The Notebook Review forums were hosted by TechTarget, who shut down them down on January 31, 2022. This static read-only archive was pulled by NBR forum users between January 20 and January 31, 2022, in an effort to make sure that the valuable technical information that had been posted on the forums is preserved. For current discussions, many NBR forum users moved over to NotebookTalk.net after the shutdown.
Problems? See this thread at archive.org.

    vpn or annamosity question

    Discussion in 'Networking and Wireless' started by aan310, Jul 17, 2008.

  1. aan310

    aan310 Notebook Virtuoso

    Reputations:
    738
    Messages:
    3,811
    Likes Received:
    2
    Trophy Points:
    106
    what is a VERY good program for this? i prefer free, but i wouldn't mind spending a little cash... please dont give random answers, id really like actual suggestions, and not responces from googling VPN, because i have tried that...
    Also, it needs to be vista 64x compatible...
    Thanks
     
  2. Hep!

    Hep! sees beauty in everything

    Reputations:
    1,806
    Messages:
    5,921
    Likes Received:
    1
    Trophy Points:
    206
    Software like Hamachi, for creating a software VPN, or are you looking for something more like router to router SSH tunneling, "roadwarrior" to router tunnelling, etc?
     
  3. aan310

    aan310 Notebook Virtuoso

    Reputations:
    738
    Messages:
    3,811
    Likes Received:
    2
    Trophy Points:
    106
    err.... software... i dont speak networkeese.
    I have hamachi, but when i go to one of those what's my ip sites, it gives me my correct ip.... so i dont think that is working
     
  4. kegobeer

    kegobeer 1 hr late but moving fast

    Reputations:
    836
    Messages:
    3,682
    Likes Received:
    0
    Trophy Points:
    105
    Are you looking for software that alters your IP address, or are you looking for an anonymous proxy to route all of your web surfing though?
     
  5. Hep!

    Hep! sees beauty in everything

    Reputations:
    1,806
    Messages:
    5,921
    Likes Received:
    1
    Trophy Points:
    206
    that's because Hamachi is for creating a VPN (virtual private network) with specific other computers, and other computers only. Your external IP address will remain the same.

    Please explain what your goal is so I can better assist you.
     
  6. aan310

    aan310 Notebook Virtuoso

    Reputations:
    738
    Messages:
    3,811
    Likes Received:
    2
    Trophy Points:
    106
    my goal is to use the internet or other programs that use the internet in general to hide my ip and remain very anonymous.
    i have a very skilled hacker friend, who thought it was funny to attack my computer, and he gets my network info via playing games online, or chat... so i want to block that some how... and if i take my laptop to a public place to prevent passwords getting stolen
     
  7. Hep!

    Hep! sees beauty in everything

    Reputations:
    1,806
    Messages:
    5,921
    Likes Received:
    1
    Trophy Points:
    206
    It won't protect you from getting your passwords stolen, that's only going to slow your internet down to hell as it's going to relay all of your traffic through another computer, and your traffic will appear to come from that location. This is not called a VPN, rather, this is called a PROXY. A VPN is for creating an emulated local network over a WAN.

    If he has your IP and is annoying you, I'd suggest releasing your IP address and letting your ISP assign you a new one. The easiest way to achieve that is to unplug your modem overnight and plug it back in in the morning. Chances are you'll have lost your lease and will be given a new IP.


    Though I have my doubts that your friend is skilled enough to be anything significant to you with only your IP. How did he attack your computer?
     
  8. aan310

    aan310 Notebook Virtuoso

    Reputations:
    738
    Messages:
    3,811
    Likes Received:
    2
    Trophy Points:
    106
    idk... he is a good buddy, and jsut does random stuff to annoy me... i know he gets my ip (i think at least) when we play games or chat... and he will do random, but generally harmless virus crap... so changing my ip doesnt help, because he will get it again, lol

    EDIT: so really, i jsut want a program i can open when i am talking to him or playing a game with him taht he will get no ip, or a random ip, and not mine... his "attacks" don't do much, but they are annoing, and he is too immature to stop...
     
  9. Hep!

    Hep! sees beauty in everything

    Reputations:
    1,806
    Messages:
    5,921
    Likes Received:
    1
    Trophy Points:
    206
    Well, what I am saying is my bet is he is just a teenager that has some program installed on your computer that he's connecting through, such as a RAT (remote administration tool). He could have infected your computer, but he's NOT sending you viruses based on your IP address. I am sure of this. He might be connecting to the RAT via the IP though.

    Try running this software here, see if it picks anything up.
    http://technet.microsoft.com/en-us/sysinternals/bb897445.aspx


    EDIT: Oh, 4GB RAM, you probably have vista... RKR doesn't work well with Vista. Do you use any antivirus? If not, scan your computer with a BitDefender trial.

    And I think you mean "anonymity" not "annamosity"
    http://dictionary.reference.com/browse/anonymity
    http://dictionary.reference.com/search?r=2&q=animosity
    :eek:
     
  10. aan310

    aan310 Notebook Virtuoso

    Reputations:
    738
    Messages:
    3,811
    Likes Received:
    2
    Trophy Points:
    106
    yea... i have avaira. once it is on, i dont have a problem removeing it, but still, it gets really annoying...
     
  11. Hep!

    Hep! sees beauty in everything

    Reputations:
    1,806
    Messages:
    5,921
    Likes Received:
    1
    Trophy Points:
    206
    Well, turn off your current anti-virus temporarily and run a scan with a BitDefender trial. Should pull out whatever little nasty your friend put in there on you.
     
  12. aan310

    aan310 Notebook Virtuoso

    Reputations:
    738
    Messages:
    3,811
    Likes Received:
    2
    Trophy Points:
    106
    i took it off, but there is no stopping him from putting it back on. that is the problem
     
  13. Wirelessman

    Wirelessman Monkeymod

    Reputations:
    4,429
    Messages:
    4,401
    Likes Received:
    0
    Trophy Points:
    105
  14. Hep!

    Hep! sees beauty in everything

    Reputations:
    1,806
    Messages:
    5,921
    Likes Received:
    1
    Trophy Points:
    206
    If you took it off, he CANNOT put it back on, not unless you run a file he sends you. Just don't direct connect with him on AIM or open his emails with attachments, and you're safe.
     
  15. aan310

    aan310 Notebook Virtuoso

    Reputations:
    738
    Messages:
    3,811
    Likes Received:
    2
    Trophy Points:
    106
    well, like i said, because he is one of my best friends, we share files and songs with eachother a bunch... it is jsut annoying (and what ever he attaches to the files, or gets on my computer some how, he does keep getting it back on... idk how...)
     
  16. Wirelessman

    Wirelessman Monkeymod

    Reputations:
    4,429
    Messages:
    4,401
    Likes Received:
    0
    Trophy Points:
    105
    Just for my own education, why did you discarded my suggestion ("Hide My IP 2008"), isn't a good application?
     
  17. aan310

    aan310 Notebook Virtuoso

    Reputations:
    738
    Messages:
    3,811
    Likes Received:
    2
    Trophy Points:
    106
    well,
    A. it is $30
    B. all the reviews say it is bad...
    so i am jeeping my options open to more suggestions. I will try that if i dont get other suggestions
     
  18. Hep!

    Hep! sees beauty in everything

    Reputations:
    1,806
    Messages:
    5,921
    Likes Received:
    1
    Trophy Points:
    206
    You're looking to go about this the wrong way and I'm telling you a solution that you are ignoring. It's kind of irritating.

    Masking your IP isn't going to help you much, IF AT ALL!

    What you really need to do is get a good anti virus, something that actively monitors your files. So BitDefender or NOD32 are my suggestions.
     
  19. aan310

    aan310 Notebook Virtuoso

    Reputations:
    738
    Messages:
    3,811
    Likes Received:
    2
    Trophy Points:
    106
    ok... ill try diffrent anti virus...
    but the problem is i have vista 64x... ill try your suggestions
     
  20. Wirelessman

    Wirelessman Monkeymod

    Reputations:
    4,429
    Messages:
    4,401
    Likes Received:
    0
    Trophy Points:
    105
    Thank you, is not good to know that they have a bad review.

    The trial is free, may be just for the sake of trying it and see if works is worth to get it and if doesn't work for you then don't buy it.
     
  21. Hep!

    Hep! sees beauty in everything

    Reputations:
    1,806
    Messages:
    5,921
    Likes Received:
    1
    Trophy Points:
    206
    I run NOD32. The PC shop I work in is a BitDefender reseller. They're my two top picks for AV, and they both will scan files as your friend sends them, preventing him from re-infecting you.
     
  22. Shyster1

    Shyster1 Notebook Nobel Laureate

    Reputations:
    6,926
    Messages:
    8,178
    Likes Received:
    0
    Trophy Points:
    205
    This is the correct solution to your problem. Basically what you have to do is get a good antivirus program, and you need to scan everything you get from your "friend" specifically before you open it or otherwise interact with it. Any good A/V software has the capability of letting you scan a specific file whenever you want to instead of having to wait for an overall system scan.

    Also, as was pointed out, even running your connection to your "friend" through an anonymous proxy isn't going to do you a bit of good because, each time you interact with your "friend," he's going to know that it's you because of the content of what you send him, not because of your IP address, and if he's going to then send you an infected file, it will get back to you notwithstanding the anonymizing proxy.

    Here's why. In a nutshell, when you communicate directly with your friend, each time you send something, the networking drivers on your computer generate a packet (usu. in the standard internet protocol TCP/IP). That packet is structured according to the protocol and always contains certain data segments called headers. The headers contain, among other things, your IP address and source port, and your "friend's" IP address and destination port. In other words, it's just like an envelope that you put in the mailbox, it has a To: address and a From: address.

    When you use an anonymizing proxy, you have an additional piece of software on your computer that takes the packets intended to be sent to your "friend" and puts them into another TCP/IP packet (aka a wrapper) that also has the same headers, but with different information, namely, it still has your IP Address and source port, but the destination is now the IP address and destination port of the proxy.

    When the proxy server receives a packet from you, the server has software that strips off the outer, wrapper TCP/IP data (e.g., the additional header info that was added on to get the packet to the proxy server) and then it goes into the header information in the original TCP/IP packet that was going to be sent to your friend, and it changes the source IP address and source port, replacing your IP address with an IP address that is registered to the proxy server, not you, and replacing your source port with the (random) source port from which the proxy server will be sending the packet on to your "friend." The proxy server then keeps track of the IP address and port number that it used to pass on your packets so that it can send and reply packets it receives back to you.

    When your "friend's" computer receives the altered packet from the proxy server, it will keep track of the source IP address and source port identified in the TCP/IP header information from the packet it received, and will use those two pieces of information as the destination IP address and destination port when your "friend" wants to send a reply back to you.

    However, because you're running through a proxy server, when your "friend's" computer sends out a reply packet on the internet, that packet will end up going to the proxy server, which will read the destination IP address and destination port number, look through a data table to find which IP address and port number the packet should be forwarded on to, at which point it will find your actual IP address and port number.

    The proxy server will then send out a new packet to you, with TCP/IP headers that now contain your actual IP address and destination port number. That will get the packet to your computer, which will receive it and, being none the wiser, will identify it as a reply packet received from your "friend."

    However, through all of these shenanigans, your "friend" doesn't need to know your actual IP address to send malware back to you; all he has to do is attach an infected file to the reply packet that gets sent back to the proxy, which will, in general, not pay any attention to the data contents of the packet, just the packet header information, and will thus send the infected file back to you untouched and, if you open it, you'll get infected just as easily as if you hadn't been using a proxy server in the first place.

    So, ultimately, what matters is making sure that everything received from your "friend" gets a good scan and a good de-lousing from very robust A/V software before you interact with it in any way.

    Lastly, if you're wondering why I keep referring to your "friend" in quote marks, it's because someone who continually does this to you after you've told him you don't appreciate it, is not really a friend, or at least not really a friend worth keeping.
     
  23. Hep!

    Hep! sees beauty in everything

    Reputations:
    1,806
    Messages:
    5,921
    Likes Received:
    1
    Trophy Points:
    206
    Now Shyster's a man I can get along with :D
     
  24. aan310

    aan310 Notebook Virtuoso

    Reputations:
    738
    Messages:
    3,811
    Likes Received:
    2
    Trophy Points:
    106
    Thanks Shyster1, that explanation did make sence, and i get it now.
    Is nod32 in a 64bit flavor?
     
  25. Hep!

    Hep! sees beauty in everything

    Reputations:
    1,806
    Messages:
    5,921
    Likes Received:
    1
    Trophy Points:
    206
    I just run the 32 bit version in Vista X64.
     
  26. aan310

    aan310 Notebook Virtuoso

    Reputations:
    738
    Messages:
    3,811
    Likes Received:
    2
    Trophy Points:
    106
    i got the demo and it diddn't let me install cause it wasn't 64x
     
  27. Wirelessman

    Wirelessman Monkeymod

    Reputations:
    4,429
    Messages:
    4,401
    Likes Received:
    0
    Trophy Points:
    105
    May be there is no such a friend, and the OP just want to hide his IP address for some purpose ;)

    But as much I respect all your good advice about getting an anti-virus, that brings to mind soldiers wearing a bullet prof vest, hopefully they don't get shut in the face. Wouldn't be better to shoot first? And to hide the IP would be to do just so, prevent the "friend" to attack back.

    PS: The "friend" doesn't need to check the packets content to verify that is you, correct if I'm wrong, you are synchronizing when you play, right? In other words, you call each other saying, hey wanna play? "friend": Yeah, and let me infect you :D
     
  28. Hep!

    Hep! sees beauty in everything

    Reputations:
    1,806
    Messages:
    5,921
    Likes Received:
    1
    Trophy Points:
    206
    Uhm, anti-virus would be like a tank as far as protection it would provide, and his "friend" I can assure you is a dumbass 16 year old kid using a program someone else wrote to take control of his friend's computer. This is the equivalent of a 16 year old against that tank. Hiding his IP address, AS SHYSTER SAID, will NOT BE EFFECTIVE. All the traffic is relaying through a proxy and back to him anyway, plus his true IP is hidden in that packet data. A few minutes with WPE or Wireshark and he could pull that data out.

    Juat accept that this is not the correct solution and the correct solution is securing your system.
     
  29. Wirelessman

    Wirelessman Monkeymod

    Reputations:
    4,429
    Messages:
    4,401
    Likes Received:
    0
    Trophy Points:
    105
    Once the "friend" reached the OP's router, the WiFi encryption is irrelevant, the stupid router will convey the packets to the destination.

    All this has to do with trusting the one not to be trusted. From the moment you are opening your port to your "friend" is like opening the door in your house, you trust this person, however is ridiculous that this person infect your system once you have said to him, come in.

    Did you put a bet with him that he would not infect you next time?
     
  30. aan310

    aan310 Notebook Virtuoso

    Reputations:
    738
    Messages:
    3,811
    Likes Received:
    2
    Trophy Points:
    106
    you hit the nail right on the head ('cept i don't know if he made the programs or not)...
    i am going to see if i can get a 64x version of nod 32, as i have heard lots of good stuff about that one (just in general). i am junda mad i am going to have to pay for antivirus (avira is free, so is avg [the 2 u use of computers, but not at the same time, lol])

    Thanks for the suggestions, and ill keep you all informed if this stopped him or not...