Home | Community | Message Board

Avalon Magic Plants
This site includes paid links. Please support our sponsors.


Welcome to the Shroomery Message Board! You are experiencing a small sample of what the site has to offer. Please login or register to post messages and view our exclusive members-only content. You'll gain access to additional forums, file attachments, board customizations, encrypted private messages, and much more!

PhytoExtractum Shop: Maeng Da Thai Kratom Leaf Powder

Jump to first unread post Pages: < Back | 1 | 2  [ show all ]
Anonymous #3

Re: A secure environment using a Live CD [Re: Alan Rockefeller]
    #17832185 - 02/19/13 07:02 PM (11 years, 2 months ago)

Quote:

Alan Rockefeller said:
Quote:

Anonymous said:
3. A VM does not randomize its MAC on each boot, but its initial MAC is random, which gives you greater security, because then if anyone comes knocking and the VM was deleted, then the MAC is gone. But think, it would cause havoc for DHCP servers to randomize the MAC on each boot!





DHCP servers would not care that the mac is random on boot unless security features are enabled that restrict the amount of MAC addresses used by each port.  Using multiple MAC addresses on the same port might alert the IT Security team at a large workplace that something unusual is going on.




It is true, but most(?) Sys Admins will only give an IP to a known MAC, rather than allow any MAC to gain access. I suppose it happens, but I am assuming an enterprise that fears being prosecuted for negligence in any type of litigation.
--------

The Hidden OS could work for you, try it, though it seems a lot more work than buying a netbook that can boot from USB. You should consider storing your files in the cloud (encrypted) in a country out of the jurisdiction of your home country, and only access it with a decoy e-mail and the VPN you use, which makes it difficult to establish you use this service. Beware of de-duplication on cloud servers, you have to encrypt it all. You could encrypt it steganographically, too. It depends what data it is, but I am guessing I don't want to know, and I would prefer not to know. It all depends what you're up to as to what is the best solution, but try it all, and see what works.

The dual-system could work, please try it and let us know your results. I have not heard much positive about it to date, but there is also the chance that it is the solution you need and that I could be wrong.

Extras: Filter Print Post Top
OfflineAlan RockefellerM
Mycologist
Male User Gallery
Registered: 03/10/07
Posts: 48,392
Last seen: 2 days, 23 hours
Re: A secure environment using a Live CD [Re: Anonymous #3]
    #17833986 - 02/20/13 02:32 AM (11 years, 2 months ago)

Quote:

Anonymous said:
It is true, but most(?) Sys Admins will only give an IP to a known MAC, rather than allow any MAC to gain access. I suppose it happens, but I am assuming an enterprise that fears being prosecuted for negligence in any type of litigation.





Most sysadmins don't enable that feature because it's a lot of work to enter everyone's MAC into the switches, and change that entry every time someone gets a new computer. 

In the places I have ran the switches, the admins didn't lock down every port to a certain mac, but they did look to see if any ports were using multiple MAC addresses.  This usually indicated that they were setting up an unauthorized hub or wireless AP, but also could indicate that VMware is running or OS's are trying to be stealthy.  If someone was using more than 2 MAC addresses, we would have a talk with them and ask them what was going on.

Extras: Filter Print Post Top
Anonymous #1

Re: A secure environment using a Live CD [Re: Alan Rockefeller]
    #17836470 - 02/20/13 02:47 PM (11 years, 2 months ago)

Without trying to repeat myself here, I'm just wondering what options I've got if I decide to run TAILS as a Live CD when it comes to saving files? Should I just save them to a file container held on another machine? It seems a little slack on my part but it'll have to do until I get looking into a hidden OS using TrueCrypt. I'm afraid I won't be able to get round to that until this coming weekend at the very least. With that being said, it is only a few days.

What's your opinion on a hidden OS Alan? From what my mate was telling me, it isn't that complicated to get running and once it's all sorted, I should have a repository for downloading files in addition to carrying out both secure and anonymous surfing, as long as I make sure to make frequent use of the decoy OS too. He recommended Ubuntu on both then using a virtual machine with Tails on the hidden OS. It seems overkill but would certainly do the trick. You think there's much point with the virtual machine or would you just use Tails as your hidden OS?

Extras: Filter Print Post Top
Anonymous #3

Re: A secure environment using a Live CD [Re: Anonymous #1]
    #17853618 - 02/23/13 05:18 PM (11 years, 2 months ago)

You will burn a bootable USB with tails, then setup TAILs with encryption pass etc. when you first boot into it. It will make you burn a new bootable USB (well, you don't have to, but you can), which will be your primary TAILs to use. You have to go through a very short setup then burn that new tails USB, which will make things secure for you. That will have an encrypted place for storing files on it for you.

You have to jump in at this point. Don't be shy.

Extras: Filter Print Post Top
InvisibleLana
Head Banana
Female

Registered: 10/27/99
Posts: 3,109
Loc: www.MycoSupply.com
Re: A secure environment using a Live CD [Re: Anonymous #3]
    #17906850 - 03/05/13 07:20 AM (11 years, 2 months ago)

Nice thread, this is what this forum is about :smile:

Lana


--------------------
Myco Supply - Distributors of Mycological Products
http://www.MycoSupply.com

The Premiere Source for Mushroom Growing Supplies.
Visit us online or call us toll free

Extras: Filter Print Post Top
Jump to top Pages: < Back | 1 | 2  [ show all ]

PhytoExtractum Shop: Maeng Da Thai Kratom Leaf Powder


Similar ThreadsPosterViewsRepliesLast post
* security of aol IM drewcifer 1,184 4 03/02/04 01:16 PM
by valour
* Use encryption! + some common sense tips
( 1 2 all )
Quake3 5,434 26 01/22/09 11:45 AM
by flip3084
* Encrypting IP address, to block tracking of Downloads BowlKiller 1,811 6 10/26/04 01:45 PM
by BowlKiller
* The BASICS of Securing your computer and E-mail. Cyber 2,691 12 06/09/09 03:34 PM
by Alan Rockefeller
* How to Purchase Securely 101
( 1 2 3 4 all )
Lana 44,930 64 05/22/13 01:31 AM
by 1ve5w4hu
* Secure Email theocean06 1,425 12 01/24/05 08:58 AM
by nife
* Secure Private Message not that secure. bloodbob 1,046 2 07/18/05 03:06 AM
by bloodbob
* Free Internet Security&Privacy Tools Lana 2,471 6 01/24/02 09:42 PM
by dioze1

Extra information
You cannot start new topics / You cannot reply to topics
HTML is disabled / BBCode is enabled
Moderator: Enlil, Alan Rockefeller
358 topic views. 0 members, 2 guests and 1 web crawlers are browsing this forum.
[ Show Images Only | Sort by Score | Print Topic ]
Search this thread:

Copyright 1997-2024 Mind Media. Some rights reserved.

Generated in 0.026 seconds spending 0.007 seconds on 15 queries.