer.

    Change MAC address in FreeBSD: Become root and use the ifconfig command with three steps.

    • ifconfig {name of the interface} down
    • ifconfig {name of the interface} hw ether {new MAC address}
    • ifconfig {name of the interface} up

    Tip: Network administrators could be filtering access to the network based on a device MAC address, changing it while being part of a network could lock you out.

    Note: MAC address changing software does not  modify the embedded network card address physically, it instructs Windows (example OS) to use the MAC address specified in the registry.

    Change a router MAC address

    A router MAC address can be emulated/changed through the router interface, the process is known as MAC cloning, not all routers have this ability, the cheap ‘free’ router given to you by your ISP is unlikely to allow this.

    Each device has its own interface and it is not possible to write instructions for all routers, read the router own instructions or make sure that you have a high end router and search the interface advanced configuration options for “MAC cloning”,  in advanced configuration mode you should be able to enter a new MAC address, after which you will be asked to reboot./em/em

  • Use PGP encryption on a Mac computer with GPGTools

    Use PGP encryption on a Mac computer with GPGTools

    GPGTools is an open source free alternative to PGP, this OpenPGP port for Mac OS X computers includes MacGPG2, GPGMail, GPG Key Chain and Mozilla Enigmail for Thunderbird all in a single .dmg package, you can use the software to exchange encrypted messages with any computer user, including Windows and Linux users. A mobile version of GPGTools works in any mobile device which Internet browser is based on WebKit and has javascript enabled, this includes the iPhone&iPad (Safari) and Android (Chrome).

    Like PGP, GPGTools encrypts and digitally signs your data before sending it over the Internet, if you know how public/private encryption key works it will only take you a couple of minutes to master GPGTools, it provides you with a nice front end for GnuPG and bells and whistles like the Enigmail plugin. You will need to understand the concepts behind digital signatures and public/private encryption keys before using it, a well worth time investment for anyone who cares about computer privacy and security.

    GPGTools Apple Mac email encryption
    GPGTools Apple Mac email encryption

    You don’t have to use Thunderbird for encrypting emails, Apple Mail works with GPGMail to decrypt and encrypt messages, which one you use is up to you. GPGKey Chain Access lets you store and edit encryption keys, essential to create key pairs, GPGTools is very similar to GPG4Win, another open source OpenPGP implementation for Windows users only.

    The expensive business focused PGP software sold by Symantec includes full disk encryption and secure data wiping, home users can get all of those features without spending a dime by using three different tools, GPGTools to encrypt/decrypt email, Truecrypt to fully encrypt your Mac computer hard disk and EdenWaith Permanent Eraser to securely shred your private files.

    Visit GPGTools homepage 

  • Torrent seedbox explained

    Torrent seedbox explained

    A torrent seedbox is a permanent 24/7 online high speed server dedicated to download and upload (aka seeding) a torrent for you, an average seedbox has a 100 Mbit/s  line or more, which is considerably faster than any home ISP and gets around bandwidth throttling if there is one, after a torrent has been downloaded onto the seedbox the user gets it to his computer via S/FTP, this is the only bandwidth consumed by the user, seedbox bandwidth does not count towards your monthly download capping if you have one.

    For a monthly fee a seedbox provider will give you an always on server with a dedicated 100Mbps line, dedicated IP, huge amount of bandwidth, an FTP account, allocated hard drive space and RAM with an easy to use interface like TorrentFlux-B4rt to seed your files.

    Seedbox torrent interface
    Seedbox torrent interface

    Private trackers require users to keep a good ratio to be able to download files from other members faster, instead of leaving your computer on all the time and slowing down your Internet connection, a seedbox will free up computer resources for other tasks, if you need to distribute a torrent file making sure that it is available at all times, a seedbox is the way to go.

    The most expensive seedboxes can have a VNC (Virtual Network Computer) remote connection to a Windows machine allowing you to run any BitTorrent client you like, they should also offer torrent creation, unRaring, ZIPing, and firewall protection, the online space they offer is meant to be used for seeding the files but there is nothing stopping you from using it for storage, OpenVPN and Usenet access should be available in the costly  high end servers.

    Any computer can be converted into a seedbox, with a little knowledge of Linux command line you could easily set up your own seedbox on a VPS as long as their terms and conditions allow it (high bandwidth and resources needed). You would probably not save any money using a VPS compared with renting an specialist seedbox provider, the only advantage of setting up your own seedbox on a server is higher privacy because you are in control of everything, logs and configuration, it is possible to set up a seedbox at home but your ISP might ask you to upgrade to a business line when they detect high bandwidth usage.

    Seedboxes and sharing copyrighted files

    A seedbox IP can be tracked down just like your home computer, but instead of serving your ISP with a DMCA take down notice they will serve your seedbox provider and they have to comply with it, a seedbox it is not a way to bypass copyright laws, if you use an open tracker it will be found, when a seedbox provider gets a DMCA notice they forward it to you asking to remove the infringing content, DMCA notices are simple take down notices, not court orders requiring personal details, it is when a DMCA notice is ignored that courts can get involved.

    Torrentflux seedbox interace
    Torrentflux seedbox interace

    If you make sure that your seedbox is located in a country with weak filesharing copyright laws, one of the few left is Canada, it won’t be possible to serve them with any take down notice even if  the customer lives in France (three strikes law), or the US (lawsuits). Anyone sharing extreme illegal files on a seedbox will be caught, in such hypothetic scenario the seedbox provider would be served with a law enforcement subpoena and not a DMCA notice, subpoenas ask for customer personal details and logs that will have to be provided.

    What to look for in a seedbox

    There are lots of seedbox providers, look for a well established company with good reputation, make sure the specs fit your needs, bandwidth is not normally a problem but seeding files could be as the cheapest seedbox plans impose a limit on the number of files you can seed, get a company with a money back guarantee, you will get discounts for paying for a year, the wise thing to do is to try them out for one month first before any long term commitment.

    Why to get a seedbox?

    To make a file available 24/7 on the torrent network, to avoid leaving your computer switched on all the time, to speed up uploading and downloading of files, to keep a good filesharing ratio, you are on an ISP that caps bandwidth or you are a member of a private tracker.

    Seedbox providers:

    Seedbox (USA company): http://www.seedm8.com

    Seedbox (French company):  https://www.seedbox.fr

    Seedbox (Dutch company): http://www.yourseedbox.com