Solved

Connect to the internet securely

Posted on 2014-01-12
10
476 Views
Last Modified: 2014-05-21
Hi Experts,

I have a friend in Mexico that his Facebook, Yahoo and computer has been compromise from a hacker in Mexico, He has re-install the OS twice and the hacker even compromise another 2 computers in the same house. They do not use the internet at home and they have to go to a Internet Cafe to view their emails and Facebooks accounts. Police don't do anything.
Can you suggest of any program that will encrypt the connection before they access the internet? or any other suggestion?

Please advise
0
Comment
Question by:chenzovicc
  • 4
  • 3
  • 2
  • +1
10 Comments
 
LVL 17

Expert Comment

by:Sikhumbuzo Ntsada
ID: 39776206
I'm am not sure there is a way you can protect an internet café computer as a user. Rather the owner of the computer must put a security tool in measure.

You have no control over that PC except the owner.
0
 

Author Comment

by:chenzovicc
ID: 39776916
I apologize for not been clear but my friend is trying to protect his computers at home before connecting to the internet so this hacker will not get in. Every time they connect from the house their accounts are compromise and they have seen the mouse moving by it self and trying to download programs.
0
 
LVL 3

Expert Comment

by:cristiantm
ID: 39777383
Encrypting his connection will not guarantee that the attacks stop. Its not clear where the attacks came from and without that is hard to tell what to do to stop them.

First, why do he thinks that the home computer is compromised? Is there any sign that the computer itself was compromised? What did he do to protect it? Did a fresh install, used a good antivirus/firewall (Windows defender is fine), updated everything?

Encrypting the connection would only protect him from someone that controls the network that he is acessing. In a private home, that could be the internet service provider, or if the link is shared, someone that is also using it. If there is a wireless access point, securing it with a WPA2 setting with a good password would help. Does not look like the most probable attack vector in such case, but you can encrypt traffic to some sites, and thats the case of facebook and yahoo, by asking them to use secure (https) connections. On facebook this is in your settings, under security options. I would also recommend checking the other options on facebook settings, and enabling things like login notifications and login approvals. You can even check active facebook sessions on that page, and maybe identify where the attacker logged in from.

Also important is to choose good passwords to the accounts that are hacked. Dictionary attacks can easily find out weak passwords. And also not to repeat the passwords on different accounts.
0
 
LVL 17

Assisted Solution

by:Sikhumbuzo Ntsada
Sikhumbuzo Ntsada earned 150 total points
ID: 39778471
If the PCs have been compromised, it is more likely that what ever security measure you place, the hacker may still be able to get in, unless you know how they did it.

Suggest to format the computers and reinstall from scratch - also a good idea would be to put a gateway in front of the computers, like Linux proxy.

Or better yet start using Ubuntu, attacks are very rare on a Linux box if security is an issue and low budget.
0
 

Author Comment

by:chenzovicc
ID: 39793205
The computers have been reformat and re-install but this guy gets in some how. I was thinking about UBUNTU running from a cd so they can browse the internet then once they are done they just eject the cd. Do  you think that is the best way to do it?
0
Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

 
LVL 17

Expert Comment

by:Sikhumbuzo Ntsada
ID: 39793301
Yes that can work, but it might be slow. They can install Ubuntu on a USB stick as well.
0
 
LVL 9

Expert Comment

by:jfer0x01
ID: 39816867
It seems whatever malware is installed persists even after reinstall, or backup files carry infection towards new installs.

In any case, to securely connect through the internet:

1. Use ssh tunneling to an ssh box, and use a dynamic tunnel in the connection. Then configure browser to use dynamic port as a Sock5 proxy.

2. Use a VPN client to connect remotely to anothjer network, and configure your browser to pass data through the proxy.

Hope your this helps.

Jfer
0
 

Author Comment

by:chenzovicc
ID: 39846127
Can you please explain a little bit more about #1.
0
 
LVL 9

Accepted Solution

by:
jfer0x01 earned 350 total points
ID: 39846199
Sure,

1. You run ssh server on a box somewhere in the world you trust.
2. You connect to this box with an ssh client, a use a dynamic port through the connectoin as a socks proxy.
3. You configure your browser to use the socks proxy and thus connect to the internet securely.
http://chamibuddhika.wordpress.com/2012/03/21/ssh-tunnelling-explained/

However, I think you friend might have malware residing somewhere on the disk or their backups if they keep getting re-hacked.

If your friend is using an Internet cafe to connect to to the internet, this will encrypt communications from the browser to the internet. Odds are, someone in the Internet cafe is intercepting unencrypted traffic from the browsers. If they control the access point, they can spoof dns and even intercept some encrypted traffic. SSH tunneling will prevent this by using the ssh server to forward all browser requests through the proxy.

Here is a good guide on setting up the browser and Putty in Windows to accomplish this.

http://www.sotechdesign.com.au/browsing-the-web-through-a-ssh-tunnel-with-firefox-and-putty-windows/

Good Lunk

Jfer
0
 

Author Closing Comment

by:chenzovicc
ID: 40081929
Thanks for your suggestions
0

Featured Post

Better Security Awareness With Threat Intelligence

See how one of the leading financial services organizations uses Recorded Future as part of a holistic threat intelligence program to promote security awareness and proactively and efficiently identify threats.

Join & Write a Comment

Healthcare organizations in the United States must adhere to the guidance of both the HIPAA (Health Insurance Portability and Accountability Act) and HITECH (Health Information Technology for Economic and Clinical Health Act) for securing and protec…
Many companies are looking to get out of the datacenter business and to services like Microsoft Azure to provide Infrastructure as a Service (IaaS) solutions for legacy client server workloads, rather than continuing to make capital investments in h…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
This tutorial demonstrates a quick way of adding group price to multiple Magento products.

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now