First, I logged into my router and prevented any traffic on certain ports to get into my computers. In this way, there was a basic level of protection that I could further tighten. Then on the server I run at home I set up far stronger protections. On it, I installed a strong firewall. This locked down my system heavily, so that only traffic I know about will be traveling to or from the server. Secondly, I installed antivirus and rootkit detectors. Even though I run a linux-based server, I have seen it compromised before and given that I could be dealing with governments or skilled hackers trying to prevent me from sending the aid I was intending to, I wanted to leave nothing insecure.
The last few things I did are more intricate than are required by this post, but included full-disk encryption, memory and swap-space encryption, user-right restrictions, and more. Most of these were suggested either in AnonOps IRC channels or forums, but some came from Tor's website. In my next post, I will describe what Tor is and why it was useful assistance to run it.
No comments:
Post a Comment