Meazza Posted July 10, 2015 Share Posted July 10, 2015 Imam jedno konkretno pitanje, ali tema moze da stoji i sama za sebe jer mislim da je korisna. Treba da otvorim paypal racun, koji mi je potreban radi transakcija iz inostranstva. E sad, zanima me kako da budem siguran da niko spolja ne moze da vidi broj mog racuna, sifre koje kucam, itd, drugim recima, koji je najbolji nacin da se potpuno zastitim od spyware-a i, lupam, potencijalnih hakera? Quote Link to comment
Tpojka Posted July 10, 2015 Share Posted July 10, 2015 Nemoj to da radis iz internet kluba ili sa nezasticenih wireless linija. Quote Link to comment
wall Posted July 10, 2015 Share Posted July 10, 2015 (edited) Dobar AV. Dobri passwordi. Redovan update os-a i instaliranih programa. Koristi zaštićenu mrežu. I naravno fw ako nije dignut sa av-om. Edited July 10, 2015 by wall Quote Link to comment
Time Crisis Posted July 10, 2015 Share Posted July 10, 2015 Dobar AV. Dobri passwordi. Redovan update os-a i instaliranih programa. Koristi zaštićenu mrežu. I naravno fw ako nije dignut sa av-om. Sve ovo + na tom kompjuteru gde otvaraš paypal nemoj da instaliraš kojekakve krekove, surfaš po xxx sajtovima i uopšte izbegavaj bilo kakvo slično rizično ponašanje. :) Quote Link to comment
Meazza Posted July 10, 2015 Author Share Posted July 10, 2015 Hvala ljudi. :) A sta znaci I naravno fw ako nije dignut sa av-om. ? Mislim, znam sta znace skracenice, ali ne razumem smisao saveta. Quote Link to comment
wall Posted July 10, 2015 Share Posted July 10, 2015 Hvala ljudi. :) A sta znaci ? Mislim, znam sta znace skracenice, ali ne razumem smisao saveta. Firewall, ili onaj koji dođe uz os ili onaj koji dođe uz neke av.Mora biti aktivan. Svakako ovo što kaže Time. Suština je, primeni osnovna infosec pravila, drži mrežu bezbednom, redovno apdejtuj software, imaj AV, passwordi što duži velika, mala slova, brojevi i znakovi. Ne koristi isti password za više stvari, menjaj passworde na par meseci. Dobro je i da imaš običnog usera za svakodnevni rad i admina kojim se loguješ samo kada treba. Možeš ići i dalje, npr uzmeš neki tablet za male novce i njega koristiš isključivo za ebanking. Naravno na pre toga zaštićenoj mreži. Osnovna pravila i malo zdravog razuma sprečavaju 80% provala. Imao sam negde statistiku... Quote Link to comment
Meazza Posted July 10, 2015 Author Share Posted July 10, 2015 Hvala. Kako da znam da je moja ADSL mreza, odnosno ruter, zasticen? Quote Link to comment
Time Crisis Posted July 10, 2015 Share Posted July 10, 2015 Ako tvoj ruter ima i wifi, nadam se da nije stalno uključen i svima dostupan. Quote Link to comment
Indy Posted July 11, 2015 Share Posted July 11, 2015 Treba da otvorim paypal racun, koji mi je potreban radi transakcija iz inostranstva. E sad, zanima me kako da budem siguran da niko spolja ne moze da vidi broj mog racuna, sifre koje kucam, itd, drugim recima, koji je najbolji nacin da se potpuno zastitim od spyware-a i, lupam, potencijalnih hakera? Možeš da koristiš za to virtualnu mašinu (recimo kroz VirtualBox), najbolje neki Linux sa Firefoxom. (A I u tom slučaju treba biti obazriv u smislu ovog što je pisano iznad). Quote Link to comment
Razzmatazz Posted July 15, 2015 Share Posted July 15, 2015 Glede "nemoj da ideš na xxx sajtove"... http://blogs.infosecurityeurope.com/two-major-it-security-myths-debunked/ Quote Link to comment
bigvlada Posted October 21, 2017 Share Posted October 21, 2017 Da ne otvaram novu temu, Wi-fi standard ima rupčagu. Today a collection of severe security vulnerabilities in the WPA2 encryption protocol for Wi-Fi are being disclosed, along with a proof of concept exploit. The weaknesses center around the process used for negotiating the encryption keys used by the client and access point. These core vulnerabilities are part of the Wi-Fi Protected Access WPA standard itself, so even devices that correctly implement WPA2 according to spec are expected to be affected. Both personal and enterprise WPA modes are affected, and both the original WPA and WPA2 are affected. The primary mode of attack exploits vulnerabilities in client devices, but there are some variants that affect features used by some access points. Highlight: Linux systems including Android version 6.0 and above generally use the wpa_supplicant program. This implementation of WPA tries to defend against key reuse by wiping it from RAM after it is used for the first time. When subjected to a KRACK attack, this means wpa_supplicant doesn't revert to the original key but instead replaces its key with all zeroes. Unfortunately, in the KRACK scenario this technique backfires and results in a known, fixed key, making decrypting future transmissions too easy. https://www.anandtech.com/show/11936/multiple-wifi-encryption-vulnerabilities-disclosed-affecting-almost-everything https://www.krackattacks.com/ Quote Link to comment
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.