Related
I'm using my transformer at school and the school is providing wifi to its students. But there are apparently some odd restrictions associated with it. No app of mine is allowed to access the internet with the exception of browsers and also I'm not allowed to download anything (it just says "download unsuccesful" no matter what I download or from where). I've tried to look for a reson for this and I found out that it might be some firewall settings on the computer that is hosting the wifi, I also asked the school's IT guy and he said that it's likely to be the reason. But the thing is that all the people with computers and iPhones can use applications that use the internet with no problems at all. This makes me think that the wifi host regards me as dangerous or suspicious for some reason, and because it does allow computers and iPhones to use apps that access the internet and are allowed to download files, I think that it might be fixable. Perhaps there are some particular settings that make the wifi host's security to regard me as dangerous and doesn't allow my apps to go to the internet. So what do I have to do for my apps to be able to access the internet and to be able to download files? I really want to know this, because many of the useful apps require internet and by not using them I'm not taking the full advantage of the device. I should also mention that my tablet is running 3.2.1.
But have you tried asking them about letting you use your "netbook" on their netbook. What's the worst they can do? say NO TABLETS ALLOWED? Because unless they know your exact MAC address, they probably won't be able to do anything about it. In my old school, I brought up that I would like to connect my windows mobile device to their network (when I was using it as an mp3 player) and they said sure (they had terrible firewalls which blocked most every site that was fun). Sometimes, the best kind of hackery is the social kind.
Dyskmaster said:
But have you tried asking them about letting you use your "netbook" on their netbook.
Click to expand...
Click to collapse
What do you mean by that?
norsul said:
What do you mean by that?
Click to expand...
Click to collapse
I guess his telling you to ask for permission to use your netbook on their network.
Well first of all I'm using a tablet running android 3.2.1. And I'm kind of confused by your use of the word network, because I said that I can use the school's wifi network for students, but only to some extent, meaning that none of my apps with the exception of the browser are not allowed to access the internet e. g. android market, google translate don't work, they just say that they are unable to connect to the network or something similar. Also downloading any file from anywhere is not allowed, it says download unsuccessful. But iPhone user's apps work perfectly fine. From this I concluded that there must be something about my tablet that makes their security think my apps are dangerous and therefore blocks them, and that because there is no such problem on iOS, I thought that the might be something wrong with my end, and that it it fixable. And my question was what do I need to do to fiz this? I hope that clarifies my point.
statsminister said:
I guess his telling you to ask for permission to use your netbook on their network.
Click to expand...
Click to collapse
yes, thanks, I was kinda in a hurry when I typed that
Ask your school's IT department. Network configurations can be quite complex, and without knowledge of how or what they're blocking- it's hard for us to help. IT would know the issue better, or at least give the explanation as to why it isn't working. For instance, last year at my college nothing but computers were allowed to connect to the wifi. Such control can be done on the network side, and it may not be your tablet's fault.
Have you any friends with an Android device, or better yet android tablet?
I did ask the IT guy and he said that he has no control over the security settings, because it's a network across all of the schools in the city, not just the school in which I am.
Hey, I've tried using dropbox at school and then it says "cache access denied", maybe that can somehow clarify my problem.
settings
Have you set your settings/applications to allow unknown sources (ie is it ticked).
Colin
colint3 said:
Have you set your settings/applications to allow unknown sources (ie is it ticked).
Colin
Click to expand...
Click to collapse
That's only to allow installing apps not from the Market (sideloading). It has nothing to do with an app working or not.
Haven't you ever heard of proxy and content filtering?
Schools often set up proxies to restrict certain sites and content from working on their networks. They do it for a variety of reason, including bandwidth conservation, content filtering, network security, etc.
More than likely, they have blocked anything that they deem unnecessary. That means that probably only port 80 is allowed (the http port), possibly a few others for https, pop3 and imap for email, etc.
However, if you're a more advanced user, you can probably bypass right past all of this stuff by setting up your own proxy, or using encapsulation (like nstx or icmptx) to bypass their proxy by encapsulating other services inside DNS or ICMP traffic which are usually allowed to bypass the proxy at school. Like I said though, these are advanced techniques and require you to research and set it up yourself.
a.mcdear said:
Haven't you ever heard of proxy and content filtering?
Schools often set up proxies to restrict certain sites and content from working on their networks. They do it for a variety of reason, including bandwidth conservation, content filtering, network security, etc.
More than likely, they have blocked anything that they deem unnecessary. That means that probably only port 80 is allowed (the http port), possibly a few others for https, pop3 and imap for email, etc.
However, if you're a more advanced user, you can probably bypass right past all of this stuff by setting up your own proxy, or using encapsulation (like nstx or icmptx) to bypass their proxy by encapsulating other services inside DNS or ICMP traffic which are usually allowed to bypass the proxy at school. Like I said though, these are advanced techniques and require you to research and set it up yourself.
Click to expand...
Click to collapse
No, I do not no anything about proxy or content filtering, but I remember when I was connecting to the wifi network of the school I was asked to configure the proxy settings by putting some ip address ( I presume that it is an ip adress because it looked like one) and writing 8080 in the port field. If I didn't configure it like that, the internet would simply not work. Could you please tell me where I could educate myself about bypassing proxies or is i a matter that would require a very long time to learn and a lot of prerequisite knowledge?
And by the way, are you sure that this could be done on a tablet? All of that fiddling around seems to require a considerable degree of control which android may lack, or would rooting give me that control?
norsul said:
No, I do not no anything about proxy or content filtering, but I remember when I was connecting to the wifi network of the school I was asked to configure the proxy settings by putting some ip address ( I presume that it is an ip adress because it looked like one) and writing 8080 in the port field. If I didn't configure it like that, the internet would simply not work. Could you please tell me where I could educate myself about bypassing proxies or is i a matter that would require a very long time to learn and a lot of prerequisite knowledge?
And by the way, are you sure that this could be done on a tablet? All of that fiddling around seems to require a considerable degree of control which android may lack, or would rooting give me that control?
Click to expand...
Click to collapse
OK yeah you are going through a proxy then. The good news is, that because you have to configure it manually, they probably aren't using transparent proxy which can make it easier to bypass.
Getting nstx or icmptx working natively on Android should be possible in theory as both are lightweight and designed to work in Linux... perhaps it can be made into a module that can be activated/deactivated with a shell script, or added to a custom kernel.. obviously this would require a rooted tablet to accomplish.
The other required part of the equation is a computer accessible from the internet, which you can set up install a DNS server and nstx on.
If you manage to get it all working correctly, set your home IP address as your proxy instead of your schools proxy, and you should be able to get through. It should also work to let you access the web for free at places like Starbucks or at hotels where the web is normally routed to a site where you have to pay for web access.
Good luck!
a.mcdear said:
OK yeah you are going through a proxy then. The good news is, that because you have to configure it manually, they probably aren't using transparent proxy which can make it easier to bypass.
Getting nstx or icmptx working natively on Android should be possible in theory as both are lightweight and designed to work in Linux... perhaps it can be made into a module that can be activated/deactivated with a shell script, or added to a custom kernel.. obviously this would require a rooted tablet to accomplish.
The other required part of the equation is a computer accessible from the internet, which you can set up install a DNS server and nstx on.
If you manage to get it all working correctly, set your home IP address as your proxy instead of your schools proxy, and you should be able to get through. It should also work to let you access the web for free at places like Starbucks or at hotels where the web is normally routed to a site where you have to pay for web access.
Good luck!
Click to expand...
Click to collapse
That sounds awesome maybe you could make the app id buy it
I found two apps on the android market : proxydroid and ssh tunnel, do you think they would help me to bypass the school's proxy?
And by the way, how legal is this business? I mean I doubt that the school would send be to jail for using google translate but I'm still curious.
Legal issues are a potential problem, but its doubtful it would ever be a problem at school. Setting this up on your tablet certainly isn't illegal in itself, but if you're stealing wifi that you would otherwise have to pay for, you CAN get yourself in quite a bit of trouble if you get caught.
a.mcdear said:
Legal issues are a potential problem, but its doubtful it would ever be a problem at school. Setting this up on your tablet certainly isn't illegal in itself, but if you're stealing wifi that you would otherwise have to pay for, you CAN get yourself in quite a bit of trouble if you get caught.
Click to expand...
Click to collapse
Ok thanks, wifi network in the school is free for all students so I should be ok. But what about those apps I mentioned before?
And how would I protect myself from geting caught and what is the likelyhood of me getting caught? Can they immediately notice it if someone's trying to bypass their firewall or not? I should point out that the it manager in our school knows quite little about the sexurity system or ao he told me when I asked him whether my problem is somehow connected to their security settings, but the network is not pwned by the school, it's owned by the city and it is present in many schools beside mine, so I think that they might take their security seriously. So basically what I am trying to say is that if I investigate this matter, come there and bypass the proxy so that the youtube app works, is it likely that I am going to get caught, and if yes then what are the ways of minimising the risk (please bear in mind that I have not experience in this)? I'm asking this because I think it's not a very good idea to just walk in and hack the network without any experience and expect that there is no possibility of getting caught.
No neither of those apps are really the solution to your problem. There isn't currently an app for Android that will set up encapsulation like I'm talking about.
And yes, your IT manager at school "might" be able to catch you, but only if he's specifically looking for it. What this basically does is encapsulate your regular IP traffic inside DNS packets (or pings for the icmptx method), which are generally allowed to pass through firewalls and content filters. Basically, it is detectable if your network administrator is looking in the right place and knows his stuff. There would either look like a constant stream of DNS requests from a particular IP on the school network, or a constrant stream of ICMP traffic (pings) being sent out. However both ICMP and DNS are normal for any network, so its also equally possible that the administrator never notices that anything is wrong at all...
Some more sophisticated networks may employ transparent DNS or transparent proxy, which would make these efforts much harder. Transparent proxy is able to intercept any traffic and force it through the proxy at school, while transparent DNS is able to intercept DNS traffic and force it to use a specific DNS server regardless of settings on your tablet.
Like I said in the beginning though, these are really advanced networking tricks that certainly aren't easy to set up, even when all the components are readily available.. its possible they haven't even been attempted yet on an Android device. That said, it shouldn't be difficult to port either icmptx or nstx over to Android for somebody with the requisite programming skills.
So my school just recently said we can use tablets and laptops in class and around the school. They are willing to allow us to connect to the school's WiFi, but we have to give the dean the MAC address for our device.
I'd like to be able to keep some privacy, even though they say we have to waive our right to privacy if we decide to use electronics. I guess I'm looking for a few apps that can help me achieve this. Maybe a browser with an incognito feature like Chrome, or something that can cover what I'm doing online.
I also wanna know if there would be any way for me to access thinks like Facebook, Twitter, Youtube, Google Music, etc. through their respective app if the website is blocked.
If push comes to shove, I guess I could just tether with my GNex, but that would require an extended battery, which I would like to not have to buy.
Have you tried using the incognito tab option on the stock honeycomb browser?
Unless you are using some sort of vpn connection or encryption you have no privacy. I'd suggest remoting into your home desktop using splashtop or teamviewer and doing all your browsing on your desktop if you are worried about privacy that much.
They can see everything you do since it's a shared connection and they have access to the gateway and internet logs.
They are probably running a transparent proxy with logging (I would be if I were the sysadmin), so the incognito tab won't help.
But
Konfuddle said:
Have you tried using the incognito tab option on the stock honeycomb browser?
Click to expand...
Click to collapse
That does not do anything with the connection. It just dont cache anything in your browser. So that noone borrowing your computer can see that you have been watching porn.
But to OP: Get a vpn connection. Only way to get privacy on a wifi system.
SwiftLegend said:
So my school just recently said we can use tablets and laptops in class and around the school. They are willing to allow us to connect to the school's WiFi, but we have to give the dean the MAC address for our device.
I'd like to be able to keep some privacy, even though they say we have to waive our right to privacy if we decide to use electronics. I guess I'm looking for a few apps that can help me achieve this. Maybe a browser with an incognito feature like Chrome, or something that can cover what I'm doing online.
I also wanna know if there would be any way for me to access thinks like Facebook, Twitter, Youtube, Google Music, etc. through their respective app if the website is blocked.
If push comes to shove, I guess I could just tether with my GNex, but that would require an extended battery, which I would like to not have to buy.
Click to expand...
Click to collapse
whoa whoa whoa man... "incognito" has nothing to do with what you transmit online. it only prevents them from seeing what you have already done if they took your device
what you need is a secure VPN like goldenfrog.com, or use a secure proxy server. anything that puts a layer of encryption between you and the server will block out any man in the middle
noobs these days... incognito has NOTHIGN TO DO WITH WHAT YOU TRANSMIT DAMMIT
if you want, use opera and turn on the "turbo" feature. that will create a link to the opera servers and deliver compressed content. meanwhile, it will make it impossible for the school to decrypt anything it intercepts.
chatch15117 said:
if you want, use opera and turn on the "turbo" feature. that will create a link to the opera servers and deliver compressed content. meanwhile, it will make it impossible for the school to decrypt anything it intercepts.
Click to expand...
Click to collapse
Nope, opera turbo is a plaintext connection so still can be viewed, the only option is https for everything or vpn/ssh tunnels
Ok thanks for all the replies. I guess the easiest thing would be to tether with my phone. (Hopefully Verizon doesn't freak )
I guess I can try setting up a VPN (no idea how). I think my friend tried to, since he owns a bunch of servers, but the school blocks almost every port.
Could using a vpn connection be considered
using Proxies, Caching Servers or any others means to circumvent restrictions placed on
the school’s IT network and internet access
Click to expand...
Click to collapse
DroidSheep anyone hahaha
unless websites like Facebook and such are blocked haha
Is there a way to spoof the MAC?
Scribed in blood using XDA Premium
Dan_Brutal said:
Is there a way to spoof the MAC?
Scribed in blood using XDA Premium
Click to expand...
Click to collapse
http://forum.xda-developers.com/showthread.php?t=1385577
Dan_Brutal said:
Is there a way to spoof the MAC?
Scribed in blood using XDA Premium
Click to expand...
Click to collapse
Yes but I would bet the reason why they want the MAC address is for WIFI access. You could spoof someone else's MAC but school's aren't known for having hard facts before disciplining students. If they think it is you, you will get in trouble.
I would recommend using TOR if you want to protect your privacy. Download Orbot from the market.
Cheers!
-M
Xda member since 2007
Considering the schools budgets these days, you probably have nothing to fear as far as privacy goes.
Sure they are logging your wifi usage, but no one is monitoring it! All the logging allows them to do, is to look at where you went and when AFTER they have a reason to start looking.
Unless they hired someone specifically to start monitoring students, no one is ever going to look at your logs.
Sure they could put in alerts to let them know when any user goes to site xyz, but odds are they simply have blocked it.
One of the main reasons they are logging things is if say perhaps a teachers online grades were 'hacked', and the IP was traced back to their own servers, they'd have a way to identify which user was using that connection.
Many ISPs already log your internet access as well, but it's at such a low level that no one looks at it (though there are privacy laws to prevent them from looking directly in those cases).
Bottom line.. is if you're not doing anything illegal (torrenting, sending nude pics of yourself, harassing other students via text/email) then you have nothing to worry about, and odds are you won't even be noticed.
DroidGnome said:
Bottom line.. is if you're not doing anything illegal (torrenting, sending nude pics of yourself, harassing other students via text/email) then you have nothing to worry about, and odds are you won't even be noticed.
Click to expand...
Click to collapse
I partially agree. If you use the schools network for normal stuff you shouldn't have anything to hide.
But Co-students are a great security risk. Both willingly and unwillingly. In these days with loads of malware floating around jumping from computer to computer via security flaws in networked devices. Students may also try to hack your device just for fun.
If you have sensitive data you really should encrypt your traffic in one way or another when connected to a network with unmanaged and unknown devices.
DroidGnome said:
Considering the schools budgets these days, you probably have nothing to fear as far as privacy goes.
Sure they are logging your wifi usage, but no one is monitoring it! All the logging allows them to do, is to look at where you went and when AFTER they have a reason to start looking.
Unless they hired someone specifically to start monitoring students, no one is ever going to look at your logs.
Sure they could put in alerts to let them know when any user goes to site xyz, but odds are they simply have blocked it.
One of the main reasons they are logging things is if say perhaps a teachers online grades were 'hacked', and the IP was traced back to their own servers, they'd have a way to identify which user was using that connection.
Many ISPs already log your internet access as well, but it's at such a low level that no one looks at it (though there are privacy laws to prevent them from looking directly in those cases).
Bottom line.. is if you're not doing anything illegal (torrenting, sending nude pics of yourself, harassing other students via text/email) then you have nothing to worry about, and odds are you won't even be noticed.
Click to expand...
Click to collapse
Bored teachers/faculty get up to practically anything and snooping on students is apparently a great sport. Everywhere that has a computer lab has someone doing IT and just think about that for a minute...someone doing IT at a high school, the personality of that person. You don't have to be doing anything illegal to get into trouble with your school. A casual google will reveal all the lawsuits students have brought against schools for violating their privacy. Do yourself a favour and use Orbot.
Cheers!
-M
Xda member since 2007
dragon_76 said:
Bored teachers/faculty get up to practically anything and snooping on students is apparently a great sport. Everywhere that has a computer lab has someone doing IT and just think about that for a minute...someone doing IT at a high school, the personality of that person. You don't have to be doing anything illegal to get into trouble with your school. A casual google will reveal all the lawsuits students have brought against schools for violating their privacy. Do yourself a favour and use Orbot.
Cheers!
-M
Xda member since 2007
Click to expand...
Click to collapse
it is great fun, but also remember that code of conduct that you and your parents sign at the start of the year states that we do have the right to make sure you are using the internet provided by the school for school purposes only
Can't you use 3G connection from your phone instead of the school WiFi?
As far as getting on facebook if it's blocked....
If you type httpS://facebook.com it will usually let you in. They have blocked several websites at my office, but I can still get into them using this trick. Sometimes, you will have to add the "S" after navigating through the websites, but still will let you get in. So, just use your web browser (not the facebook app), and type s. I believe most people don't block secure websites.
SwiftLegend said:
So my school just recently said we can use tablets and laptops in class and around the school. They are willing to allow us to connect to the school's WiFi, but we have to give the dean the MAC address for our device.
I'd like to be able to keep some privacy, even though they say we have to waive our right to privacy if we decide to use electronics. I guess I'm looking for a few apps that can help me achieve this. Maybe a browser with an incognito feature like Chrome, or something that can cover what I'm doing online.
I also wanna know if there would be any way for me to access thinks like Facebook, Twitter, Youtube, Google Music, etc. through their respective app if the website is blocked.
If push comes to shove, I guess I could just tether with my GNex, but that would require an extended battery, which I would like to not have to buy.
Click to expand...
Click to collapse
lilstevie said:
it is great fun, but also remember that code of conduct that you and your parents sign at the start of the year states that we do have the right to make sure you are using the internet provided by the school for school purposes only
Click to expand...
Click to collapse
The internet provided to the schools by tax payers and/or tuition you mean. You have a wretched problem that is rampant in American schools: you think you own the school's resources. They are owned by the community.
Cheers!
-M
Xda member since 2007
So the administration announced today the final policy and they won't be allowing WiFi access until next September because they want to expand the network. I'll probably just be tethering for the mean time.
Oh yeah, there's only 2 IT guys in my school (lol). One stays in a glass room in the back of the computer lab, and the other comes to classrooms to install projectors and crap.
Hey there folks...this is kind of a more general internet question, but since I have a wi-fi only Xoom, figured there might be others out there in the same boat.
My Xoom is connected to all kinds of Google services (gmail, reader, calendar, etc.).
If I go to a hotel and connect it to the public wi-fi, how "dangerous" is it?
I'm assuming web surfing on public wi-fi, particularly if entering passwords or account numbers, is likely very dangerous if people are sniffing.
But how dangerous is it to have the general Google services going in the background? Are they all more or less encrypted?
(I know another possible answer is "don't worry about it, because if anybody wants to get your stuff, they'll get your stuff. )
Any experiences would be helpful...thank you!
- Eckless
would not worry
Yeah, don't worry about it. You're safe by any reasonable definition of the word.
It's extremely dangerous. Even if you have ssl turned on for all your google services, there are far too many other types of attacks that are trivial to pull off on a public wifi. Either don't do it at all, or do it with a vpn. For example, if you have a home wireless router that's capable of openwrt or ddwrt, set it up with ipsec/l2tp vpn and remote into it. Not perfect, but a hell of a lot safer than freeballing on a public wifi.
Sent from my Xoom using xda premium
Tether off your phone or connect to vpn first. Everytime I find an open network first thing I do is...
Code:
su
bt5
airmon-ng start wlan1
airodump-ng -w opendump wlan1
But that's just me
AHinMaine said:
It's extremely dangerous. Even if you have ssl turned on for all your google services, there are far too many other types of attacks that are trivial to pull off on a public wifi. Either don't do it at all, or do it with a vpn. For example, if you have a home wireless router that's capable of openwrt or ddwrt, set it up with ipsec/l2tp vpn and remote into it. Not perfect, but a hell of a lot safer than freeballing on a public wifi.
Sent from my Xoom using xda premium
Click to expand...
Click to collapse
unless you ssl all your packets all the way to their destination, they can be collected on any router they bounce thru and reassembled and analyzed, after they leave your tunnel, they are wide open for inspection.
just like when the government was collecting all them phone calls a few years back,
I would be more concerned from side loading a app or a malicious app from the market.
don't worry about hopping on your friend's router or the router at McDonald's, unless your the james bond type lol
---------- Post added at 08:56 PM ---------- Previous post was at 08:53 PM ----------
bigrushdog said:
Tether off your phone or connect to vpn first. Everytime I find an open network first thing I do is...
Code:
su
bt5
airmon-ng start wlan1
airodump-ng -w opendump wlan1
But that's just me
Click to expand...
Click to collapse
your a peeker lol
liftman- said:
unless you ssl all your packets all the way to their destination, they can be collected on any router they bounce thru and reassembled and analyzed, after they leave your tunnel, they are wide open for inspection.
just like when the government was collecting all them phone calls a few years back,
I would be more concerned from side loading a app or a malicious app from the market.
don't worry about hopping on your friend's router or the router at McDonald's, unless your the james bond type lol
Click to expand...
Click to collapse
Partially correct, though a naive statement regardless. The whole the-government-can-see-it-no-matter-what-so-why-bother approach may be valid if you're talking about swapping state secrets and plotting against world leaders. It does nothing if you're simply trying to keep your accounts safe from thieves of any sort.
Keep in mind that thieves almost always need people to click links, so they love to start by breaking into people's social accounts. People are much more likely to click a malicious link from a friend than a stranger. So while on the surface it may not seem like a big deal if your facebook account gets hacked, you're letting apathy put every one of the people in your contact list at risk.
bigrushdog said:
Tether off your phone or connect to vpn first. Everytime I find an open network first thing I do is...
Code:
su
bt5
airmon-ng start wlan1
airodump-ng -w opendump wlan1
But that's just me
Click to expand...
Click to collapse
I'm curious - can you point me in the right direction to find out more about this? 'bt5' isn't a recognised shell command for me, heh.
Edit: assuming you're talking about doing this on Android.
TheStickMan said:
I'm curious - can you point me in the right direction to find out more about this? 'bt5' isn't a recognised shell command for me, heh.
Edit: assuming you're talking about doing this on Android.
Click to expand...
Click to collapse
Hint - http://forum.xda-developers.com/showthread.php?t=1280601
SlCKB0Y said:
Hint - http://forum.xda-developers.com/showthread.php?t=1280601
Click to expand...
Click to collapse
Aha! I saw this before, but didn't read into it too much. Thanks!
AHinMaine said:
Partially correct, though a naive statement regardless. The whole the-government-can-see-it-no-matter-what-so-why-bother approach may be valid if you're talking about swapping state secrets and plotting against world leaders. It does nothing if you're simply trying to keep your accounts safe from thieves of any sort.
Keep in mind that thieves almost always need people to click links, so they love to start by breaking into people's social accounts. People are much more likely to click a malicious link from a friend than a stranger. So while on the surface it may not seem like a big deal if your facebook account gets hacked, you're letting apathy put every one of the people in your contact list at risk.
Click to expand...
Click to collapse
I have played with the with ddwrt and turn my leech neighbors pgs upsided down, played with all the "security suites" as many others have, done the war driving ... I understand your point, but I have been hoping wifi every work day for ever and a day and never have had a issue, this doesn't mean that tomorrow I might get it, but imo I will get hit buy a car first.
beside I do not use Facebook lol, and all my family with facebook have already been hack lol
peace
Hello everyone,
Currently my lappy uses Nortel (XEAN) and a grid card to connect. I called my company support but they are not interested in helping me.
At this writing, I have been lappy-less for the last 3 weeks. There are 2 tasks that I cannot perform and this is one of them.
I was going to try Cisco AnyConnect ICS+ from the store and see how that goes.
Any and all comments or assistance is welcomed!
Thank you and Regards,
would like to know how you progress
We also uses VPN to connect with home pc/laptops to the office but I would LOVE to use my note 10.1 instead.
So, if you make any progress, please let me know.
THanks
bert269 said:
We also uses VPN to connect with home pc/laptops to the office but I would LOVE to use my note 10.1 instead.
So, if you make any progress, please let me know.
THanks
Click to expand...
Click to collapse
I certainly will. As of this hour all dead-ends... nothing will work, I did manage to convince them to give me the group ID password but no luck in connecting.
about VPN for Private usage.. i'd need a VPN Server running on my Home Computer right? does Windows7 has an included vpn Server?
Hideninja
GalaxyBill said:
Hello everyone,
Currently my lappy uses Nortel (XEAN) and a grid card to connect. I called my company support but they are not interested in helping me.
At this writing, I have been lappy-less for the last 3 weeks. There are 2 tasks that I cannot perform and this is one of them.
I was going to try Cisco AnyConnect ICS+ from the store and see how that goes.
Any and all comments or assistance is welcomed!
Thank you and Regards,
Click to expand...
Click to collapse
If you're looking for a program that enables you to surf the net anonymously, then I recommend Hideninja.
Haldi4803 said:
about VPN for Private usage.. i'd need a VPN Server running on my Home Computer right? does Windows7 has an included vpn Server?
Click to expand...
Click to collapse
If you want a home personal server, and have a spare android device lying about, you could try "servers ultimate" from the playstore with "openvpn"by openvpn, from the playstore, i sucessfully tested a connection between my tab and my phone, server on the phone, client on the tab, simple enough, servers ultimate after setting up the vpn server profile, it lets you export a file with the settings needed for openvpn, it was quite easy to setup.
I dont know if this is what your looking for, and im pretty sure the secure connection was over network only, as im still to unknowledgeble on these things, all i know is, apparentky there is a way to put an "internet" ip address on a vpn server profile, so that if you connect to a public wifi network like you find in stores, you can vpn to your android device at home acting as your vpn server, making an encrypted connection through the public wifi, to your android vpn, and then your vpn server would pass through YOUR home internet, while protecting your connection on the public wifi from any prying eyes who may be using apps that sniff the network data, i believe, like the apps on android that "sniff" out facebook sesions....for instance, not something i use personally
A benefit to this is that your not paying an unknown vpn to pass a "secure" connection through THEIR systems in between, you control, that in between, or at least, better control, over your own private property......i dont think its able to spoof ip address, if thats what folks might be looking for, but the servers ultimate app is pretty extensive, and my knowledge withese things is limited, so for those looking, who knows what their doing, might be worth checking it out (i wouldnt mind a small setup guide, if someone manages that)......if it makes a difference, your also able to setup a proxy server, although i never did figure out how, hell, aint to sure what it does ...........
well, hopefully this helps
Hi guys, i recently got this adfoc.us popup or somethig and it shows on 99% of the webpages when i browse the web via chrome. Its probably a malware or something but I cant get rid of it. It also prompted me if i want to inspall sexy cafe. Apk or something.
Anyone has same problem and how can i get rid of it? Should i do factory reset?
Thanks
raperot said:
Hi guys, i recently got this adfoc.us popup or somethig and it shows on 99% of the webpages when i browse the web via chrome. Its probably a malware or something but I cant get rid of it. It also prompted me if i want to inspall sexy cafe. Apk or something.
Anyone has same problem and how can i get rid of it? Should i do factory reset?
Thanks
Click to expand...
Click to collapse
You could try downloading an AV program off of Google Play Store, but you may have to factory reset.
You are not infected, but your router is. DNS is changed, go into router settings and put manual DNS from Google
Sent from my Nexus 5 using Tapatalk
Highly doubt its the router (unless remote admin is turned on, then you deserve it) sounds like hosts to me
I don't use windows, but this should help
http://blog.mitechmate.com/remove-adfocus-us/
then use this for your windows machine and phone
https://www.malwarebytes.org/ and http://www.labtechsoftware.com/hitman.php
make sure you use them in safe-mode, or use a live linux cd and clean the mess up
Sent from my rooted RCT6203W46 using xda-dev app
I work in a isp company and yes it's a router. zte and tplink routers have more or less widely open wan access, either from web, cwmp or SNMP, so merely changing web access pass does not help some script kiddie plays with range of IP addresses and you have adfoc site on every computer, phone, etc
Sent from my Nexus 5 using Tapatalk
absbrain said:
I work in a isp company and yes it's a router. zte and tplink routers have more or less widely open wan access, either from web, cwmp or SNMP, so merely changing web access pass does not help some script kiddie plays with range of IP addresses and you have adfoc site on every computer, phone, etc
Sent from my Nexus 5 using Tapatalk
Click to expand...
Click to collapse
What does working for a isp company have to do with anything ?
adfoc.us is nothing more than 'bundling' malware not a virus (to be technical a redirect virus) that highjacks DNS and hosts files on windows machines also adds other malware hence it's called 'bundling'.
Its real name is adfocus.us browser hijacker, it's distributed by hook
A Hook is programmed as DLL file that it is capable to block the message of solicitation to a desirable site and achieve redirection, then a cyber criminals may use Windows Socket Layer Service Provider associated with SPI to get user’s transmitting data no matter you are using Firefox, IE or Chrome
If you have a "wide open" type of router, you shouldn't be using a computer or phone period
Been removing rootkits, virus, malware off of windows machines for many years, don't need a isp worker to tell me it's a router
Well, ISP worker tells you, from first hand experience that some Chinese routers can be manipulated regardless of web password and DNS can be changed.
That means ISP worker has seen DNS changed from our DNS to some address in Germany. And wide open router is something most users know nothing about especially regarding cwmp protocol.
And we have reports from our customers that every network device opens adfoc.us it's not really rocket science is it ? And windows is crap we get that but I'm somewhat sure my version is the correct one, especially because adfoc.us tried to install some apk file (see original post) Not sure if apk files work with windows
Sent from my Nexus 5 using Tapatalk
Thx for your replies gents. I dont think this adfoc. Us crap pops up when i use my pc, only on my mobile and also when i use mobile data.
absbrain said:
Well, ISP worker tells you, from first hand experience that some Chinese routers can be manipulated regardless of web password and DNS can be changed.
That means ISP worker has seen DNS changed from our DNS to some address in Germany. And wide open router is something most users know nothing about especially regarding cwmp protocol.
And we have reports from our customers that every network device opens adfoc.us it's not really rocket science is it ? And windows is crap we get that but I'm somewhat sure my version is the correct one, especially because adfoc.us tried to install some apk file (see original post) Not sure if apk files work with windows
Sent from my Nexus 5 using Tapatalk
Click to expand...
Click to collapse
Can you give me some links that actually prove that this malware takes over/changes router settings ?
Were not talking windows tcp protocols and hosts, but, actual router settings
Sent from my rooted RCT6203W46 using xda-dev app
piperx said:
Can you give me some links that actually prove that this malware takes over/changes router settings ?
Were not talking windows tcp protocols and hosts, but, actual router settings
Sent from my rooted RCT6203W46 using xda-dev app
Click to expand...
Click to collapse
Not really sure why are you so opposed to idea that ultra-cheap (10-15 euro) router can be hacked ?
http://www.csoonline.com/article/21...e-routers-to-attack-online-banking-users.html
http://rootatnasro.wordpress.com/20...-from-the-zynos-rom-0-attack-full-disclosure/
And I'm talking exactly about this (ZTE, and TPLINK). And you must know that almost all xDSL routers given to customers by large(r) ISPs have custom firmwares (because of ACS configurations, port mapping, etc) so the potential for unintended WAN access is huge. And the ISPs always will buy the cheapest and fastest available router, so it's not surprising at all.
raperot said:
Thx for your replies gents. I dont think this adfoc. Us crap pops up when i use my pc, only on my mobile and also when i use mobile data.
Click to expand...
Click to collapse
Yeesh. Try safe mode?
Sent from my Nexus 5 using XDA Free mobile app
MrObvious said:
Yeesh. Try safe mode?
Sent from my Nexus 5 using XDA Free mobile app
Click to expand...
Click to collapse
I tried surfing in safe mode on another wifi network at my office. I dont have any problem at all.
Not once this adfoc popped up.
It must be some third party app or the rooter as absbrain mentioned. If its the rooter I should have the same issue on my pc as well correct?
absbrain said:
Not really sure why are you so opposed to idea that ultra-cheap (10-15 euro) router can be hacked ?
http://www.csoonline.com/article/21...e-routers-to-attack-online-banking-users.html
http://rootatnasro.wordpress.com/20...-from-the-zynos-rom-0-attack-full-disclosure/
And I'm talking exactly about this (ZTE, and TPLINK). And you must know that almost all xDSL routers given to customers by large(r) ISPs have custom firmwares (because of ACS configurations, port mapping, etc) so the potential for unintended WAN access is huge. And the ISPs always will buy the cheapest and fastest available router, so it's not surprising at all.
Click to expand...
Click to collapse
I am not opposed to the idea, its not new, but, first of all, this article is just about a year old, and new firmware has been out since then, have the users switched to the new firmware, who knows, 98% of windows people are point & click, that is the biggest problem, especially using android.
Second, like I said earlier, and what the article says also, remote admin should be disabled and change the default username and password, here in the states, dsl kinda faded out 10 years ago and those routers you list aren't common here, not saying this can't happen, but, OTOH a little common sense goes a long way.
Javascript is a popular way to get infected from websites, running things as noscript, ghost, etc, should help out a lot, there is a lot you can do to prevent this stuff from happening, most people are clueless or lazy or click happy.
Another way to help is to get rid of windows (every operating system can be hacked) (flame) but others are more secure by design, or for banking needs use a live linux cd/usb stick, 99% of people won't bother or even research the idea.
I look at this as pebak, and not knowing enough of the internet or their equipment and just clicking on anything, hence the point & click.
I run a few servers, none are windows, we do have windows clients. I try my best
Sent from my rooted RCT6203W46 using xda-dev app
raperot said:
I tried surfing in safe mode on another wifi network at my office. I dont have any problem at all.
Not once this adfoc popped up.
It must be some third party app or the rooter as absbrain mentioned. If its the rooter I should have the same issue on my pc as well correct?
Click to expand...
Click to collapse
Possibly. Unless it is Android only malware or affects your computer differently. If you have any lesser known apps installed try removing them. I would honestly suggest a factory reset.
Sent from my Nexus 5 using XDA Free mobile app
absbrain said:
You are not infected, but your router is. DNS is changed, go into router settings and put manual DNS from Google
Sent from my Nexus 5 using Tapatalk
Click to expand...
Click to collapse
Hi,
Its definetely the wi-fi rooter that i have w hich is TP Link.
I called my proveder they said there is a problem with the DNS. They reset my rooter online and it was fine for couple of days.
But now same thing happens. On both my wife and mine mobile phones surfing is impossible.
It automatically swithches the link to a porn site. Same thing happens as a pop up on my PC as well.
Any solution to fix this or I should get a more expensive rooter?
Thanks a lot.
raperot said:
Hi,
Its definetely the wi-fi rooter that i have w hich is TP Link.
I called my proveder they said there is a problem with the DNS. They reset my rooter online and it was fine for couple of days.
But now same thing happens. On both my wife and mine mobile phones surfing is impossible.
It automatically swithches the link to a porn site. Same thing happens as a pop up on my PC as well.
Any solution to fix this or I should get a more expensive rooter?
Thanks a lot.
Click to expand...
Click to collapse
Sounds like your router may have been compromised. Try a complete reset of it including updating it's firmware.
Sent from my Nexus 9 using XDA Free mobile app
jd1639 said:
Sounds like your router may have been compromised. Try a complete reset of it including updating it's firmware.
Sent from my Nexus 9 using XDA Free mobile app
Click to expand...
Click to collapse
Tried that, same thing happens.
I'm being directed to spaces.slimspots.com and then to various porn sites.
Its really annoying and I cant seem to find a solution.
raperot said:
Tried that, same thing happens.
I'm being directed to spaces.slimspots.com and then to various porn sites.
Its really annoying and I cant seem to find a solution.
Click to expand...
Click to collapse
Have you tried malwarebytes on your pc's?
Sent from my Nexus 5 using XDA Free mobile app
I would recommend the following:
1) Hard reset all your devices. Back up your data but then completely wipe the phone (/sdcard as well).
2) Disconnect your PCs. If you are savvy enough I would recommend running a Linux distro for a few days (so you can at least still use the computer).
3) Get a CD (not usb stick due to writableness) and download several AV tools (quick Google will yield some results). Take the PC offline (unplug ethernet/disable wifi), put the CD in, run a few scans and get it cleaned out.
4) Manually take your router and disable DHCP/DNS interally, forward your DHCP requests if you decide to keep DHCP on to a known good DNS server like 8.8.8.8.
5) Ideally, swap the router out for a new one or use your own instead of #4.
Something is causing it.
MrObvious said:
I would recommend the following:
1) Hard reset all your devices. Back up your data but then completely wipe the phone (/sdcard as well).
2) Disconnect your PCs. If you are savvy enough I would recommend running a Linux distro for a few days (so you can at least still use the computer).
3) Get a CD (not usb stick due to writableness) and download several AV tools (quick Google will yield some results). Take the PC offline (unplug ethernet/disable wifi), put the CD in, run a few scans and get it cleaned out.
4) Manually take your router and disable DHCP/DNS interally, forward your DHCP requests if you decide to keep DHCP on to a known good DNS server like 8.8.8.8.
5) Ideally, swap the router out for a new one or use your own instead of #4.
Something is causing it.
Click to expand...
Click to collapse
Great advise, especially #5 (you can also use linux box as a router)
Sent from my rooted RCT6203W46 using xda-dev app