Results 1 to 4 of 4

Thread: Kubuntu: How to remain hidden on a network

  1. #1
    Join Date
    Nov 2010

    Kubuntu: How to remain hidden on a network

    I have a Netbook with a Kubuntu 10.04 setup, with complete disk encryption as completed with the alternative setup CD. I know regarding proxies and how they can permit you to remain nameless while you are accessing the Internet, but what I am inquisitive about is how to remain nameless or hidden while accessing an exacting network. For instance, say I depart to a local cafe and access their wireless network, how could I create it so that no further PC on that network can observe my PC on the network? If it is not probable to wholly eliminate one's footprint, what are a few ways to make it as small as probable?

  2. #2
    Join Date
    Jun 2009

    Re: Kubuntu: How to remain hidden on a network

    I am not an 802.11 specialist, but I discover it very improbable that you are going to be able to conceal your interface's layer 2 transfers, as that would rationally hinder with usual communication. Two easy things for considerably extenuating risks:
    1. Do not have any TCP/UDP services snooping for exterior connections.
    2. Just communicate over trusted, encrypted channels.

    If you are sending anything obvious text you can think that it will be cached and read.

  3. #3
    Join Date
    Mar 2009

    Re: Kubuntu: How to remain hidden on a network

    It depends on a large number on who you are annoying to conceal it from. An easy proxy, no script, and immobilizing cookies will keep websites from tracking you. A VPN warren will defend your transfer over WI-FI to keep people from inhaling your traffic. If you are annoying to hide your actions from ISPs VPN, if you are annoying to hide from regulation enforcement, ask in another place.

  4. #4
    Join Date
    May 2008

    Re: Kubuntu: How to remain hidden on a network

    If you contain one of those wire thingies associated to your computer, and it goes to one of those phone jack type things, or even inferior, you just choose yer signal from the Ether, after that there is a possibility, not slim to none, but a genuine chance that somebody can monitor that data. That is a reality. It depends on who needs to do so and how much time, wealth or water they wish to expend to get to that data, and after that, once more, to write out it. Keep in mind; it does not have to be read in real time to present one the unlucky alternative of real time.

Similar Threads

  1. "Try Kubuntu / install kubuntu" Spash, start screen
    By thekid86 in forum Operating Systems
    Replies: 1
    Last Post: 17-06-2011, 08:02 PM
  2. How to connect iPod Touch to hidden wireless network
    By Aarao in forum Portable Devices
    Replies: 5
    Last Post: 14-02-2011, 09:34 PM
  3. Replies: 5
    Last Post: 15-01-2011, 06:01 PM
  4. Windows Wireless Can't Find Hidden Network
    By bAbIyAh in forum Windows Vista Network
    Replies: 2
    Last Post: 14-06-2007, 07:41 AM
  5. Replies: 9
    Last Post: 07-05-2007, 01:32 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts