Archive for the ‘Internet Security’ Category

Use to read blogs

April 19, 2007
About Bloglines
Free and Easy

Bloglines is a FREE online service for searching, subscribing, creating and sharing news feeds, blogs and rich web content. With Bloglines, there is no software to download or install — simply register as a new user and you can instantly begin accessing your account any time, from any computer or mobile device. And it’s FREE!

Bloglines is a window to a whole new world of dynamic content that is being created and distributed over the new “live” web. You can make your own personalized news page tailored to your unique interests from our index of tens of millions of live internet content feeds, including articles, blogs, images and audio. And it’s FREE!

Bloglines shields you from the confusion of news feed standards — RSS, Atom, and others. Bloglines allows you to search for, read and share any updates from your favorite news feed or blog regardless of its authoring technology. And it’s FREE!

Bloglines offers the most features for people who like their online news to be fresh. It’s the most popular website of its kind, indexing millions of new online articles every day.


How to create a backup for you blog and get around any future bans

April 13, 2007

The Government of India has previously tried to block this blog along with
other blogs.
Blogs blocked in India

Considering the high levels of paranoia and elevated sense of madness within the establishment it seems extremely likely that they are going to do something in desperation ,it is hence highly recommended you back up your blog and create mirror sites to withstand any such attacks.

If you follow the steps outlined in this post
Your blog is virtually indestructible as long as your physical existence is sustained.And it shall rise again and again like the phoenix.

This procedure is for those who have a blog on

1.Go to and sign up for an account and create a new blog.

2.Click on Manage——> And then click on Import

WordPress will guide you through the rest of the procedure.

And Voila ! your blog is set up on

Mirror Site of Naxalrevolution on

Repeat this procedure once or twice a month to keep updating your

All it takes is 10 minutes of you time.

This Blog EXIM policy can be repeated again and again until you
have as many blogs as you desire.

In the event of a ban/block/deletion you can keep jumping from one
platform to another , one address to another.

How to save your blog to your Hardrive

Once you have your blog setup on

You can save your entire blog in xml format onto your hardrive.

To do this go to your dashboard and
click on Manage——> And then click on Export

Here you will get the option to save your entire blog onto your hardrive.

I just saved mine and it was only 6 MB.

Create copies of this file , write them onto a CD or tuck
them away in some online storage account or you could
use it to setup a blog on blogspot !

If you have any queries or doubts regarding Internet Security please email us at the following email id.

How to blog via Email

April 13, 2007 has a feature by which you don’t need to log in at all and can post on your blog
by just sending an email.

To do this you first need to register a blog

After that follow these steps
1.Log into your account and go to your blog dashboard.
2.Click on Settings—->And under settings click on email

Example:Click on image for larger image

3.Now you need to setup a new id and you need to enter one word or several words in the
box provided in the mail to blogger section. This will be the email id of your blog and whenever you mail an email to this id it will get automatically published onto your blog.

4.Remember not to disclose this email id to anyone as anyone who knows about it
can then publish on your blog.

5.Do not forget to save you settings.

How to restrict access to your blog.

April 13, 2007

Blog Readers

Your blog is open to all readers by default.

You can restrict your blog to only readers you choose.
However, these readers will need to log in before reading your blog, adding an extra step.

How to do this

1.Log into your account and go to your blog dashboard.
2.Click on Settings—->And under settings click on Permissions

Example:Click on image for larger image

3.There you can choose who can view your blog.

Example:Click on image for larger image

4.Remember to Save you Settings after you make the changes.

Install an Anti-virus and keep it updated.

April 13, 2007

It is important to always have an anti-virus installed in your PC.

AVG Anti-Virus Free Edition is one of the most popular solutions to provide basic security protection on home and non-commercial PCs.

Download and Install AVG’s Free Anti-Virus Software

Use a firewall for your personal computer

April 13, 2007

Use a firewall

Firewalls keep out some viruses and hackers

A firewall acts as a barrier between the public internet and your private computer or network and blocks threats including some viruses.

Why install a firewall?

A firewall protects you against a number of different online threats:

  • Hackers breaking into your computer.
  • Some viruses, called “worms,” that spread from computer to computer over the internet.
  • Some firewalls block outgoing traffic that might originate from a virus infection.

What a firewall does

Because the internet is a public network, any connected computer can find and connect to any other connected computer. A firewall is a barrier between the public internet and your private computer system.

Think of it as a really paranoid bouncer who stops anyone coming into your computer if they’re not on the guest list.

What a firewall does NOT do

A firewall isn’t sufficient on its own to guarantee security, but it is the first line of defence.

You also need to take the other protective steps outlined on this website.

However, a firewall provides limited or no protection:

  • If you give permission for other computers to connect to yours.
  • If it is switched off, disabled or contains many exceptions or open ports.
  • Against most viruses.
  • Against spam.
  • Against spyware installations.
  • Against any kind of fraud or criminal activity online.
  • If you or a virus has created a back door through the firewall.
  • If a hacker has the password for the firewall.
  • Against people with physical access to your computer or network.
  • Against malicious traffic that does not travel through it, for example via a poorly configured wireless network.
  • Against attacks after a network has been compromised.
  • Against traffic that appears to be legitimate.

None of these things give a reason NOT to install a firewall, however. It’s like wearing a seatbelt in a car: it’s a good idea but it won’t guarantee your safety if you crash.

It is safest to assume that your internet service provider does NOT provide any kind of firewall and make sure you have the right software to protect yourself.

Types of firewall

Desktop firewall

A desktop firewall is installed on each computer that is connected to the internet and monitors (and blocks, where necessary) internet traffic. They are also sometimes known as ‘software firewalls.’

Windows Firewall (part of Microsoft Windows XP Service Pack 2) is a basic firewall. You can replace it with a more sophisticated commercial desktop firewall or supplement it with a hardware firewall if you wish.

The benefits of a desktop firewall are:

  • Windows Firewall is free and built-in to Windows XP and free commercial firewalls are available for older systems in private use.
  • Commercial desktop firewalls often integrate well with other security products like virus scanners.
  • Easy to set up – no wiring or extra hardware.
  • If you use a laptop, a desktop firewall will protect you wherever you connect to the internet.

We recommend that every computer should have a software firewall installed.

Hardware firewall

Hardware firewalls are often built into broadband internet routers. If several computers share an internet connection, a hardware firewall will protect all of them. Most router manufacturers offer devices with firewalls.

Although they are getting easier to use, configuring a hardware firewall is often trickier than configuring a software firewall. Most internet routers and firewalls have a password that lets you control them from your computer. It’s a good idea to change that password so that it is not the default one.

There is usually little price difference between a router that includes a firewall and one without and so it pays to get the extra protection if you have a choice.

You can have hardware and desktop firewalls and having both may give a small margin of extra security. However, a desktop firewall on each computer is your first priority.

How to install a desktop firewall

Your choice of desktop firewall depends on whether or not you are running Windows XP and whether or not you want to buy a commercial firewall.

Windows XP Service Pack 2

Windows XP Service Pack 2 includes Windows Firewall, which is a desktop firewall. You can check if you are running this version of Windows by opening the Control Panel and double-clicking on System. When the System control panel appears, under the word “System” it will tell you what operating system you are running. If it reads “Microsoft Windows XP” and “Service Pack 2” there, you’re all set.

You can check if your firewall is operational by opening the Control Panel and double-clicking on Security Centre. A green light and the word ‘on’ should appear next to Firewall.

Windows XP

See Get the latest Windows updates for instructions on upgrading to Windows XP Service Pack 2.

Windows 95, 98, ME, 2000

See: Using older computers online safely.

Commercial firewalls

Commercial firewalls operate in the same way as Windows Firewall but generally give you extra control over how the firewall works, more information about how to configure it and more support.

Most security software companies sell a firewall as a standalone software package or as part of a security suite that includes other protection such as a virus scanner.

In addition, the basic version of Zone Labs ZoneAlarm is free for personal use.

How to test if your firewall is working

There are a couple of online sites that you can use to see if your firewall is protecting your computer:

  • Symantec Security Check.
  • ShieldsUP! (follow the links for ‘Shields Up’). This site requires a little more technical knowledge to use properly.

How to configure a firewall

Most desktop firewalls require some training before they are fully configured. This is because they need to learn what programs you use and which ones connect to the internet.

Windows Firewall pops up warnings when a program tries to connect to the internet for the first time.

Other desktop firewalls work in a similar way but the information they give varies from product to product.

The key thing is to pay attention to these messages and make sure that you only allow legitimate connections.

Source :

How to browse the Internet anonymously from home ,office or any other place

April 12, 2007

Many mice surf the web under the illusion that their actions are private and
.Unfortunately, it isn’t so. Every time you visit a site for a piece
of cheese
, you leave a calling card that reveals where you’re coming from,
what kind of computer you have, and other details. And many cats keep
logs of all your visits, so that they can catch you!

This problem can be overcome by using proxies.

List of Website that offer free web proxies

A very important resource on Internet Privacy.
Do click on the link below for those who are interested in
these matters in detail.

Browse the Web using TOR

April 12, 2007

Tor: anonymity online

Tor is a toolset for a wide range of organizations and people that want to improve their safety and security on the Internet. Using Tor can help you anonymize web browsing and publishing, instant messaging, IRC, SSH, and other applications that use the TCP protocol. Tor also provides a platform on which software developers can build new applications with built-in anonymity, safety, and privacy features.

Tor aims to defend against traffic analysis, a form of network surveillance that threatens personal anonymity and privacy, confidential business activities and relationships, and state security. Communications are bounced around a distributed network of servers called onion routers, protecting you from websites that build profiles of your interests, local eavesdroppers that read your data or learn what sites you visit, and even the onion routers themselves.

Install TOR button into your Mozilla Firefox browser

TOR official website

How TOR works

Internet Security Week

April 10, 2007

Internet Security Week

Reactionary governments have shown themselves willing to attack and intimidate people who aren’t even radicals and who are just researching social and political movements. They are also willing to repress or monitor people for other reasons. Repression is a real threat in some circumstances, and Naxalrevolution takes this seriously for the sake of the people who visit this site and other sites for different reasons.

Maintaining anonymity and practicing secure behaiviour makes it more difficult for agents and officials, often violating civil rights and breaking laws, to identify people interested in revolutionary knowledge.

It also makes things harder for right-wing activists, vigilantes and other groups to ruin the lives of people interested in revolutionary education.

As a part of Internet Security week the below posts will guide you on how to adopt some of the best internet security practices and how to secure your means of communication

For any doubts or clarifications please leave a request in the comments section.

Credits: I would like to thank irtr from whom I first heard about these security practices and riseup for the detailed information and good work that they are doing.

After reading the below posts.Naxalrevolution strongly recommends that you sign up for a new email account at either

Please see to it that you adhere to their terms and conditions.
Full list of email providers is given in the below posts.

and use it for communicating with your friends and with us.
We will shortly be announcing our new email id.

Why security matters

April 10, 2007

Source :

Why security matters

Every email takes a perilous journey. A typical email might travel across twenty networks and be stored on five computers from the time it is composed to the time it is read. At every step of the way, the contents of the email might be monitored, archived, cataloged, and indexed. However, it is not the content of your email which is most interesting: typically, a spying organization is more concerned by whom you communicate with.

There are many ways in which this kind of mapping of people’s associations and habits is far worse than traditional eavesdropping. By cataloging our associations, a spying organization has an intimate picture of how our social movements are organized–a more detailed picture than even the social movements themselves are aware of. This is bad. Really bad. The US government, among others, has a long track record of doing whatever it can to subvert, imprison, kill, or squash social movements which it sees as a threat (black power, anti-war, civil rights, anti-slavery, native rights, organized labor, and so on). And now they have all the tools they need to do this with blinding precision.

We believe that communication free of eavesdropping and association mapping is necessary for a democratic society (should one ever happen to take root in the US). We must defend the right to free speech, but it is just as necessary to defend the right to private speech. Unfortunately, private communication is not possible if only a few people practice it: they will stand out and open themselves up to greater scrutiny. Therefore, we believe it is important for everyone to incorporate as many security measures in your email life as you are able.

Email is not secure

You should think of normal email as a postcard: anyone can read it, your letter carrier, your nosy neighbor, your house mates. All email, unless encrypted, is completely insecure. Email is actually much less secure than a postcard, because at least with a postcard you have a chance of recognizing the sender’s handwriting. With email, anyone can pretend to be anyone else. There is another way in which email is even less private than a postcard: the government does not have enough labor to read everyone’s postscards, but they probably have the capacity and ability to scan most email. Based on current research in datamining, it is likely that the government does not search email for particular words but rather looks for patterns of association and activity.

In the three cases below, evidence is well established that the US government conducts widespread and sweeping electronic survillence.

full-pipe monitoring

According to a former Justice Department attorney, it is common practice for the FBI to practice “full-pipe monitoring”. The process involves vacuuming up all traffic of an ISP and then later mining that data for whatever the FBI might find interesting. The story was first reported on January 30, 2007 by Declan McCullagh of CNET


The Electronic Frontier Foundation (EFF) filed a class-action lawsuit against AT&T on January 31, 2006, accusing the telecom giant of violating the law and the privacy of its customers by collaborating with the National Security Agency (NSA) in its massive and illegal program to wiretap and data-mine Americans’ communications.

Because AT&T is one of the few providers of the internet backbone (a so called Tier 1 provider), even if you are not an AT&T customer is is likely that AT&T is the carrier for much of your interent traffic. It is very likely that other large internet and email providers have also worked out deals with the government. We only know about this one because of an internal whistleblower.


For legal domestic wiretaps, the U.S. government runs a program called Carnivore (also called DCS1000).

Carnivore is a ‘black box’ which some ISPs are required to install which allows law enforcement to do ‘legal’ wiretaps. However, no one knows how they work, they effectively give the government total control over monitoring anything on the ISP’s network, and there is much evidence that the government uses carnivore to gather more information than is legal.

As of January 2005, the FBI announced they are no longer using Carnivore/DCS1000 and are replacing it with a product developed by a third party. The purpose of the new system is exactly the same.


ECHELON is a spy program operated cooperatively with the governments of the United States, Canada, United Kingdom, Australia, and New Zealand. The goal is to monitor and analyze internet traffic on a wide scale. The EU Parliament has accused the U.S. of using Echelon for industrial espionage.

Call database

On May 10, USAToday broke the story that the NSA has a database designed to track every phone call ever made in the US. Although this applies to phone conversations, the fact that the government believes that this is legal means that they almost certainly think it is legal to track all the email communication within the US as well. And we know from the AT&T case that they have the capability to do so.

You can do something about it!

What a gloomy picture! Happily, there are many things you can do. These security pages will help outline some of the simple and not-so-simple changes you can make to your email behavior.

What a gloomy picture! Happily, there are many things you can do. These security pages will help outline some of the simple and not-so-simple changes you can make to your email behavior.

* Secure Connections: by using secure connections, you protect your login information and your data while is in transport to
* Secure Providers: when you send mail to and from secure email providers, you can protect the content of your communication and also the pattern of your associations.
* Public Key Encryption: although it is a little more work, public key encryption is the best way to keep the content of your communication private.

See the next page, Security Measures, for tips on these and other steps you can take. Remember: even if you don’t personally need privacy, practicing secure communication will ensure that others have the ability to freely organize and agitate.