Main Page
Services
Forum
Support
News
About Us
Affiliates
 
Why Our Services ?
 
Privacy & Security Articles
 
Public Key
 
Our Policies
Internet; Anonymity; Privacy; Security;

In todays' online society we are faced with the same threats as we are offline with people trying to steal our identities and tap into our personal lives. When in the real world, we take steps towards maintaining our privacy by implementing such things as pin numbers, passwords, watermarks and various other options available to maintain authenticity. On the internet; is handling business and personal communications really safe ? If you already know what you want feel free to visit our services section otherwise keep reading !

Many people are led to believe that purchasing a PC and connecting to the internet is the best and most secure way to handle your bills, communications, and shopping, well it can be, but what are the risks? They have successfully prevented most types of identity theft in the real world. One difference in the online attacks are the fact that we do not have the capabilities to actually see the person we are doing business or communicating with. How can we avoid them tracking us and how do we know if their offers are legit? In this article, I'd like to point out some key points in the potential risks from being connected to the internet and the attacks malicious people / entities mastermind every day. I will also highlight a few proven steps you can follow to increase protection against malicious attacks and keep your business, family and friends safe.

Understanding Internet Attacks:

Malicious entities;

Usually these are people / organisations who are technically able to program or use readily available programs to initiate their attack on you. They range from the so called scriptkiddies to more advanced groups / organisations.

The reason for their attacks are usually but NOT nearly limited to:

1. Advertising - Usually done by installing what is called an adware program. It's such software that is put on your harddrive and is potentially dangerous as well as causing annoying pop-up ads (mini webpages) to appear on your desktop every five minutes or so.

2. Self interest - They've found out how to make this nasty program, now they want to see how many people will fall for it.

3. Economic / Political - If they are successful they can steal your identity and thus any account information they choose or make profit through the traffic drawn or information gathered. The possibilities of abuse are virtually limitless, think of using your computer to send out spam or attack other computers on the internet. Political reasons are nowadays at the core of cyber-attacks between countries, groups, individuals. All of this is done, nonetheless, without your consent.

Malware or Scumware;

Stands for Malicious Software that is created to obtain, manipulate or corrupt your computer data and interfere with processing which also makes your computer "lag" or perform poorly. It is usually the result of a download or contracted through non-secured ports/services.

1.They develop these programs to spread rapidly and can be transmitted to the computers of co-workers, family, friends and so on.

2.These "virii" are virtually impossible to detect without the right software and are damaging to your data. When you scan or use other means of finding the virus you will see that they go by many subnames. Two popular types you may be familiar with are worms and trojans.

3. If gone undetected or not taken care of in a timely manner your computer could be looking at being used as a base to attack other computers like executing denial of service attacks for example.

Portscanners and Packetsniffers;

Can attack/scan your computer as soon as you get online through your ISP. This attack occurs without even visiting a website or downloading anything. Their main purpose is to spy on what services you're running and analyse traffic to and from your computer. Any information gained during these scans can be used to attack you. To increase your protection is by making sure that your traffic is encrypted, not running unsecure services and have service ports shielded for example.

Tunneling:

Access;

When you access your internet service provider you are connecting to their servers via a network connection. To keep track of your internet account they have given you an Internet Protocol (IP) address. So your IP address identifies you on their networks but what else does this mean?

It also means that the other connections you make, for example, to services or websites (which usually run on remote servers) must also identify you somehow. They pick up your internet address virtually the same way your ISP did. If a malicious person is the owner of a server they can directly upload harmful files into unprotected computers using malicious software like described above. Your IP address tells them where you stand on the World Wide Web and can lead them to accessing your computer and installing for example malicious software that gives them access to your data. Therefore, any accounts, addresses, family identity, pin numbers, passwords, phone numbers and more are at risk if not protected.

SSH & VPN Tunneling;

The VPN (Virtual Private Network) or SSH (Secure Shell) connection you have made to our secure servers is designed to put up a "wall" between you and anyone else on the internet. If your data is unencrypted then
malicious entities may attack you by tapping into your live connection with a program and this leads from one evil to another. This program (there are thousands) can have other options that will crash your PC and turn your computer into a giant paper weight, allow them to record personal information without your consent, and cause annoying pop-ups to appear while you are visiting websites. Please note that this is only a simplified explaination and there are many more ways and advanced methods to wreak havoc.

By encrypting your data, hiding your IP address and all the data sent to our secure servers you connect with during your journey online, you remain private and increase your security. Your ISP is like a public road, they will not escort you through all the potential dangers on the internet despite that most provide some kind of support. We at trilightzone.org offer special services to make sure you can experience the internet at its best but without being a sitting duck.

SSL Webmail;

You can't always rely on your ISP to secure your email with all the attacks occuring these days, which brings me to my next point. Emails are becoming the most used line of communication as there are no long distance charges nor serious delays.

Are you tired of spam mail?

Some website owners are using programs and various scripting methods to trace your online activites, read your instant messages, even private e-mails. They collect personal data about you, your personal business, or even your family; they add you to a mailinglist and when they have enough names they will sell the list to various companies (most likely run by unethical people). Most ISP's don't bother with adding more security to your email accounts. Many don't use SSL to secure sending and receiving your email. By not doing that they allow others on the same or inbetween network to sniff your traffic which consists of sensitive data like passwords. Also they don't hide your real IP when sending out your email. Many more critical parts can be mentioned here but it should be more clear by now.

Using our Secure Mail service at trilightzone.org you can rest assured that all your email communication is SSL secured, your IP is not shown to the recipient, your mail is stored on realtime encrypted drives and in case of ease or travel we have also SSL secured webmail for you.

We also use special programs which will scan all email for a possible virus, trojan, worm and other malicious code. Another security layer will also scan for specific spam and treat it using advanced intelligence.

Be wary in the emails you open and NEVER download any attachments unless you are positive who the sender is and why there is an attachment involved at all !

Our other Services:

Feel free to contact us about our other services. Let us know if you are in need of something or advise. Perhaps you want to host your website offshore but want to make sure you can do this without revealing your identity to everyone or avoid issues from hosting it in your country.

Instead of using the newsgroups access of your ISP you might want to use ours combined with our tunneling products. Making sure that your ISP and other entities don't intrude your personal life or business and sell you as marketing data to the highest bidders all over the world !

On a final note...

Anonymity;

is the use of no name or identifying data like when you are posting in forums, bulletins or simply communicating. Think also of people wanting to use their Freedom of Speech but are afraid to reveal their identity to everyone. Protect yourself and everyone involved, make sure no one can abuse your data, damage your credit history, commit crimes using your identity...

Or just to use your Right on Privacy !

We wrote a comprehensive article with facts and fiction after we've analysed many other privacy providers. If you can spare a bit of time then we believe you'll be happy to read this article to understand the difference between us and many others. Especially when it comes to securing your traffic on the internet.

Continue to the article !

     
Copyright © 2005-2014 Trilight Zone. All rights reserved.