Never think of a VPN as complete anonymity, it's only keeping your IP private, not your information. It's simply to keep the idiots at bay with their DDoS and to protect your home location through IP look-ups from IP bouncing. It should never be used as a means to hide your personal information from hackers unless you run your own VPN server and trust the data center you are using to host the dedicated server. It's a thin layer of protection, similar to lamb-skin condoms. It's just a pipeline/tunnel, don't forget your towel.
Yes and no, it's all use-case. The reason we would use TOR is simply to pool our IP when we have no other valid means of proxying. It does add a layer, but most nodes are owned by feds. Try hosting a node in the U.S. for over 6 months without expecting a knock from the FBI, that thought process isn't feasible. The information gathered from the traffic of the onion protocol can sometimes be pivotal in hacking/credential harvesting. Some old friends once had a script that parsed everything to IRC (all traffic) with filtered feed. It showed credentials, etc... People setting up TOR nodes aren't setting up free services out of the goodness of their hearts for something known to handle cancerous digital black-market products, it's a logging/honeypot experiment and if a TOR node owner says they aren't logging, they're only lying to themselves. Compartmentalize what you use TOR for because it's not 100% safe. It has it's uses and ultimately, it's free.
Secure Shell, or SSH, is used to create a secure channel between a local and remote computer. While SSH is commonly used for secure terminal access and file transfers, it can also be used to create a secure tunnel between computers for forwarding other network connections that are not normally encrypted. SSH tunnels are also useful for allowing outside access to internal network resources.
For security reasons, sometimes you need to jump through hoops in order to connect to a server in SSH, and from that server SSH to another server. We do this with multiple hops.
1. Connect the local machine to host1
ssh -L38080:localhost:38080 grepNET@host1
2. Connect to host2 from host1
ssh -L38080:localhost:38080 grepNET@host2
3. Connect to host3 from host2
ssh -L38080:localhost:8080 grepNET@host3
Now if everything went as expected you should be able to see your /lol/ folder by firing up a browser and entering the target remote URL as a localhost URL with the 38080 port, for example: http://localhost:38080/lol
Flags: -t flag to chain commands // -v for verbose
ssh -v -L38080:localhost:38080 grepNET@host1 -t ssh -v -L38080:localhost:38080 grepNET@host2 -t ssh -v -L38080:localhost:8080 grepNET@host3
The best choice for securing yourself on IRC as an end-point IP is with an IRC bouncer called a ZNC.
We use the ZNC to keep the content (chats) available to us with a buffer from the server that you can attach/detatch from.
Instead of connecting to 6667 or +6697 (ssl), you'd choose a port that you created from the ZNC installation, and it goes as follows:
Download the latest source tarball.
tar -xzvf znc-1.7.5.tar.gz
(use --prefix="$HOME/.local" (cmake -DCMAKE_INSTALL_PREFIX="$HOME/.local") if you don't want a system wide installation or simply don't have root access; use --with-openssl=/path/to/openssl (cmake -DOPENSSL_ROOT_DIR=/path/to/openssl) if you have a non-standard SSL path)
(use --help to see other configure options)
(if you are on a dedicated server and your CPU has more than one core, you can use make -jX where X is the number of CPU cores to speed up compilation)
Now you want to configure the ZNC server (make sure you answer all the prompts) with:
Then you're all setup! From here, you'll connect to your ZNC from your favorite IRC client with:
/server znc.server.here:+sslport user:password
Once connected, type:
/znc addnetwork grepnet
Check your *status window and paste the information about the SSL fingerprint into the input text field for IRC and hit enter.
/znc jumpnetwork grepnet
/znc addserver irc.grepnet.org +6697
More coming soon.Services
Always chatting the hardest, and it shows vividly through our content
With efficiency in several programming languages, we stay fresher than table fruit
We have a diverse community with servers all over. Coming Soon: idk you tell me
It's all for hobby. Some go out to parties on the weekends, we like to stay up-to-date with technology
Tailoring the everyday experience with our own bots and services, updating all the things
We provide DDoS-Mitigated Virtual Private Servers, VPN Services, WebServer Management, and more
We're always in development and upgrading to new infrastructures for fun
Let's get a new project pumping today.