Saturday, February 11, 2012

Webcam and Internet Safety (Courtesy of Trade Secrets)

Webcam and Internet Safety

Some webcam entertainers work in an office setting with a computer and a bed in each room.
To prevent an exchange of bodily fluids from previous workers:

  • Put your own plastic cover on keyboard.
  • Bring Lysol disinfectant spray to spray on office phones used communally for webcam with phone sex shows.
  • Bring your own clean sheets and bedding to your cubicle.
  • Bring lots of your own toys and costumes. Cover toys with condoms if you are sharing.
It’s easy to be "on" for long periods of time, especially if you are in the comfort of your own home. But it's still a job and can be physically, mentally and emotionally draining. Take breaks. Set regular hours for yourself. Be prepared for busy times and slow times. Pace yourself. Watch your posture. Drink water. Eat meals. Get enough sleep.

Many webcam clients live in remote areas with few sex workers, so the only way they can get workers to visit them is if they pay all the costs. If a webcam client wants to send you money to travel somewhere for an actual live sex work session, take as many precautions as possible. Make them pay up front, give you their real names, and pay for your accommodations.

Internet Safety

If you are running a web service of any kind from home, make sure you have a firewall and an antivirus system to protect yourself from hackers.

If you are using wireless Internet in your home, make sure it is secure. Others can easily log onto unsecured wireless Internet connections and post information on the Internet that would lead back to you. You don’t want police showing up to your dungeon because of someone else’s actions.

As anyone can look up the owner of a web site domain name, it's also wise to make sure that your personal information posted is either blocked (with a third party service) or uses a P.O. Box address. Sometimes your web host company will replace your contact information with theirs. Just tell them that you are concerned about your personal information being available to the public.

Although there are tricks to make it difficult for others to copy your photographs from websites, there is really no foolproof way of doing it. Clients can easily do screen captures of anything they see on the Internet.

Masking an IP Address
By Parched Mosquito

You can mask an IP address by placing a middleman computer between yourself and the "Internet." The most common way of doing this is to use a household router. A common router is a stripped down computer that handles all Internet traffic to and from your house before your Internet service provider sees it. Your individual computers connected to the router are not visible to others on the Internet, but the router itself is.

To move this into a context that could hide your webcam traffic, you would need to place a computer on the Internet that can do two things:

NAT (this is what your router does) and VPN. VPN is a secure connection between computers, across networks and media (media meaning transmission media like wires, fibre optics, and such).

After setting up a middleman computer, you use VPN to securely connect to the middleman computer. The middleman then translates your IP address and network requests between the communicating computers. In the case of the webcam, the broadcaster and receiver.

However, this will not prevent some people, such as "the authorities" from discovering your computer trail. But it will stop most "script kiddie hackers" in their tracks.

Most freely available versions of Linux can act as this so called middleman computer. Windows (server) can also do this, but it costs money.

At the very least, place a router between you and the Internet and turn on all the security settings. That way, the only information someone might get from you is what the Internet service provider can provide, i.e. subscriber info.

It is possible to break into these routers, which is why you can setup your own "router" using a dedicated Linux system computer. Very, very secure. But not for everyone as it requires in depth knowledge of network protocols, topology and Linux.

Ensuring Your Computer is Secure
By Thomas Covenant

This article is divided in two sections:

1. The threats you face and why you want to secure your computer
2. An easy to implement approach to give you some security.

Legal Disclaimer: The information provided is general and intended for “newbies." The discussion is current as of November 2009. It is impossible to have a totally secure system so it is critical to have your important files backed up.

(Read More)

No comments:

Post a Comment