Anda di halaman 1dari 40

The Adventures of

Online Security for Dummies


w w w. s u p e r p e i f . c o m
The Adventures of

Online Security for Dummies


w w w. s u p e r p e i f . c o m
Meet the Kalinovskys, an ordinary
family living somewhere in Eastern
Europe. Like most of us, both the
older and younger Kalinovskys
spend lots of time on the Internet,
chatting in social networks, playing
online games, downloading music,
watching live sports events,
shopping online and meeting new
people on online dating sites.

The comic “The Adventures of


Super Peif” explains the basics
of how to be safe on the Internet.
It will help you to protect your
personal data and keep your
passwords, files, email boxes
and online finances safe.

It offers simple answers to the


security issues that normal people
face in their everyday online life.
2
A typical morning at the Kalinovsky family
home, somewhere in Central Europe. 6:00

Peif, the dog,


rises first.

6:05

Peif wakes up Ivan, the head of the family,


letting him know that it’s time for his morning walk.
1 Another complaint from a client?
What’s it this time? His email,
Facebook and Twitter accounts
have been hacked? How can By the time they return,
he be so careless? his wife Olga is already
up, making breakfast
and answering an email
from her friend.
She works in a library
and doesn’t have time
to check emails
during the day.

Ivan is the director of


an Internet cafe and is
always busy.
6:45
4 5

3
6
Hey, don’t forget On the way to the
your breakfast! university, he will check
his email and write a
post for his blog on his
cell phone.

Áîðèñ –
ñûí Îëüãè è Èâàíà.
Îí óæå îïàçäûâàåò
â óíèâåðñèòåò.

7:15 What are these


7 popup windows on
my screen? Oh well,
8 I’ll just click ok.
After they leave, only Tanya, Tanya doesn’t suspect that
their daughter, is still at home she already has an admirer.
and in bed. A freelance artist, It is her neighbor, Victor, a
she spends her days surfing young scientist working at
online, especially on different the university lab. He sends
social networking sites. Tanya chat messages
She dreams of meeting every five minutes.
and marrying an
Italian guy.

11:00
9

11

This is a
normal day
for the
Kalinovsky
household. And what
is Peif up to?
10

4
13
Peif knows that his family He reminds Ivan about the most important rule
can’t survive without the for Internet passwords.
Internet. So he constantly
guards their safety.

You should create a


unique password for
each account you have.
A password is like a key,
and there is no one key
that fits every lock.

14 He teaches Olga how to use


her email safely

12

15
It is Peif who prompts
Boris to be careful when
using mobile Internet.

When you communicate


via email, always use HTTPS
protocol. Unlike the standard
Don’t install any unsecure applications, HTTP protocol, HTTPS encodes
because your cell phone or PDA can be your information. Remember,
hacked just like your computer. And don’t the letter “S” means “secure”.
save your passwords in your cell phone
memory: it’s much easier to lose your
phone than your computer.

5
16
He tells Tanya about Finally, he keeps reminding
one of the basic safety Victor to pay attention
rules for using online to the little details.
social networks

Read carefully what appears


in popup windows and don’t just click
“OK”! You might be allowing bad
applications to be installed on your 17
computer without you noticing.
Never use “default” settings for your 19
accounts. Always create your own
settings . The more individual settings
you have, the harder it will be for
anybody to spy on you or hack your 18
accounts. And you’ll get less spam.

d The mailman put


anage
o d a y Peif m e. He’s no a letter in the wrong
T n
everyo . box again!
to help guard dog..
r d in a r y
o

In the evening,
the whole family gathers
around the dinner table.
As usual, Victor finds
an excuse to drop by.

e is PEIF:
H t Expert g!
a Pe net Filterin Peif falls asleep
r
on Inte on his mistress’ knees.
Even superheroes
sometimes need
to rest.

20

6
w w w. s u p e r p e i f . c o m
2
Let's go out tonight?

NIO !busy!
'm

1
I have more chances
if I create my profile
on a dating site!
If I could only meet an Italian guy,
who would fall in love with me…

Unless I pretend to be
3 4
an Italian! I'll write to her!

She will never love me…


She is only interested
in her Italians
from the magazines…

5 6

8
8

Stop! l know
il
She w 're not
Buona giornata! a t y o u our
th n by y
Tty mi piace molto. li a
an Ita ess!
r
Spero di scrivere IP add for
di me. Angelo. e a r ch
S
mity
anony
tools

9
When you connect to the Internet, By IP-address
your computer is normally assigned anybody can locate
a numeric IP address your country or…

10 11

YOU!
12
WANT TO KNOW
MORE ABOUT IP?
https://www.sesawe.net/spip.php
http://ngoinabox.org/

… your exact location!


13

9
Download
Tor Browser Bundle

14 15 16

18 19
All the traffic between these
relays is encrypted, and
each of the relays knows
only the IP address of two
other relays – the one
immediately previous
to it and the one
immediately after
it in the chain.

This makes it very difficult


for your Internet provider to
know what your target Web
site is or what information
you are sending.
17
Learn more about
20 Tor Browser Bundle:
https://www.sesawe.net/
Using-Tor-Browser-Bundle.html
http://www.youtube.com/user/
freedom4internet (video)

And the target Web site will


not know your IP address.
21

10
23

ks!
It wdoonr't want
But I apanese…
J
to be

22
I've got a mail
from a real Italian!

This eitster!
ch b
mu

Yeah right! 24 25
This 'Italian'
can be anybody,
even our
neighbor
And how am I supposed
to find my true Italian love?

26 27

11
w w w. s u p e r p e i f . c o m
Just for half an hour
and then home!

1 3

2 4

Alone at last.
Now i can play a little. ge.it
Strapln
aying
I was esterday.
just y

13
7 8
Neew
shir
t?
te
Yes ! orld
w
o the
f ame
Half ng this g
yi
is pla

Me too… I play it
from time to time.
I mean, used to play…

10 11

NE
CON CT

Our provider has you t


ried
blocked the game's website. Have
I even tried to access it Tor
Bridg
es?
with Tor, but it didn't work! with

14
12

Sometimes
Internet providers
can block Tor.
13

14
In this case you may want to use
the bridge feature of Tor.

"Bridges" are Tor relays that aren't


listed in the main public Tor directory.
This is a deliberate measure to stop
these relays from being blocked.
Even if your Internet service provider
is filtering connections to all the
publicly-known Tor relays, it may
not be able to block all of the bridges.
15

15
16 17
To use a bridge, you
need to locate one and
add its information in
your network settings.
Send an email from a
Gmail account to
bridges@torproject.org
with the line "get
bridges" – by itself –
in the body of the mail.

After you get addresses for some


bridge relays, you must configure Tor
with whatever bridge address
you intend to use.
HOW TO DO IT?
Find more information
about the settings here:
https://www.sesawe.net/Using-Tor-
Next
with-Bridges.html
evening

y
wor r RE
Don't AKE CA
I'LL THEM!
OFereTis myord?
W h ical sw
mag

Hangere, dad
in th ost
lm
I'm ae!
ther

18 19

16
w w w. s u p e r p e i f . c o m
1 2
I thought Next day
more people would in the club
show up...

Yedauhde!

3 You're surprised nobody came?


I downloaded your album last week.
It sucks!
We'll rock this club
tomorrow!

could
How ave ?
you hloaded it
down n't even
ve
We ha nline yet!
4
o
put it That's not the album!
It's only a demo!
I wonder how somebody
stole it?

18
6
But you guys often
The music was on my laptop. use the wireless Internet
And I have serious passwords at the university café,
and a firewall… don't you?
It was well protected!

m m m…
H ...
yeah

19
10

OW
Buutld H
he do
it?
co

Ozzie, that metal guy who


graduates this year, could have
stolen the demo. He's always
giving us a hard time because
we play pop music.

11

12 13

If you doubt whether your Internet connection


is protected, use Hotspot Shield.

14

This impenetrable tunnel


protects your email, instant
messages, information about
online purchases and all other
data sent via the Internet from
unauthorized viewers. Hotspot Shield creates a virtual private network
(VPN) between your computer and the Internet –
a reliable, secure “tunnel” for safe access.

20
16

Moreover, Hotspot Shield encodes all data,


thus ensuring your anonymity in cyberspace.
15

17

WANT TO
KNOW MORE?
https://www.sesawe.net/
Anchor-Free-Hotspot-Shield.html
http://www.hotspotshield.com/
http://www.youtube.com/user/
freedom4internet (video)

21
18

i t bombed o
Since lub, let's d
c t!
at the ne concer
l i
an on

Two days later in the garage


mn , 0
Da
re th
a n 2 ,00
ed
Don't forget to switch mo tch
19 le wa
on Hotspot Shield, peop oncer t
c
so nobody can interfere their !
e
with our broadcast. onlin

20

22
w w w. s u p e r p e i f . c o m
1

4 pm and not a single visitor…


Everybody's getting ready
for Christmas

I can use the 4


free time to shop
online for presents

Maybe the library


has blocked access
to online shopping

24
Your Internet
provider or Web
administrator can
block access to
certain websites.

It's like a road block on


the information highway.

5 6

But you can almost always find


a way around such obstacles.

7 8

You can find lists of available


Web proxies on sites such as
http://www.proxy.org/,
by joining a mailing list at
http://www.peacefire.org/
circumventor/,
or just by searching
A Web proxy helps to bypass restrictions on Internet access. for "free Web proxy"
There are many different Web proxies, but all of them serve with any search engine.
the same basic function: they allow you to reach a website
via a third party, even when direct access to that site is
blocked at your location.
10

25
11 12

e,
But if I buy something
r e xampl
online by using a proxy, Fo edit card
how can I be sure that my my cr
ation?
personal data is not stolen? inform

13
Because you are sharing it with a third party,
which you personally don't know.

When using a Web proxy, you should be very careful


about your personal data, such as email addresses,
passwords, financial information, etc.
14

15 Psitp hon 16
Invia ion
t

Moreover, Psiphon is designed to be used between people who


To protect your personal data, use the Web proxy Psiphon. have pre-existing, private and secure relationships. To use it, you
Unlike anonymous Web proxies, Psiphon is an authorized product must first receive an invitation from another Psiphon user.
of a Canadian company established for this purpose, so you will This can be done on the official Psiphon Forum at
always know with whom you are trusting your information. http://psiphon.civisec.org/forum/.

26
18
A more advanced product, Psiphon2, includes a system of
servers, established and managed by the Psiphon company
itself. This product saves and protects your personal data.
In addition, for security reasons, all your traffic going h!
through the Psiphon system is encoded. Hu,rtrha
ere
Yes
y is
reall ta
a Sasn
u !
Cla

Find out more about Psiphon at


http://psiphon.ca
17
I lporve ts!
19
esen 22

or
And f have
u, I cial
yo
y spe
a ver nt
y
Mer r istmas, prese
Chr
hon ey! 20

21

27
w w w. s u p e r p e i f . c o m
1 2

University Lab

There's a match today.


Our football team is playing
the Italians. But we don't
have a TV set here!

Shouldn't the match


3 be broadcast on 4
the Internet?

Hmmm... I can't download


the website that shows
it live, for some reason.
5

Perhaps, the university


administrators have blocked
access to all video sites,
since streaming eats up
lots of bandwidth.

29
6
Sometimes Internet providers There can be different
or web administrators block reasons for restricting
access to various websites access: for example,
by using firewalls. your boss might want you
to focus on your work
and not waste bandwidth
on audio or video
streaming.

The software that blocks


these sites is like the “wall”
against a free kick in
a football match
9

11
But you can reach your goal by using
a proxy utility called Ultra Surf. It will
hide your IP, delete your browser's history
and, most importantly, allow you Simply run the
to access a blocked website via file. You don't even
an anonymous proxy server. need to install
Ultra Surf on your
computer. You can
easily carry the file
on a memory stick
and, for example,
use it at an
Internet café.

10

30
Learn more about Ultra Surf at:
http://www.ultrareach.com/,
https://www.sesawe.net/Using-
UltraSurf.html, and
http://www.youtube.com/
user/freedom4internet (video).
12 13

15 16

u r r a h!e
HRight on timmatch! a?
for the
Tany
14

18
Victor, I need
your help! Boris
installed a firewall
on our home
computer and its
blocking the chat
program.

I'm supposed Victor, where are you going?


to talk to Giovanni What about the match?
today…
17 19

31
20 21 Hmmm…
Giovanni has
already left…

Here you go. Just run


Ultra Surf and you can
get around any Internet
restrictions. Now you can chat with
45
Ïðàç
minutes
45 õâ³ë³í
later your Italian guy as much
as you like. I've got to run.
Maybe I can make it back
22 to the lab to catch the second 23
half of the match.
Us against
the Italians.

Victor, wait! Why don't you


watch the match here?
By the way, who is playing?

ur r ah! !
Îther 45 minutes later
H e won
W

nailstle!
Fiw h
24

32
The Adventures of

Online Security for Dummies


w w w. s u p e r p e i f . c o m
Online Security for Dummies
w w w. s u p e r p e i f . c o m

Anda mungkin juga menyukai