About 15 years ago, when the Internet was issued by cards and measured in hours, it was a common thing for us to visit for games, books and films. Many had one single disk, necessarily partitioned into c: and d:
But no one thought about exactly which files lying on the hard disk were available on the connection computer. Of course, after all, you came to a friend and thought that you would finally get fresh anti-virus databases. the person wrote out an upgrade special, and the purpose of the visit was a film in the translation of a goblin. And he received from you a selection of the necessary bodies of viruses from the university or photos from tests.
Complete trust, right? Nobody copied cookies or icq correspondence, etc. And then there were no secrets. It all looks like our hard drives are big flash drives. And so it is! Like a USB flash drive, you can forget or lose your hard drive / phone / laptop.
As a student, this would be a terrible event, but more financially.
And if today your devices or cloud accounts fall into the wrong hands, what will you worry about?
I am no longer a student, and I will worry not only about the loss of my devices, but also about corporate secrets, access, correspondence and contacts. If someone uses my account and writes the most frequent contacts a typical, for some social. networks, the request "translate by Friday" or "grant temporary access", then someone may be led, and this is a great sadness.
I think my further text for most people from IT (and not only) is not relevant, but it will be useful to someone, I hope
Your computer is a big flash drive
Have you forgotten your laptop in a cafe and think that if no one knows your password from your favorite dozen / makosi, then he will not be able to read your files?
In vain
Try to remove the disk from the laptop and connect it to the stationary computer with the second screw, see your files? I have bad news for you - other people's eyes will be able to see them too, in exactly the same way)
There is a very simple protection option - file encryption by pcm ( we are talking about EFS ), it will not work quickly, and not very reliable (if someone can change the password for your account, but more on that later)
β , VeraCrypt, BitLocker, Windows 10, Mac OS
100%, , , β .
, , , , , , )
, , ?
Trusted Platform Module ( β ), β / CPU, , , .
, TPM β manage-bde -status
, dell,, , . , )
,
:
β
. , , Mac Book, β , . β )
β Live CD (, ). , - cookies/ovpn/password.txt/*.configβ¦ / , .. .
( ) β , , 2-5
Windows Linux
Windows Vista ( SuSE) . , , . - , IE, CTRL+O, * explorer.exe . . , , , Windows 98
, - ( ) BIOS )
:
( 3 ) ( )
: , , , ? , .. !
, ?
: , , β ,
: , ( ). , , , . , . ? . + ?. , β , !
! β , ))
, () β , . -.
, , / ? -, , ? , - β¦
- , , - )
, , (.. - ). , .. GitHub/Google , , . β . -
(2FA)
, : , )
:
:
Google β https://myaccount.google.com/signinoptions/two-step-verification
GitHub β https://github.com/settings/security
GitLab β https://gitlab.com/profile/account
, . , , . , , , )
?
, , https://haveibeenpwned.com/
, , , https://monitor.firefox.com/ , , - .
, https://t.me/dataleak , , .
β
, , , ?
? , , , , .
https://www.techradar.com/best/password-manager
https://qwertycards.com/, . , , ;)
- https://sansys.github.io/cryptocard/
, , . , , - , , - about:logins ? - , , , . , .
https://support.mozilla.org/ru/kb/ispolzovanie-master-parolya-dlya-zashity-sohranyon
, , β , , , , .
? .
, , - WannaCry, , .
Β± , , https://www.techradar.com/best/best-antivirus
( ), !
Β« Β», .. Β« - Β»
β , , ! . -, , . : . ? , , , β¦ ?
, WannaCry , .. Microsoft , -. ,
, , , ? , ? .. - β ?
PGP, thunderbird.net
β , email, , .
.
, .
, , mailvelope.com
protonmail.com β . , ( ).
, : , , β .
gmail , , Facebook
PGP Facebook
? β - ( ), . β - /
fakemail.net ( temp/fake email) )
, email-relay, relay.firefox.com, Apple ID
β , . ( ) , Β«! 2 Β», , - , , .
β ? !
β , , ( ) . β , .. , β . 5 XSS . API ( PHP), 20-30 . sqlmap, ...
SQL- 500. β 5 . email- . , users β ( ), , .
, : , , . β ?
, β , .. β , , ( ) , , ?
? .
, , , ). β , , , ( ), , .
, , , ( β / , ), , , , ( β , )
, , , , , , , β , , 300. ( ) . β .
, $N ( ), β . , , , 10, - , . β , , , , .
, «» « »
,
β , )
, , - , ;)
,
Wi-Fi
, , β Wi-Fi, :
< + free>
+ /,
, , ,
Β«, Β»
-
- , OTP , ,
, .. , , / , , . HTTP ( ), HTTPS, HSTS ( )
β , DNS IP? DNS-, , Wi-Fi. . , MitM , , DNS , .. Β± )
β Wi-Fi , :
VPN , - . : protonvpn.com WARP ( /)
DoH, , , )
DNS- - , 1.1.1.1 ( , - DHCP)
β nextdns.io, .
VPN Kill Switch ( -) β , VPN-, , VPN
/ , - -/, )
, Wi-Fi ? - provider-kvartira-123? ? ? / + Google Authenticator, - + , ?
, SID -, , , , - , HP-Laser Jet 5β¦
β ? mac-, + - airodump-ng , β , .
, , , Wi-Fi , β¦ β , )
, , . , , ICQ Sniffer β , HTTP-, SSL, / . , VPN )
Phishing
, β , , :
- blogger.com
(-) , // , PDF/Word-, , , .
? , . - , β . MS Office LibreOffice PDF-, .
: Β« Β», Β« , Β» .., .. β - , «». , β . Β« β5 Β» , ? ,
, , , / .
. https://habr.com/ru/company/solarsecurity/blog/502576/
, nextdns β 30 ,// - β , !
. : site.ru, boss.name@site.su β , ), : , , , β . , bank.ru?redirectTo=/page10.
//- ? Β«, ! , , , , , ? !Β».
N β¦ , , setup.exe 550 , β¦ , - . setup - , β , . windows , Virtual Box.
100 , ? β , - . : ( , «») β - - )
? .
, , ?
https://www.virustotal.com β
, , - - , ,
// /., β .
, , . β 2019.mynet.ru. *.mynet.ru β , 2019.mynet.ru . , .
, : Chrome - Firefox β . , .. FB , -.
(//) , . , .. - , https://mybrowseraddon.com/useragent-switcher.html.
uBlock - , .. https://github.com/gorhill/uBlock
( ) NoScript js-. , , JS, , , . , .. - XSS , ..
, - ? ? , , .
, cookies, Cookie AutoDelete, . , . , β /, ;)
: , , . . CanvasBlocker . , , , , .
, .. , habr mitm , -
β . , , . , N , , . History Cleaner
β - ?
, , . . startpage.com β , , ( ), , )
, , ! , . HTTPS EveryWhere β URL HTTPS, , HTTP .
, 100 , ? - , - ( /), - , ( /). , - , ? Auto Tab Discard β , Cookie AutoDelete , . , , Β« Β».
/ , , . , . Β« Β» , . , , , β . )
, VPN, , , .. - . ! : /, , , , , , β ? , , .. = .
Information technologies today are an integral part of each of us, a part of our personal and corporate life. As a consequence, proper hygiene must be present in it too. It is worth remembering that your infrastructure is protected only as much as the weakest part of it is vulnerable.
There is a stupid bold recipe: make a nude photo, put it in the root of the disk, in the home directory, in the mail, in the cloud, in the phone and think about protecting it)
Perhaps after that you will be like this: