Monthly Archives: December 2013

How to install ClockworkMod Recovery and CyanogenMod on Samsung Galaxy S (GT-I9000)

Screenshot: CyanogenMod loading on GT-I9000In this article I will describe how to install ClockworkMod Recovery and CyanogenMod on the Samsung Galaxy S. By installing CyanogenMod your device will also be rooted. I have written this post while I was installing ClockworkMod Recovery and CyanogenMod on my friends Samsung Galaxy S GT-i9000 (International). I provided the specific software download locations for the GT-i9000 and also the general download links in case you have an other model of the SI. Make sure to have enough battery life throughout the whole installation procedure and to read the disclaimer before starting to follow this guide!

Read the rest of this entry

Advertisements

How to install Privoxy and combine it with Tor

In this post I’ll show you how you can improve your privacy and anonymity while you are browsing on some websites. For this purpose I’ll use Privoxy and Tor. Privoxy is a non-caching web-proxy with filtering capabilities for enhancing privacy. Tor uses an overlay network of volunteers and relays your traffic through the Tor network to it’s destination. It also encrypts your data, so no Tor node (except the exit node) can read your data.

This is not a high-security setup, but it should improve your privacy and anonymity.

1. Privoxy
2. Tor
3. Combine Privoxy and Tor
4. Appendix
Read the rest of this entry

How to set up a stateful firewall with iptables

My old post to set up a small rules set for iptables is deprecated so I decided to update this post and improve some rules.
This time I tested this iptables setup on my Raspberry Pi. I connected to my Pi via SSH and the first time I tested the rules order I locked myself out and I had to connect the monitor and keyboard to fix this. The rule order in this post worked for me to set everything up via SSH.

I also tried this setup on a virtual machine and made a screencast of it. You can find the video at the end of this post.

1. Kernel modules
2. Important Rules
3. Chain Policies
4. Port Rules
5. Logging
6. Saving Rules
7. Appendix (Script and video)
Read the rest of this entry