CategoriesNewsSecurity

Wannacry Ransomware Attack – Updates From Top Sources

WannaCry? Ransomware Spreads Globally…

A ransomware attack began last week in Europe, targeting thousands of computers running Windows. Ransomware is malicious software that makes it impossible for the user to access their computer files unless they pay a ransom. Ransomware attackers frequently ask to be paid in bitcoin. Often times, even after the ransom is paid, the user still does not regain access to their files. The name of the worm that targets the Windows OS is called Wannacry (or WannaCrypt, WanaCrypt0r 2.0, Wanna Decryptor)

Here are some updates about the Wannacry ransomware attack from some top tech sources as well as clever comments from the internet:

NSA says ransomware was like “fishing with dynamite”

Quick guide on how it all works:

More leaks coming….

Leave Wannacry Hero Alone!

“A stealthy cryptocurrency-mining malware that was also using Windows SMB vulnerability at least two weeks before the outbreak of WannaCry ransomware attacks.”

IBM Suggestions to protect yourself from ransomware

Microsoft be like

“The Wannacry Starter Pack”

VXShare claims to have access to Wannacry samples

Some Linux users are gloating

See more news stories like this.

Photo Credit: christiaancolen

CategoriesHow To GuideInternetPrivacy

How to Install Tor Browser on Windows

One of the great things about the internet used to be the anonymity of it. You have the freedom to share information without compromising your privacy. However, with technology becoming ever better, it is becoming increasingly difficult to stay hidden on the web. If you are looking for privacy over the web, look no further than using Tor.

What Tor is

What is Tor and how does it work? To fully understand Tor, it needs be broken down into separate parts. That first part is called onion routing. Onion routing is a system designed to block any kind of efforts to track communications. It allows two ends to communicate to each other without letting either party know who exactly they are communicating with. It also ensures encryption.

The second part is the Tor network. The tor network is a large connection of servers that are operated by volunteers. These servers run onion routers that funnel internet traffic through virtual pathways. In simple terms, they scramble the traffic in a way that makes it almost impossible to track who is talking to whom.

The last part is a Tor browser. Most browsers are set up to store information on the user. If you allow your browser to store your password for any site, then it is tracking information on you. The normal browser stores cookie files and browsing history. Both of these are information stored on you so that it can either deliver a better service to you or deliver advertisements based on your general interests. Neither of these support efforts towards privacy.

Installing a Tor Browser on Windows

The first step to installing the Tor browser is to go to the website at www.torproject.org/download. Download the version for your operating system. Follow the installation directions in the same way for normal applications. Once the installation is complete, run the browser. From here, you’ll be able browse the internet anonymously with limitations.

There are limitations and considerations to using a Tor browser. First, the tor network only provides privacy and encryption while inside the network. This means that any communication passed once outside the network is vulnerable. Next, the tor browser does not protect all of your computer’s activity. If your computer is not going through Tor then it is not providing anonymity. Also, it does not protect against document downloaded through Tor while online. If you download a document while using Tor, do not open the document. If you must, start a virtual machine and open it within the machine while it isn’t connected to the internet. The last thing is not allowing plugins to run on the Tor browser. Plugin extend the functionality of a browser. However, they are extension that run on your computer that have the ability of opening holes in your security.

The Deep Web

While anonymity can provide a place to freely share ideas, it can also be a source of illegal activity. With that being said, the Tor browser allows you to surf websites that operate illegal and sometime immoral activities. Websites like “The Hidden Wiki” do not censor some material that others may find offensive. To sum it up, Tor browsing offers anonymity but at its price.

CategoriesHow To GuideLinuxOpen SourceUbuntu

How to Install Ubuntu from a USB Flash Drive


The above video shows how to install Linux Ubuntu 15.10 with a USB

(As of this writing – 14.04 is still the newest stable release, instructions for installing either version are outlined below:)

Don’t feel like paying for a Windows registration key with that OS? Ever thought about trying an open source operation system? There are many other options out there for people who want a newer OS but don’t want to pay for the cost of Windows. For example, let’s take a look at Ubuntu:

Ubuntu is an open source operating system that’s been around since 2004. It is based on the Linux operating system family. Its uses range all the way from personal computers and mobile devices to servers.

You can install Ubuntu easily even from a USB. First, go to the website and download the OS. If you’re interested in the desktop version of Ubuntu, you can go to http://www.ubuntu.com/download/desktop. They currently have two releases: 14.04.13 and 15.10. Each release has a version for either 64 bit or 32 bit. If you have less than 2 GB of RAM, download the 32-bit version.

You’ll download the file as an .iso file. An .iso file is a digital copy of a disc. Take this .iso file and place it onto your flash drive. Once this is complete insert it into the computer in which you wish to install Ubuntu.

The computer will need to boot from that flash drive. Most computers have a boot menu that you can get to when the computer first boots up. Once you access this, you can tell the computer to boot from that flash drive. After these changes have been made, you can then boot from the flash drive.

Once you are booting from the USB flash drive, you will see the normal menu to select your language. Go through the installation guide. You will be given the option to install Ubuntu on your computer’s hard drive.

The requirements to do this are pretty simple. Your USB flash drives needs to have around 2GB space. The Ubuntu site lists that it’s possible to have a 1 GB flash drive as long as the .iso file has enough space.

There are things to consider when using this method. One of them is speed. It would be faster to use a CD/DVD disk due to the limitation of standard USB 2. Also, it is possible to use other standards of USB such as 1.1. However, speed will be great affected. USB 3 can also be used.