Category: Other

Other computing tips

  • FBI software specifications to monitor social networks

    The Federal Bureau of Investigation is calling on IT companies to submit a “white paper” on how to build a software tool to monitor social networks like Facebook and Twitter, they want to use the information collected to predict and respond to crisis. The system should be able to work in real time, with search capabilities of social networks and news sites like the CNN and MSNBC, using keywords and parameters defined by FBI agents, with automated filtering of collected data. Other specifications include instant notifications of breaking events triggered by keywords and the alerts being shown colour coded on a geospatial map with the ability to save and archive warnings, they even mention their preferred maps, which are Google Maps, Google 3D Maps and Yahoo Maps.

    The application should help view domestic terrorist threats and worldwide, classifying terror groups, being able to quickly locate US embassies and Government installations around the globe including details like the weather forecast and displaying video feeds of traffic cameras in real time to spot traffic patterns like bottlenecks, obstructions and flash mobs. Twitter is specifically mentioned and the FBI asks for the ability to instantly search and monitor all publicly available tweets across the whole Twitter site, the application must be able to translate foreign language tweets into English, using a minimum of 12 different languages, attaching a reference document of “tweet” lingo for officers to be able to understand the data. Vendors able to build that kind of mass surveillance software must include their estimated pricing to the FBI.

    A quick reminder that if you don’t want your Facebook postings to be read and stored by the FBI, the only privacy workarounds are not to use a social network, use something more anonymous like Unseen.is, or to only post in private not allowing public view. Besides the Government, employers and enemies alike can find the information you post in Facebook useful too.

    Reference: Federal Business Opportunities (fbo.gov)

  • Private hosting in Iceland with 1984 hosting

    Private hosting in Iceland with 1984 hosting

    Powered by free software and green energy with their headquarters and equipment in Iceland, 1984 hosting offers private hosting, VPS, domain registration, email and free DNS services, the company claims that they will go the extra mile to protect their customers right of freedom of speech, privacy and anonymity, they will not reply to threatening emails and will only obey a valid Icelandic court order, if they become aware of any investigation by the authorities 1984 hosting will warn the customer unless there is a gagging order, one of the two founders is a member of the Icelandic IMM (International Modern Media Institute), a foundation working for free speech.

    Control panel 1984 hosting
    Control panel 1984 hosting

    I was given a test account to see what their services are like, 1984 shared hosting has a custom hosting panel based on ispCP, simple and easy to use, you will not get lost or wonder where things are, functions can be accessed within a couple of clicks, the panel default language is Icelandic, it can be changed to English, Hungarian, Spanish, Danish and others. On the main tab there are statistics about space and bandwidth, number of SQL databases, FTP accounts and subdomains, backups are perfomed daily and they can be restored using the control panel, custom 404, 401, etc pages can be created too, websites status, like number of visitors, can be measured with awstats. Files can be uploaded using FTP or FTPS (FTP Over Explicit TLS/SSL) with SFTP support being planned for the future, alternatively you can use net2ftp, web based FTP, to upload files via browser, with the hosting account you also get an IMAP/POP3 email account, email can be retrieved with an email client or webmail (SquirrelMail).

    If you go for a VPS there is a list of the most common Linux and BSD distros to choose from or you can ask 1984 hosting to install a particular distribution that isn’t there, payments are made with Paypal or credit card.

    1984 hosting net2FTP
    1984 hosting net2FTP

    The Icelandic Parliament will soon introduce a new legislative freedom of expression framework enshrining protection for whistle blowers, information sources, communications, publication restraint orders and others, this makes the hosting company location ideal, but I was baffled by their free speech policy, while claiming to go the extra mile to protect customers civil rights, and hosting many politically sensitive websites they apparently have speech limits, set by what they called in the email exchange “sense of decency“, and made it clear to me that disagreeing with a website will not have an account terminated but they will not allow racist propaganda or pro-pedophile websites on their network as they say they would not sleep at night if they were serving them, and as for warez and copyrighted material, Iceland has the same laws than any other western country and they have to comply with them.

    My impression is that 1984 hosting could be a good place to publish whistle-blowing or corporate data leaks and count with strong investigative journalism protection out of the reach of US trigger happy libel laws, or you could use it as an offshore webmail account since their hosting prices are reasonable, but don’t push it too hard towards extreme websites not covered by this host so called “free speech” sense of decency.

    Visit 1984 hosting homepage

  • US judge orders woman to decrypt laptop or face contempt of court

    In a case that could set a legal precedent, a Federal US judge has ruled today on a long standing case that the defendant Ramona Fricosu, involved in a multimillion bank fraud, must decrypt her Toshiba laptop hard drive of face contempt of court, the woman had argued that exposing the laptop contents to law enforcement by entering her password would violate the Fifth Amendment, right not to self-incriminate, the judge ruling in a 10 page verdict says that the defendant isn’t protected because the  1789 All Writs Act  has been used to require telephone companies to aid in surveillance and can be invoked in forcing decryption of hard drives as well.

    Her solicitor, Phil Dubois, has asked for a stay of execution so that they can appeal and has announced that his client may not be able to decrypt the laptop for any number of reasons although the defendant was recorded in a jailhouse conversation with her ex-husband admitting to having access to the laptop and it will be hard to claim that she doesn’t know the password.

    It looks like the US could become a country like the United Kingdom where refusing to reveal your password to the authorities is already a criminal offence, but while UK laws sets a maximum prison sentence of 2 years (5 years if the case is related to terrorism), in the US people could be held in contempt of court which means an indefinite prison sentence.

    This is not the end of it yet as hopefully the appeal will be granted and could overturn this verdict, once the legal fight has exhausted all possible recourse, US law should soon be clear about if citizens have the right to refuse to reveal the password to their encrypted files or not, at the moment is best to be cautious and assume that sticking a finger up the cops and saying that you won’t reveal the password might not work as expected.

    Note: According to an article in Popular Science, the defendant was using Symantec PGP Desktop full disk encryption.

    UPDATE March 2012: According to an article in Wired, the FBI has now decrypted the disk, they did not disclosure how they did it but the woman’s solicitors points out that possibly the co-defendant has given the password to the police.

  • How to secure your personal data at border crossings

    How to secure your personal data at border crossings

    Border control officers at land crossings and airports in many countries have the right to search traveller’s laptop and smartphones without a court order, that is where your family photos, banking details and list of visited websites reside. Lawyers, doctors and businessmen should also be concerned about this practise, if you care about your privacy here are some tips to protect your digital data from noisy border agents:

    Backup your data: There is the possibility that a border agent damages or seizes your device, always have a backup somewhere else and never take the backups with you, leave them at home. If you need to backup your data at the guess country, i.e. holidays photos, use an encrypted cloud service like SpiderOak or Tresorit, encrypt the and SFTP to your server, or back it up to an encrypted USB thumbdrive and mail it to your home.

    Use whole disk encryption: Whenever it is possible use full disk encryption as opposed to file encryption, there are too many places where the operating system creates temporary copies of personal data to be able to securely wipe everything. If you can get away with using a Linux live CD for your day to day Internet usage this is the best course of action, remove the laptop hard drive or wipe it, with a live CD nothing will be saved to your hard drive.

    Officer searches laptop at border crossing
    Officer searches laptop at border crossing

    The country you visit could have different encryption laws to that of your home country, in the UK for example, it is a criminal offense not to reveal the password to your encrypted files when law enforcement asks for it, the penalty for refusing is up to 5 years in prison. If unsure about local cryptography laws, store your data encrypted on the cloud and take only a live CD with you, download your files only after going through customs and make sure to never save anything as you could be asked for access at any time during your stay or on your way out.

    Smartphone protection

    If you are using an SD card for storage, extract it and wipe the memory card on a PC using specialist software (Eraser, ProtectStar, BCWipe, etc). On Android phones, download the Whispercore app for full phone encryption. Another choice is to use a second phone only for travelling, unless you really need a smartphone abroad, buy a cheap phone and transfer your SIM card there, this should also help you protect against theft by making it less attractive.

    Digital cameras

    Border agents might want to look at your holiday photographs for whatever reason, sometimes searching for illegal pornography or to corroborate that you really have been on a leisure break. There is no easy protection against this other than extracting the memory card, encrypting it and mailing it to yourself, it will help not to look suspicious by coming back from holidays with an empty camera by introducing a second memory card in the digital camera with photos you don’t care about anyone seeing

    The decision on whether to search your electronic devices or not will take into account the countries you have visited, your background (criminal record), how you behave at the border, and the state of alert at the time, electronic devices can also be searched at random or just because the border officer feels like it.

    Border control agents could swap test your laptop for bomb residue, this test is called Explosive Trace Detection and it can be carried out on any piece of checked baggage.

    For further information read the Electronic Frontiers Foundation Guide for Travelers Carrying Digital Devices 

  • Shutdown a computer remotely with RemoteRebootX

    Shutdown a computer remotely with RemoteRebootX

    RemoteRebootX is a portable application to remotely monitor a computer in real time, it can also be used to simultaneously shutdown, reboot, ping or Wake-on-LAN multiple computers, the best part is that it does not need to be installed in the remote computer, simply launch RemoteRebootX and add hosts. A task scheduler allows you to automatically execute actions without supervision, other useful options are retrieving the last boot time of a host, acquiring its MAC address and looking at the drive space information, all of the actions can be done using the interface or right clicking on the computer IP.

    On restricted computers you will be asked to login first before executing any command, using the padlock icon, it will also ask you for the computer Workgroup. This tool can be used by system administrators in conjunction with BatchPatch, a paid for application, to install updates on multiple servers and reboot them simultaneously.

    Computer management RemoteRebootX
    Computer management RemoteRebootX

    RemoteRebootX interface is not as pretty as that of EMCO Wake-on-LAN, another tool to remotely control a computer over the Internet or inside a network, but it has higher capabilities, allowing you to reboot and shutdown computers, which EMCO Wake-on-LAN can’t do, and it can be carried on a USB thumbdrive.

    Visit RemoteRebootX homepage

  • ProxyDNS a cloud based DNS proxy to watch USA TV abroad

    ProxyDNS a cloud based DNS proxy to watch USA TV abroad

    ProxyDNS is a proxy service designed to access geographically restricted services like Pandora Radio, Netflix and ABC. Unlike a VPN where you need to download software, ProxyDNS only requires you to change your DNS settings, their homepage has instructions on where to find them in Windows, Mac and Linux. The DNS could also be changed in your router, which is operating system independent, this kind of proxy works in all operating systems no matter how obscure they are, it can be used with the Xbox and Roku.

    I have been using ProxyDNS for a couple of days and everything works pretty good, I managed to watch CWTV and Hulu series from abroad with no glitches, something to bear in mind is that unlike a VPN, this service has not been designed for privacy, when you visit any website not included in the DNS spoof list, your real IP will not change. ProxyDNS is using a DNS proxy so that when you request page X, the DNS server automatically swaps your IP for one of theirs in the US, this creates a  situation where you can see  your real computer IP on one browser tab and on the other browser tab you can watch an online TV service restricted to USA residents only, you will not even notice the proxy is there.

    Windows DNS settings
    Windows DNS settings

    ProxyDNS is a smart very easy to use solution to access georestricted services in the US, it can access all well known TV and online radio companies, users can request new services are added to their list. The proxy is still in beta, you could have it working in your computer in under 2 minutes with no software download at a cheaper price than a VPN provider.

    Visit ProxyDNS homepage

  • How to find out your router IP address in Windows

    How to find out your router IP address in Windows

    There are many router models out there and the one that your ISP gives to you sometimes does not include the router IP address, they come with an auto installable kit instead.

    Entering a router IP address into your web browser toolbar will take you to the router interface, this is very useful to change the router default settings and others.

    A router IP address can not be changed, this is embedded into the hardware by the manufacturer, a router of the same brand and series will use the same IP, which means that it is not secret, anyone using the same router as you and in range, could connect wireless to your router interface and modify the settings, you should always change the default router password.

    Step 1 to find router address:

    Open Windows run and type cmd.exe OR command.com, alternatively, if you can’t find Windows run search for cmd.exe OR command.com

    Command prompt cmd Windows
    Command prompt cmd Windows

    Step 2 to find router IP address:

    At the Windows command line prompt type ipconfig you will now see your computer Internet IP, IPv6, MAC address and router IP address.

    The router IP address is the IP written right after where it says “Default Gateway” , you can notice in the picture that there are two default gateways, this is because the router is wireless and has more than one connection port, the RJ45 ports belongs to the wired ethernet connection (in this case empty) and the other port is a default router gateway belonging to the Wireless connection.

    ipconfig find router IP address
    ipconfig find router IP address