As many us may know, updating out systems is important. Usually an update patches a bug. That bug could simply be a function error or a security flaw.
With Debian systems, you can find out these bugs easily with a small download via the terminal. This download will help you list the bugs, whether they are outstanding or not, and what error could have occurred should the bug be allowed to exist.
The install is called apt-listbugs.
To install apt-listbugs into Debian based distros, type the following into your terminal:
sudo apt install apt-listbugs -y
Once you have this installed, when you update or upgrade your system, you will get a final bug check of all upgrades and updates before they are installed. You will get to make the final call as to whether or not these items are parsed onto your system.
Home network connections – I have learned the hard way to make these as secure as I can.
I have found in my experience, that it is essential to check your router logs for all senses of intrusion including pings.
People can ping often, but more importantly, make use of poor router security and make secure connections to your router, and in some instances, load files onto it making it part of a bot army.
I will share services and functions that should be disabled if you wish to be secure.
UpnP – discover it and disable it in your advanced section of your router. FTP – block access to it. SSH – disable access to it. SMTP – disable access to it. SNMP – disable access to it.
IPv4/IPv6 – SPI Firewall enable. DoS Protection – enable all flood filters to their highest potential. IGMP Snooping – disable it.
These before mentioned services if left alone, with standard login credentials can be used to do nasty things. I was once a host of a YouTube channel talking about security related topics. I was new at the time and didn’t know anything. I was so focused at the time on being system secure, that I completely neglected my router.
I found that the UpnP function of my router was being exploited DAILY. I saw IP addresses all over the world coming to my router and having a party. When I discovered this, I swiftly went about blocking ranges of IP addresses and using whois to identify them within the terminal.
I will give you some additional tips now:
IP Address Pool – however many devices you have, include just enough to cover those devices. Leave NO ROOM at all for additional connections aside from devices you already own. Primary and Secondary DNS – change these to something of your own choice, change them from your Internet providers ones. Enable your VPN server within your router. Enable 5g network and hide your SSID(Router name) from public availability.
Change the name of your connection(Your SSID) to something that doesn’t detail your router. For example, instead of letting it be Telstra54657 change it to anything you like. Not detailing what model your connection consists of, enables a security tick in your corner.
Last but not least:
Use a LAN connection (RJ45 cable) to connect your router to the computer.
I have found that in doing this, and checking my logs often, I am able to ensure the security of my router and my PC. Not doing these, enabled people access to my router, and as such my personal information.
The password for your router needs to change from whatever was originally installed. I do highly recommend a complicated 30 character password. I have found that through tests with password cracking software, it will take beyond our lifetime many fold to crack them. Naturally, quantum computers may make that task easier – I don’t know.
When I used windows, I knew nothing about computers. All I knew how to do was look, click, download and scan. I was aware of other skills, but they soon became the monster of the world.
What I found horrible, and it is one of most influential memories, is when someone breached my pathetic security on windows 10, planted a video within my videos that didn’t belong to me and left.
This occurred because I entered the deep web looking for a book. This book I won’t mention, and when I happened on a tor site that possessed it, or fragments of it, I was soon met with a technically minded person who had the ability to breach windows 10.
I knew someone was in my system, because I could hear them cycling through. I literally could hear the little movements they made with the sounds my computer was making. The screen flashed on the desktop and that’s when I turned off the internet.
I went through my files, I knew intuitively something was there. And I saw it, a video. I won’t say what sort of a video, but a video that I would never download myself. So I did what any person would do, I deleted it and went through the rest of my files.
On my desktop was the folder EXE. So that was also put there by the intruder. I removed that too. After this I decided over the coming weeks I was going to learn about the ugly word Hacking.
That’s when I found Kali Linux. I wanted to learn because I am actually an ex martial artist who created his own system. 17 years of street fighting. I learned that in order to fight network intruders, I had to become a network warrior too.
I learned how to install Kali Linux onto a USB, to turn off safe boot mode in the BIOS to make sure it loaded and created a persistence drive on the USB so I could save information. The drive itself was 8gig. I loaded it up, was so happy when I saw it and I explored the tools,
Terminal is where I placed myself and from then on, it’s where I have lived. Kali Linux has saved me from the mindless use of windows and created through my desire to fight back, and system that I did customise to my needs.
I recommend after experimentation, multiple failures and lots of reading and application, that YOU should learn Kali Linux. If YOU have been attacked online, learn Kali Linux. If you have had files stolen or planted on your system, learn Kali Linux.
Feeling weak and powerless regarding network defence is a horrible feeling. I felt it. I was it. Learning how to use Terminal and Kali Linux has helped me feel safer and more secure than any subscription to AntiVirus could ever do.
If you have gone through something like I have, feel free to share it ^.^
This is a new blog, but I’d like to help people with it.
My adventures with computing started around 2014. Prior to that, all my experience was based around generic windows operations. Click here, download this, install this, virus scan virus Scan VIRUS SCAN!!!
I eventually reached a point in 2014 after being cyber attacked in multiple ways that tipped me over to using Linux.
My first Linux distro was Kali Linux. I met someone recently who said that was a little hardcore.
And so I continued to work with Kali Linux, learning various solutions to problems I faced and learning how to solicit more communication regarding problems through interacting statically with others.
Reading. That’s right ^.^
I aim to help people with what I have learned. I have always enjoyed helping other people. I don’t have a hat or a mask, I just know some stuff.