Hello everyone! Since I received such overwhelming support for the last text I'm keeping my promise to make it a series. I decided instead of breaking
this one up into ten different tutorials I would just go nuts and cram a ton of stuff in at once. This is version 1, there will be regular updates
anytime a topic is requested. I'm here to provide support for any topic covered in the text, if you have any questions or you just read the text
please comment! If you enjoyed the text, give me some love (F/S). Thanks guys! You can view the file as a .pdf in it's original formatting (much
easier to read in my opinion). I hope you enjoy!
CLICK HERE TO DOWNLOAD THIS FILE AS A .PDF
ATS Computer Security and Data Integrity Bible
Table Of Contents
1. Introduction
2. Terminology and Basics
* What is an IP Address?
* What is a Packet?
* What is a Port?
* What is Steganography?
* What is a MAC Address?
* What is Encryption?
* What is Hashing?
* What is Anonymity?
3. Computer Security
* Types of Attacks
* Firewalls
** Zone Alarm – An Example
* Antivirus Software
* Antispyware
* Password Strength
** Method 1: L33t Speak
** Method 2: Combining Words
4. Network Security
* Securing your router
** Changing Default Password
** Updating Firmware and Software
* Intrusion Detection
5. Wireless Security
* Wireless Encryption Types and Overview
* Channels
* SSIDs
* MAC address filtering
* Best Practices and Minimum Standards
6. Data Confidentiality
* What Is It And Why Is It Important
* Internet Data Confidentiality: A Practical Demonstration
* Ways to Achieve Internet Data Confidentiality
** VPNs – CyberGhost VPN
** Proxies
* Ways To Achieve Local Data Confidentiality
** Whole Disk Encryption
** Data Shredding
* Using Proxies to Download Torrents
* Steganography – God’s Gift to ManKind
** Creating Hidden, Encrypted Operating Systems
** Hiding files inside of other files
7. Purchasing Anonymously On the Internet
8. References
9. Conclusion
Introduction
Welcome to the ATS Computer Security and Data Integrity Bible. What you are about to read is not only
my best attempt at getting on ATS Recap
(common Brian!) but also a complete crash course on computer security, LAN security, data confidentiality, and internet anonymity. First we’ll
go over the basics and then we’ll try to fry your brain with an in-depth look and practical examples. If I reach my goal, after reading this you
will rest easily at night knowing your sensitive data is secure, your computer is free of viruses and spyware, no one can break into your wireless or
LAN, your connections to the internet are government-spy-proof, and there are no records of the poka-dot panties you just bought on Amazon. If you
find yourself overwhelmed just keep going and return to the areas you weren’t sure about. If you get stuck with any of the methods used just
remember help is available in the forum.
If you have read the original ATS Guide to Data Confidentiality you are going to see a little bit of repeat information. Instead of making a
“version 2” or releasing ten individual tutorials I decided it would be best to conserve posts and just make an all-encompassing “Bible”. If
you are one who read the original guide I encourage you not to skip through the Data Confidentiality section since a lot has been added and elaborated
on.
About the Author
I’ve been a terror since the public school era. At a young age (13) I founded what turned out to be a very popular forum: HackerLounge. Further and
related endeavors lead to TGS-Security, a penetration testing and security (hacking) group. I released over 500 pages of security related material
from the perspective of the hacker (hacking tutorials) and helped train a young generation of rebels. Later HRG, the Hackerlounge Research Group was
formed and we were responsible for releasing many vulnerabilities and fixes (primarily web based applications). After a long break I’ve returned to
the networking world from the professional perspective, working to fight the people I once helped.
Terminology and Basics
What is an IP Address?
An IP Address is a 32-bit address used to identify your computer on a network. Simply put, it's the mailing address for your computer. When you access
outside networks like the internet you use a public address which is unique to your computer or organization (depending on your network setup).
Webservers you access need to have an address to reach you and almost always this information is stored in the log files. Websites you access can
usually very easily tell what your IP Address is, your ISP, the region you're connecting from, and the pages you accessed on the server. If you need
proof, visit
www.whatismyip.com... to see your current IP.
What is a Packet?
A packet, found in the Network layer of the OSI model, is a set of data. When you visit a website, the entire site isn't sent to you in one big string
of 1's and 0's, but rather is segmented into similar sized packets and sent to a destination (technically segmentation is L4). It's like if you had a
hundred books to send to somebody. You wouldn't throw all of the books into one cardboard box and ship it out you'd separate it into many smaller
shipments and then take it to UPS, Otherwise the package (packet) could be lost or damaged on the way to its destination. We'll take a deeper look
into packets later.
What is a Port?
We know now computers segment traffic into packets to communicate. Now, how does a router tell the difference between your web browser traffic and
your Call Of Duty traffic? Simple, Ports. Ports are used to differentiate between different types of traffic. There’s a huge number of ports and
generally speaking they determine whether a computer can accept a certain type of traffic, and if so, what application belongs to that traffic.
What Is a MAC Address?
A MAC address is a hardware address used to identify devices at Layer 2 (switches use MAC addresses). This is a static hexadecimal address assigned by
the vendor of the device. Every network card, any device that is meant to communicate with other devices has a MAC address which is unique to that
device only.
What is Steganography?
Steganography is the act of concealing an encrypted file inside of a completely innocent looking file. Used for extremely secure data, steganography
combined with the tools of full disk encryption provide maximum data confidentiality.
edit on 27-1-2012 by badfish420 because: (no reason
given)
edit on 27-1-2012 by badfish420 because: (no reason given)
edit on 27-1-2012 by badfish420 because: (no reason
given)
edit on 27-1-2012 by badfish420 because: (no reason given)
edit on 27-1-2012 by badfish420 because: (no reason
given)