Meni
Forumi
Nove poruke
Sve teme
Najnovije teme
Nove poruke
♫ Radio
Dnevnici
Dnevnici Vanjskog Uzgajanja
Dnevnici Unutrašnjeg Uzgajanja
Završeni Vanjski Dnevnici
Završeni Unutrašnji Dnevnici
Novo
Popularne teme
Nove poruke
Najnovije aktivnosti
Članovi
Trenutno prisutni
Forumi
Prijava
Registracija
Nove poruke
Sve teme
Najnovije teme
Nove poruke
Meni
Install the app
Install
Objavite odgovor
Forumi
Uzgajanje Marihuane
Vanjsko Uzgajanje
Videonadzor sajta
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
Koristite zastareli pregledač. Možda neće pravilno prikazivati ove ili druge veb stranice.
Trebali biste nadograditi ili koristiti
alternativni pregledač
.
Poruka
<blockquote data-quote="kizo123" data-source="post: 446772" data-attributes="member: 45842"><p>Prvo</p><p>ako misliš da provjeravaš email tako da ga samo čitaš ne triba ti nikakva zaštita ali NE klikajte na nikakve linkove u email ako nisu poslati od nekoga koga znate, use google " phishing email"</p><p>Hoćeš anonimnost ?</p><p>Evo ti je</p><p></p><p></p><p><a href="https://www.qubes-os.org/" target="_blank">https://www.qubes-os.org/</a></p><p></p><p><a href="https://www.whonix.org/" target="_blank">https://www.whonix.org/</a></p><p></p><p><span style="font-size: 22px"><strong>Introduction</strong></span></p><p><strong>Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. Aweb browser,IRC client word processor, and <a href="https://www.whonix.org/wiki/Software" target="_blank">more</a> come pre-configured with security in mind.</strong></p><p><strong></strong></p><p><strong>It is a complete operating system designed to be used inside a host operating system<a href="https://www.whonix.org/wiki/About#cite_note-2" target="_blank">[</a>. It is Free Software and based on Tor, Debian GNU/Linux and security by isolation.</strong></p><p><strong></strong></p><p><span style="font-size: 22px"><strong>Security by Isolation</strong></span></p><p><strong>Whonix is divided into two parts: <u>Whonix-Workstation</u> for your work and <u>Whonix-Gateway</u> for automatically routing all internet traffic through Tor. This is security by isolation, and it averts many threats posed by malware, misbehaving applications, and user error.</strong></p><p><strong></strong></p><p><span style="font-size: 22px"><strong>Anonymity online through Tor</strong></span></p><p><strong>Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through it or blocked. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Anybody watching your Internet connection can't see what sites you visit, and the sites you visit can't learn your physical location.</strong></p><p><strong></strong></p><p><strong><a href="https://www.whonix.org/wiki/Other_Operating_Systems#Security_Comparison:_Whonix-Download-Workstation_vs._Whonix-Custom-Workstation" target="_blank">https://www.whonix.org/wiki/Other_Operating_Systems#Security_Comparison:_Whonix-Download-Workstation_vs._Whonix-Custom-Workstation</a></strong></p><p></p><p></p><p><span style="font-size: 18px"><strong>What is Qubes OS?</strong></span></p><p><strong>Qubes is a security-oriented operating system (OS). The OS is the software which runs all the other programs on a computer. Some examples of popular OSes are Microsoft Windows, Mac OS X, Android, and iOS. Qubes is free and open-source software (FOSS). This means that everyone is free to use, copy, and change the software in any way. It also means that the source code is openly available so others can contribute to and audit it.</strong></p><p><strong></strong></p><p><span style="font-size: 18px"><strong>Why is OS security important?</strong></span></p><p><strong>Most people use an operating system like Windows or OS X on their desktop and laptop computers. These OSes are popular because they tend to be easy to use and usually come pre-installed on the computers people buy. However, they present problems when it comes to security. For example, you might open an innocent-looking email attachment or website, not realizing that you’re actually allowing malware (malicious software) to run on your computer. Depending on what kind of malware it is, it might do anything from showing you unwanted advertisements to logging your keystrokes to taking over your entire computer. This could jeopardize all the information stored on or accessed by this computer, such as health records, confidential communications, or thoughts written in a private journal. Malware can also interfere with the activities you perform with your computer. For example, if you use your computer to conduct financial transactions, the malware might allow its creator to make fraudulent transactions in your name.</strong></p><p><strong></strong></p><p><span style="font-size: 18px"><strong>Aren’t antivirus programs and firewalls enough?</strong></span></p><p><strong>Unfortunately, conventional security approaches like antivirus programs and (software and/or hardware) firewalls are no longer enough to keep out sophisticated attackers. For example, nowadays it’s common for malware creators to check to see if their malware is recognized by any popular antivirus programs. If it’s recognized, they scramble their code until it’s no longer recognizable by the antivirus programs, then send it out. The best antivirus programs will subsequently get updated once the antivirus programmers discover the new threat, but this usually occurs at least a few days after the new attacks start to appear in the wild. By then, it’s typically too late for those who have already been compromised. In addition, bugs are inevitably discovered in the common software we all use (such as our web browsers), and no antivirus program or firewall can prevent all of these bugs from being exploited.</strong></p><p><strong></strong></p><p><span style="font-size: 18px"><strong>How does Qubes OS provide security?</strong></span></p><p><strong>Qubes takes an approach called security by compartmentalization, which allows you to compartmentalize the various parts of your digital life into securely isolated virtual machines (VMs). A VM is basically a simulated computer with its own OS which runs as software on your physical computer. You can think of a VM as a <em>computer within a computer</em>.</strong></p><p><strong></strong></p><p><strong>This approach allows you to keep the different things you do on your computer securely separated from each other in isolated VMs so that one VM getting compromised won’t affect the others. For example, you might have one VM for visiting untrusted websites and a different VM for doing online banking. This way, if your untrusted browsing VM gets compromised by a malware-laden website, your online banking activities won’t be at risk. Similarly, if you’re concerned about malicious email attachments, Qubes can make it so that every attachment gets opened in its own single-use, “disposable” VM. In this way, Qubes allows you to do everything on the same physical computer without having to worry about a single successful cyberattack taking down your entire digital life in one fell swoop.</strong></p><p><strong></strong></p><p><span style="font-size: 18px"><strong>How does Qubes OS compare to using a “live CD” OS?</strong></span></p><p><strong>Booting your computer from a live CD (or DVD) when you need to perform sensitive activities can certainly be more secure than simply using your main OS, but this method still preserves many of the risks of conventional OSes. For example, popular live OSes (such as <a href="https://tails.boum.org/" target="_blank">Tails</a> and other Linux distributions) are still monolithic in the sense that all software is still running in the same OS. This means, once again, that if your session is compromised, then all the data and activities performed within that same session are also potentially compromised.</strong></p><p><strong></strong></p><p><span style="font-size: 18px"><strong>How does Qubes OS compare to running VMs in a conventional OS?</strong></span></p><p><strong>Not all virtual machine software is equal when it comes to security. You may have used or heard of VMs in relation to software like VirtualBox or VMware Workstation. These are known as “Type 2” or “hosted” hypervisors. (The hypervisor is the software, firmware, or hardware that creates and runs virtual machines.) These programs are popular because they’re designed primarily to be easy to use and run under popular OSes like Windows (which is called the host OS, since it “hosts” the VMs). However, the fact that Type 2 hypervisors run under the host OS means that they’re really only as secure as the host OS itself. If the host OS is ever compromised, then any VMs it hosts are also effectively compromised.</strong></p><p><strong></strong></p><p><strong>By contrast, Qubes uses a “Type 1” or “bare metal” hypervisor called <a href="http://www.xenproject.org/" target="_blank">Xen</a>. Instead of running inside an OS, Type 1 hypervisors run directly on the “bare metal” of the hardware. This means that an attacker must be capable of subverting the hypervisor itself in order to compromise the entire system, which is vastly more difficult.</strong></p><p><strong></strong></p><p><strong>Qubes makes it so that multiple VMs running under a Type 1 hypervisor can be securely used as an integrated OS. For example, it puts all of your application windows on the same desktop with special colored borders indicating the trust levels of their respective VMs. It also allows for things like secure copy/paste operations between VMs, securely copying and transferring files between VMs, and secure networking between VMs and the Internet.</strong></p><p><strong></strong></p><p><span style="font-size: 18px"><strong>How does Qubes OS compare to using a separate physical machine?</strong></span></p><p><strong>Using a separate physical computer for sensitive activities can certainly be more secure than using one computer with a conventional OS for everything, but there are still risks to consider.</strong></p><p><strong></strong></p><p><strong>Nema anonimnosti i privatnosti ako koristite Windows OS i google</strong></p></blockquote><p></p>
[QUOTE="kizo123, post: 446772, member: 45842"] Prvo ako misliš da provjeravaš email tako da ga samo čitaš ne triba ti nikakva zaštita ali NE klikajte na nikakve linkove u email ako nisu poslati od nekoga koga znate, use google " phishing email" Hoćeš anonimnost ? Evo ti je [URL]https://www.qubes-os.org/[/URL] [URL]https://www.whonix.org/[/URL] [SIZE=6][B]Introduction[/B][/SIZE] [B]Whonix aims at preserving your privacy and anonymity by helping you use your applications anonymously. Aweb browser,IRC client word processor, and [URL='https://www.whonix.org/wiki/Software']more[/URL] come pre-configured with security in mind. It is a complete operating system designed to be used inside a host operating system[URL='https://www.whonix.org/wiki/About#cite_note-2'][[/URL]. It is Free Software and based on Tor, Debian GNU/Linux and security by isolation. [/B] [SIZE=6][B]Security by Isolation[/B][/SIZE] [B]Whonix is divided into two parts: [U]Whonix-Workstation[/U] for your work and [U]Whonix-Gateway[/U] for automatically routing all internet traffic through Tor. This is security by isolation, and it averts many threats posed by malware, misbehaving applications, and user error. [/B] [SIZE=6][B]Anonymity online through Tor[/B][/SIZE] [B]Whonix relies on the Tor network to protect your anonymity online: all connections are either forced through it or blocked. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. Anybody watching your Internet connection can't see what sites you visit, and the sites you visit can't learn your physical location. [URL]https://www.whonix.org/wiki/Other_Operating_Systems#Security_Comparison:_Whonix-Download-Workstation_vs._Whonix-Custom-Workstation[/URL][/B] [SIZE=5][B]What is Qubes OS?[/B][/SIZE] [B]Qubes is a security-oriented operating system (OS). The OS is the software which runs all the other programs on a computer. Some examples of popular OSes are Microsoft Windows, Mac OS X, Android, and iOS. Qubes is free and open-source software (FOSS). This means that everyone is free to use, copy, and change the software in any way. It also means that the source code is openly available so others can contribute to and audit it. [/B] [SIZE=5][B]Why is OS security important?[/B][/SIZE] [B]Most people use an operating system like Windows or OS X on their desktop and laptop computers. These OSes are popular because they tend to be easy to use and usually come pre-installed on the computers people buy. However, they present problems when it comes to security. For example, you might open an innocent-looking email attachment or website, not realizing that you’re actually allowing malware (malicious software) to run on your computer. Depending on what kind of malware it is, it might do anything from showing you unwanted advertisements to logging your keystrokes to taking over your entire computer. This could jeopardize all the information stored on or accessed by this computer, such as health records, confidential communications, or thoughts written in a private journal. Malware can also interfere with the activities you perform with your computer. For example, if you use your computer to conduct financial transactions, the malware might allow its creator to make fraudulent transactions in your name. [/B] [SIZE=5][B]Aren’t antivirus programs and firewalls enough?[/B][/SIZE] [B]Unfortunately, conventional security approaches like antivirus programs and (software and/or hardware) firewalls are no longer enough to keep out sophisticated attackers. For example, nowadays it’s common for malware creators to check to see if their malware is recognized by any popular antivirus programs. If it’s recognized, they scramble their code until it’s no longer recognizable by the antivirus programs, then send it out. The best antivirus programs will subsequently get updated once the antivirus programmers discover the new threat, but this usually occurs at least a few days after the new attacks start to appear in the wild. By then, it’s typically too late for those who have already been compromised. In addition, bugs are inevitably discovered in the common software we all use (such as our web browsers), and no antivirus program or firewall can prevent all of these bugs from being exploited. [/B] [SIZE=5][B]How does Qubes OS provide security?[/B][/SIZE] [B]Qubes takes an approach called security by compartmentalization, which allows you to compartmentalize the various parts of your digital life into securely isolated virtual machines (VMs). A VM is basically a simulated computer with its own OS which runs as software on your physical computer. You can think of a VM as a [I]computer within a computer[/I]. This approach allows you to keep the different things you do on your computer securely separated from each other in isolated VMs so that one VM getting compromised won’t affect the others. For example, you might have one VM for visiting untrusted websites and a different VM for doing online banking. This way, if your untrusted browsing VM gets compromised by a malware-laden website, your online banking activities won’t be at risk. Similarly, if you’re concerned about malicious email attachments, Qubes can make it so that every attachment gets opened in its own single-use, “disposable” VM. In this way, Qubes allows you to do everything on the same physical computer without having to worry about a single successful cyberattack taking down your entire digital life in one fell swoop. [/B] [SIZE=5][B]How does Qubes OS compare to using a “live CD” OS?[/B][/SIZE] [B]Booting your computer from a live CD (or DVD) when you need to perform sensitive activities can certainly be more secure than simply using your main OS, but this method still preserves many of the risks of conventional OSes. For example, popular live OSes (such as [URL='https://tails.boum.org/']Tails[/URL] and other Linux distributions) are still monolithic in the sense that all software is still running in the same OS. This means, once again, that if your session is compromised, then all the data and activities performed within that same session are also potentially compromised. [/B] [SIZE=5][B]How does Qubes OS compare to running VMs in a conventional OS?[/B][/SIZE] [B]Not all virtual machine software is equal when it comes to security. You may have used or heard of VMs in relation to software like VirtualBox or VMware Workstation. These are known as “Type 2” or “hosted” hypervisors. (The hypervisor is the software, firmware, or hardware that creates and runs virtual machines.) These programs are popular because they’re designed primarily to be easy to use and run under popular OSes like Windows (which is called the host OS, since it “hosts” the VMs). However, the fact that Type 2 hypervisors run under the host OS means that they’re really only as secure as the host OS itself. If the host OS is ever compromised, then any VMs it hosts are also effectively compromised. By contrast, Qubes uses a “Type 1” or “bare metal” hypervisor called [URL='http://www.xenproject.org/']Xen[/URL]. Instead of running inside an OS, Type 1 hypervisors run directly on the “bare metal” of the hardware. This means that an attacker must be capable of subverting the hypervisor itself in order to compromise the entire system, which is vastly more difficult. Qubes makes it so that multiple VMs running under a Type 1 hypervisor can be securely used as an integrated OS. For example, it puts all of your application windows on the same desktop with special colored borders indicating the trust levels of their respective VMs. It also allows for things like secure copy/paste operations between VMs, securely copying and transferring files between VMs, and secure networking between VMs and the Internet. [/B] [SIZE=5][B]How does Qubes OS compare to using a separate physical machine?[/B][/SIZE] [B]Using a separate physical computer for sensitive activities can certainly be more secure than using one computer with a conventional OS for everything, but there are still risks to consider. Nema anonimnosti i privatnosti ako koristite Windows OS i google[/B] [/QUOTE]
Verifikacija
Objavite odgovor
Forumi
Uzgajanje Marihuane
Vanjsko Uzgajanje
Videonadzor sajta
Top
Bottom