05 Apr

Block Tor IP Addresses on your website

Block Tor IP Addresses on your website

The Tor network allows anonymous Internet browsing. Although this project is in its nature logical when we need to protect our identity, the fact remains that it is a risk for piracy.

Many people are using the deep web (Darknet) to conduct illegal activities or by making transactions with stolen credit cards, DDOS attacks or send SPAM on a small or large scale.

There’s no simple solutions to protect ourselves from users of the Tor network because the IP addresses change relatively frequently. Some users and some hosts allow internet traffic via their network.

 

Potential risks of a Tor user on your site

The Tor user can anonymously:

– Make awkward comments about your brand, your blog;

– Send SPAM to your address or to your web forms;

– Proceed with fraudulent orders on your online store;

– Extract information from your site, submit it to BRUTE FORCE attacks;

– Drive a DDOS attack;

– Use the Tor network to perform automated queries on your website.

 

Block Tor IP addresses

Internet Cloud Canada giving you a solution that will be an extra “layer of protection”. We recently explained how to protect from DDOS attacks with a good .htaccess file and by using the right equipment (cisco router, firewall etc.). This solution, will strengthen this protection.

Obviously, we will give you a slightly more practical solution though “manual” for the owner of a personal web site.

 

Solution in 4 easy steps

 

Step 1. Collection of current addresses of Tor

Go to the Tor Bulk Exit List exporting tool and click on the link “exit addresses”. Copy the result to a .txt file to your desktop.

 

Step 2. Collect only the IP addresses of the file

It is necessary to extract the IP addresses of the .txt file, so go to the Toolsvoid website. Copy-paste and press “submit”. The website will return the full list of IP addresses extracted. Copy this list on your desktop in another text file.

 

Step 3. Create an exclusion list for your .htaccess file

It would be tedious to manually write the .htaccess file for all these IP addresses. This is why you need to visit Tom’s Tools website that will generate it for you. Copy and paste the list and press the button “generate code”.

 

Step 4. Copy the code in the .htaccess file obtained

Copy and paste the code obtained in step 3 in your actual .htaccess file. Your website is now protected ftom Tor users!

 

Updates

Obviously, there is some ways to “automate” this procedure with a routine at the base of the web server. Your hosting provider may or may not offer this service. Internet Cloud Canada offers this service as an extra, if needed.

If you use our manual method, remember to repeat these steps regularly because now you know that the Tor IP addresses change relatively frequently. An interval of once each month seems quite appropriate to perform your updates.

If you have problems with anonymous users or want to act with prevention facing this problem, our 100% FREE 4-steps / 5 minutes solution worth it !

Enjoy!

Share this
02 Apr

Have you made a data backup on the 31st of March?

data backup Have you made a data backup on the 31st of March?

World Backup Day

Every day now seems to be devoted to a cause or an important event. March 31st (Two days ago) was the world backup day and there is even a website for it, view it here.

Have you done a data backup of your computers, mobile phones and tablets? If so, Well Done! Unless, it is not too late!
Actually backups should be done fairly regularly according to your habits ( installations of new softwares, updates of your documents).

We can no longer ignore the fact that hackers are constantly looking for ways to spread viruses and other malware. Moreover, over 30% of companies in a recent survey would even be willing to pay a ransom to recover critical data due to theft.

In addition, there are inherent risks due to the material itself who can fail. A hard drive has a real life period of 3 to 5 years depending on its use and the conditions of its environment.

Doing a backup on another disk or other media and even online on a Cloud Data Storage is strongly advised.

 

How to check a hard drive and predict a failure?

The best software to perform this type of audit is Crystal Disk Info, and I suggest you to download it on Source Forge. It will the ideal software if you buy a second hand hard drive on a classifieds site, giving you the possibility to check its condition.

 

Make an image of your disk

If you want to make an image copy of your drive, on LINUX, there is an excellent utility: Clonezilla. On Windows, this option is already provided by the operating system, but if you prefer an external solution to Microsoft, Acronis True Image is the perfect solution.

Pin on your calendar the next copy of your data and mobile devices, nothing beats the peace of mind!

Share this
01 Apr

Mobile Phone : Lost, Stolen or buy an used one

mobile phone buy used one or lost stolen

It is not difficult to find used mobile phones on site ads like KIJIJI or Craigslist or other such sites. The society is always pushing new models and features.

On the other hand, the loss, theft or just the interest of a bargain can make someone buy a second hand mobile device.

A wide crime area turns around the mobile phones and so for a while. Fortunately, manufacturers have taken decisions that greatly help to counter the theft of mobile phones.

So we will see what are the steps to do or to avoid in the loss, theft or purchase of a used mobile device.

 

Buying a used phone

You should not have blind trust in the person who sells you a used phone on a classifieds site or in the newspaper. Many people are fooled by simple subterfuge to avoid the buyer conducting normal verifications.

If the sale must be done quickly, blindly or a crazy story binds the purchase of your device, it’s probably a scam! Quit without hesitation, the adage says: “When it’s too good to be true …”

 

Tips:

– If the person says that the device is in its original packaging, unopened, it  do not guarantee a”SAFE” sale. It is easy to laminate a box in order to give the illusion that the phone has not been used or the box opened.

In these cases, unpack the product with the seller and make sure that the product is what you want to buy.

– Do not send money by mail or by transferring funds with Western Union or other.

– Meet the seller at his place of residence or work.

– Sign a paper , even if it is handwritten and simple for the conclusion of the sale.

– Tell the seller that you will conduct verifications to determine the status of the device you are about to buy. If he refuses, it is a clear sign of scam.

 

Steps to do

Turn on the device and grab the unique identification code (IMEI) by performing:

* # 06 # on the keypad of the unit. Write down this sequence of digits.

Check the status of the device in Canada by going to this website.

By entering the IMEI you will know if the device has been reported stolen or if there are restrictions or if the IMEI has been hacked.

** Do not be fooled by an IMEI that the seller will give you by email or phone prior to verification purposes. Recheck it and verify that every digits correspond to what he told you.

 

IPHONE

If the device you buy is an iPhone, go to ICLOUD.COM and check the lock status of the device. If you notice that the phone is locked with a ICLOUD ID, ask the seller to disable the protection.

Before going to the rendezvous, visit the Apple page that provides information on the ICLOUD protection, by clicking here.

 

THEFT or LOSS of a mobile phone

Prior to the occurrence of loss or theft of your favorite mobile phone, take the following measures for prevention and to facilitate the management of this unfortunate but possible situation :

– Turn on the device and grab the unique identification code (IMEI) by doing: * # 06 # on the keypad of the unit. Write down this sequence of digits.

– Set the protection “find my iphone” and lock the device with your iCloud ID if it is a IPhone.

– Activate a complex lock code on your mobile device. Avoid 1234 or 0000. sequences. If your machine is equipped with a fingerprint detection, you’re all done with this step!

– Activate the CLOUD services to backup your data and protect them. Make sure that backups are done on a regularly basis.

– Engrave the device in its back with your license number. If your device woth $ 900, I doubt that you will sell it tomorrow. Go to the nearest police station and rent the equipment, it’s a free service, or ask for the service to your favorite jeweler who will be happy to do it for a few bucks.

 

THEFT OR LOSS IN PROGRESS

Follow these steps:

– Locate your device remotely and lock it, wipe all the data.

– Inform the police department by following these links.

– Call your mobile service provider and stop the SIM card or disable the mobile package if the unit does not contain one (unlikely these days but …)
If you find back your device, make sure you still destroy all data by performing a restore. Who said they have not intentionally mishandled your device to hack your personal infos…

Share this

© 2018-2023 Internet Cloud Canada.Tous droits réservés. (Sitemap).