Anonymity techniques

Talk here about security in general. Posting illegals software is prohibited. All stuffs in this forum must be considered as for "Educational purpose only".
Post Reply
User avatar
brokenman
Site Admin
Site Admin
Posts: 5575
Joined: 27 Dec 2010, 03:50
Distribution: Porteus v3.2rcX all desktops
Location: Brazil
Contact:

Anonymity techniques

Post#1 by brokenman » 26 Jul 2014, 19:38

Firstly, it is my humble opinion that if you are seriously breaking the law and causing grief for other humans then not only do you deserve to be caught, but it is nigh impossible to maintain total anonymity once you have been targeted by powerful authorities. I am no security expert so take what you read here for what it is worth.

Why anonymity?
Anonymity is privacy. I close my curtains of an evening because I don't want people outside seeing what goes on inside. Just because I don't need my anonymity privacy today doesn't mean that I may not need it in 5 years. Once you give it away, it is not coming back. The future internet will be nothing like it is today. Corporate and government bodies dictate that it will become less anonymous and more controlled. In the same way that we should fight to retain our freedom of speech, we should fight to retain our right to privacy and a free internet as it was intended to be from the start. Some years ago, through a massive screw up of delivery personnel, I discovered that the national police were working together with a certain online business (equivalent of ebay) to prevent parallel importing. In doing so they legally had the right to read my emails. They delivered an item I sold to a friend of mine to whom I had only corresponded via email. Busted big time. They confessed and informed me that they were totally within their legal rights to do so.

If you think that national and international agencies are not spying upon the population then you are kidding yourself (think PRISM, XKeyscore and NASKEY). If you choose to do nothing about it, you are perpetuating the complacent attitude that will eventually see many of our basic rights slowly and unperceivably wrenched from our grasp. For good.

Total anonymity?
Personally I don't think this is possible (without keeping on the run) once you have been targeted. Below are some extreme but necessary pointers if you want to attempt to maintain total anonymity.

What NOT to do if you are a paranoid mess.

1) Don't use windows. Closed source proprietary code is an unknown. Since before 2000 windows was attempting backdoors (see NSAKEY). From memory I couldn't even setup windows 8 without connecting to the internet and associating my computer with an account.

2) Don't use your home internet connection.

3) Don't use public internet without precautionary steps (see below).

4) Don't use email to correspond.

5) Don't use popular social networking sites.

6) Don't use your cell phone.

7) Don't think you are smarter than the next guy.

Some things to DO if you are totally 'out there' noid.

1) Use a live operating system (as non root) on a read only media that doesn't mount existing internal drives. It should not use swap partitions, hibernate or sleep and it should not support booting from any other device except the one it was installed on. If you want persistent changes they should be saved on an encrypted file system. It should require a password to boot and clear ALL memory before shutdown.

2) On a public network spoof your MAC address and browser agent and stay away from security cameras. If you pay, pay in cash and try not to touch anything (public kiosks are a bacteria haven).

3) User burner phones, or burn your phones.

4) Use end to end encryption when chatting on any network.

5) If you must use email use temporary accounts such as 10minutemail or guerillamail. At least use an email service that scrubs headers.

6) Use a VPN, tor and anonymous socks proxies. If you pay, pay for it with bitcoins or some anonymous unsourcable online currency (or somebody else) and use a disposable email to join.

For the non crazy but slightly paranoid (me)

If that sounds like too much work then here are some tips to remain somewhat anonymous while using your home connection. The aim is to have my ISP, all sites I visit and my wife ignorant as to my online activities. I'm just joking about the wife. I want her ignorant to my offline stuff too. I want my IP Address to be anonymous and I want to be able to choose from which country I appear to be from so I can do things like stream the world cup live from websites restricted to the UK.

Pay for a VPN. It doesn't have to be quad loop VPN. For as little as $3 per month it can be well worth it. Many come with a nice GUI for every device you have. I use a non logging VPN from a tiny island outside of the US and EU that has a transparency report about all abuse claims and their reactions to said claims. They have a warrant canary which is a funny name for being transparent about request warrants, searches and seizures. They also have an alternative DNS. Here is my traffic route when I am in eNinja mode.

ME --> ISP --> VPN --> TOR --> VPN --> DESTINATION

My ISP (or network admin at work) sees my encrypted entry into a VPN only. Inside there I go through the tor network and exit on a chosen (and trusted non-logging) VPN node. I check for DNS leaks upon first log in.

Another commonly used setup for me is:

ME --> ISP --> SOCKS PROXY --> VPN --> DESTINATION
ME --> ISP --> VPN --> SOCKS PROXY --> DESTINATION

Apart from adding an extra layer of security, it acts like a kill switch if the VPN connection is lost. Any file transfer in prorgess through software configured to use the proxy will not unexpectedly resume later while in an insecure environment.

Another layer of security would be to run the livedisk inside a virtual machine with all web traffic from the VM going through the PROXY/VPN.

I use a volatile pastebin service (burn on read) for messages and encrypt (end to end) any chat services which I very rarely use because some of my friends can't even spell encryption. At work I do the opposite to all that is written above. I find the privacy invading, totalitarian, cloud based services soooo useful that I swallow my pride and just connect. I know, I am two faced.

If anybody has other anonymity techniques to add then please do. If anyone wants some advice on how to start playing around with anonymity then feel free to ask. I would love to release a Porteus edition that fits in the 'I am totally fucking paranoid' category above. TAILS style.
How do i become super user?
Wear your underpants on the outside and put on a cape.

donald
Full of knowledge
Full of knowledge
Posts: 1223
Joined: 17 Jun 2013, 13:17
Distribution: Porteus 3.2.2 XFCE 32bit
Location: Germany

Re: Anonymity techniques

Post#2 by donald » 27 Jul 2014, 12:52

I see that you know what to do....

imo longing for anonymity depends on where you're living and what you're planning to do.

btw. --> I close my curtains..<--
That's privacy not anonymity, if you leave the name at the front door.

And this is the main thing to think about:
When do I need real anonymity?...I believe that the majority of us only need more privacy.

But if you are going to break the law, then break it in the first place.
Put on a black hat and use a network which doesn't belong to you.(The tools are in the repo)

your recommendations are almost complete, I would add:
to avoid fingerprinting, do not use the same system configuration twice.
here you can test how unique and trackable you are:

https://panopticlick.eff.org

User avatar
brokenman
Site Admin
Site Admin
Posts: 5575
Joined: 27 Dec 2010, 03:50
Distribution: Porteus v3.2rcX all desktops
Location: Brazil
Contact:

Re: Anonymity techniques

Post#3 by brokenman » 28 Jul 2014, 22:29

That's privacy not anonymity, if you leave the name at the front door.
Indeed. What I meant was that anonymity IS privacy, but privacy is not anonymity. I think privacy should be a fundamental right.
When do I need real anonymity?...I believe that the majority of us only need more privacy.
Agreed. Privacy is also relative so opinions may vary. It may be as simple as in the case where an ISP blocks or filters because they don't like file sharing apps. I use them all the time to download valid and legal content.

Thanks for the extra option.
How do i become super user?
Wear your underpants on the outside and put on a cape.

User avatar
freestyler
Contributor
Contributor
Posts: 382
Joined: 17 Oct 2013, 14:21
Distribution: Porteus KDE4
Location: Traveller
Contact:

Re: Anonymity techniques

Post#4 by freestyler » 30 Jul 2014, 10:18

Nice write up brokenman :)
https://www.porteus-apps.org

User avatar
francois
Contributor
Contributor
Posts: 5082
Joined: 28 Dec 2010, 14:25
Distribution: kde xfce porteus manjaro kubun
Location: Enfin l'été, le changement climatique attendu: le soleil.

Re: Anonymity techniques

Post#5 by francois » 31 Aug 2014, 23:34

@brokenman:
How does the laymen or linux newcomer find his way into being able to follow all these instructions? Most are so accustomed to internet non-anonymously, they have crossed the border. It does not look that dangerous. They just quit trying to be anonymous! I realize that it might be too late for me. :pardon:

Here is a link which states many of the tips you just enumerated:
http://www.wikihow.com/Be-Online-Anonymously

You get at it more thouroughly.
Thanks.

@Donald:
Thanks for the anonymity testing website.

Midori private browsing of elementary os works quite fine. Result:
Within our dataset of several million visitors, only one in 897,970 browsers have the same fingerprint as yours.

Elementary os reports the action of Midori private browsing action that:
- doesn't store any personal data:
No history or web cookies are being saved.
Extensions are disabled.
HTML5 storage, local database and application caches are disabled.

- prevents websites from tracking the user:
Referrer URLs are stripped down to the hostname.
DNS prefetching is disabled.
The language and timezone are not revealed to websites.
Flash and other Netscape plugins cannot be listed by websites.
Voltaire: Le mieux est l'ennemi du bien.

donald
Full of knowledge
Full of knowledge
Posts: 1223
Joined: 17 Jun 2013, 13:17
Distribution: Porteus 3.2.2 XFCE 32bit
Location: Germany

Re: Anonymity techniques

Post#6 by donald » 01 Sep 2014, 02:17

Hi francois
Midori:..(normal mode)
Did you already found the builtin "add ons"?
preferences > Extensions

If you enable the "cookie manager" and the "Statusbar Features" you get some Tools
at the bottom-line which let you en-/disable picture download, javascript, flash,
change the user agent and zoom-factor on the fly.

Hit the F9 - key to get a useful sidepane to manage the cookies/downloads/history and bookmarks.
------------------------------------------------------------------------
Privacy:
Paradoxically anti-fingerprinting and other privacy technologies can be
self-defeating if they are not used by a sufficient number of people.
read
If you're the only one with a secure setup,you are again unique and trackable.

User avatar
brokenman
Site Admin
Site Admin
Posts: 5575
Joined: 27 Dec 2010, 03:50
Distribution: Porteus v3.2rcX all desktops
Location: Brazil
Contact:

Re: Anonymity techniques

Post#7 by brokenman » 02 Sep 2014, 01:09

I think Donald has a good point there. In some sense being anonymous means not being noticed. Blending in. Personally I want to have the same browser agent and configuration as 90% of users if possible. Any unique option or settings marks you as different. A good example is the link supplied. You do the test and find that you have a unique fingerprint from over 4 million of their visitors. They have just recorded your fingerprint into a database of over 4 million people (how sure can you really be that only anonymous info is collected) and marked you as unique and trackable.
How does the laymen or linux newcomer find his way into being able to follow all these instructions?
I guess the first thing is to read about it. The VPN options are really user friendly these days. They have a GUI that does the work for you. Once you have made the decision that you want some anonymity or privacy then read about how to do it. The second option is to get a pre rolled distro that has already setup most of the system for you. The people that follow and use your information rely on the complacency and the relaxed attitude of the majority. People are naturally complacent or ignorant of online privacy and I don't think this will change. If it is cheap/free and easy then people will adopt it. I don't think we can actually have absolute privacy but at least we can make it more expensive or time consuming for those that intend to track us.

To be honest, I think even most mainstream unix-like distros are wide open to intervention by government or state departments. With all the bug patches being served out this is quite obvious. It wouldn't be too difficult for a department/person to submit a bug 'fix' that in fact does something more than just fix the bug. Something that makes it easy for the writer to get access. We all rely on upstream core components (like openssl or gtk) so imagine if a department paid someone one million dollars to write a bugdoor for a core component like this. So to answer your question Francois, people have to educate themselves, or trust in a pre rolled distro that will try their best to do the job of anonymizing the end user.
How do i become super user?
Wear your underpants on the outside and put on a cape.

User avatar
francois
Contributor
Contributor
Posts: 5082
Joined: 28 Dec 2010, 14:25
Distribution: kde xfce porteus manjaro kubun
Location: Enfin l'été, le changement climatique attendu: le soleil.

Re: Anonymity techniques

Post#8 by francois » 02 Sep 2014, 01:36

Thus the more persons try to use anonymous internet practice the better we will be. Big linux distributions should provide midori (firefox, chromium) anonymous browsing mode standard. Midori or the like should try to gain popularity with winose users. We should all get on VPN communication. We should close the internet connection of our winose and linus boxes as much as we can. And lets keep as much as possible paper and pencils. :twisted:
Voltaire: Le mieux est l'ennemi du bien.

User avatar
francois
Contributor
Contributor
Posts: 5082
Joined: 28 Dec 2010, 14:25
Distribution: kde xfce porteus manjaro kubun
Location: Enfin l'été, le changement climatique attendu: le soleil.

Re: Anonymity techniques

Post#9 by francois » 03 Sep 2014, 13:34

So if they identify me as trying to work anonymously, you would say that they will try to crack my linux box?
Voltaire: Le mieux est l'ennemi du bien.

donald
Full of knowledge
Full of knowledge
Posts: 1223
Joined: 17 Jun 2013, 13:17
Distribution: Porteus 3.2.2 XFCE 32bit
Location: Germany

Re: Anonymity techniques

Post#10 by donald » 03 Sep 2014, 14:59

Hi francois
No one is sitting in a dark room trying to break into your box!(except some
script-kiddies or hobby-cracker..lol).You are not a worthwhile goal.(imo)
But you will be on a automatic generated list because everyone is suspicious
these days.
(If you want to be sure to be on this list,search for "Tails" with google)..:wink:

cttan
Shogun
Shogun
Posts: 332
Joined: 26 Jan 2011, 16:15
Distribution: Porteus 3.2 64bit KDE
Location: Malaysia

Re: Anonymity techniques

Post#11 by cttan » 03 Sep 2014, 16:04

We can never be sure nobody is looking over our shoulder or searching under our rug for something useful.

I am using my linux box for asterisk telephony and sometimes I turn it on all night until next morning. I am within a local LAN with a router with wireless access point. My box is not in the DMZ.

Here are my close encounters with hacker on my asterisk box.

Hack 1:-

Code: Select all

[May 15 23:52:05] NOTICE[13161] manager.c: 186.227.53.43 tried to authenticate with nonexistent user 'phpagi'
[May 15 23:52:05] NOTICE[13161] manager.c: 186.227.53.43 failed to authenticate as 'phpagi'
[May 15 23:55:24] NOTICE[13325] manager.c: 186.227.53.43 tried to authenticate with nonexistent user 'cron'
[May 15 23:55:24] NOTICE[13325] manager.c: 186.227.53.43 failed to authenticate as 'cron'
[May 15 23:58:40] NOTICE[13571] manager.c: 186.227.53.43 tried to authenticate with nonexistent user 'myasterisk'
[May 15 23:58:40] NOTICE[13571] manager.c: 186.227.53.43 failed to authenticate as 'myasterisk'
[May 16 00:01:54] NOTICE[13914] manager.c: 186.227.53.43 tried to authenticate with nonexistent user 'cdr'
[May 16 00:01:54] NOTICE[13914] manager.c: 186.227.53.43 failed to authenticate as 'cdr'
[May 16 00:02:03] NOTICE[12960] chan_sip.c: Peer 'skypetestuser' is now Reachable. (6ms / 1000ms)
[May 16 00:05:10] NOTICE[14182] manager.c: 186.227.53.43 tried to authenticate with nonexistent user 'admin'
[May 16 00:05:10] NOTICE[14182] manager.c: 186.227.53.43 failed to authenticate as 'admin'
[May 16 00:08:26] WARNING[14269] tcptls.c: FILE * open failed!
[May 16 00:08:26] WARNING[14270] tcptls.c: FILE * open failed!
[May 16 00:08:26] WARNING[14271] tcptls.c: FILE * open failed!
[May 16 00:08:26] WARNING[14272] tcptls.c: FILE * open failed!
[May 16 00:08:26] WARNING[14273] tcptls.c: FILE * open failed!
[May 16 00:08:29] NOTICE[14274] manager.c: 186.227.53.43 tried to authenticate with nonexistent user 'manager'
[May 16 00:08:29] NOTICE[14274] manager.c: 186.227.53.43 failed to authenticate as 'manager'
[May 16 00:11:44] NOTICE[14355] manager.c: 186.227.53.43 tried to authenticate with nonexistent user 'remote_mgr'
[May 16 00:11:44] NOTICE[14355] manager.c: 186.227.53.43 failed to authenticate as 'remote_mgr'
[May 16 00:15:03] NOTICE[14485] manager.c: 186.227.53.43 tried to authenticate with nonexistent user 'mark'
[May 16 00:15:03] NOTICE[14485] manager.c: 186.227.53.43 failed to authenticate as 'mark'
Hack 2:-

Code: Select all

Jul 27 02:04:43] WARNING[21203] chan_unistim.c: Unable to remove old history log. : (2) No such file or directory
[Jul 27 02:04:43] WARNING[10665][C-00000001] chan_unistim.c: Unable to rename new history log. : (2) No such file or directory
[Jul 27 03:02:42] NOTICE[12284] manager.c: 66.193.171.221 tried to authenticate with nonexistent user 'admin'
[Jul 27 03:02:42] NOTICE[12284] manager.c: 66.193.171.221 failed to authenticate as 'admin'
[Jul 27 04:36:34] NOTICE[14717] manager.c: 66.193.171.221 tried to authenticate with nonexistent user 'admin'
[Jul 27 04:36:34] NOTICE[14717] manager.c: 66.193.171.221 failed to authenticate as 'admin'
[Jul 27 06:05:57] NOTICE[17130] manager.c: 66.193.171.221 tried to authenticate with nonexistent user 'admin'
[Jul 27 06:05:57] NOTICE[17130] manager.c: 66.193.171.221 failed to authenticate as 'admin'
[Jul 27 06:45:00] WARNING[18136][C-00000003] app_dial.c: Unable to create channel of type 'SIP' (cause 20 - Subscriber absent)
Hacker address:
Image
Hacker website:-
Image

Hack 3:

Code: Select all

[Apr 30 04:39:37] NOTICE[3806] manager.c: 174.133.81.90 tried to authenticate with nonexistent user 'AstTapi'
[Apr 30 04:39:37] NOTICE[3806] manager.c: 174.133.81.90 failed to authenticate as 'AstTapi'
[Apr 30 04:42:35] NOTICE[4098] manager.c: 174.133.81.90 tried to authenticate with nonexistent user 'a2billinguser'
[Apr 30 04:42:35] NOTICE[4098] manager.c: 174.133.81.90 failed to authenticate as 'a2billinguser'
[Apr 30 04:44:11] NOTICE[4245] manager.c: 174.133.81.90 tried to authenticate with nonexistent user 'user'
[Apr 30 04:44:11] NOTICE[4245] manager.c: 174.133.81.90 failed to authenticate as 'user'
[Apr 30 04:45:47] NOTICE[4389] manager.c: 174.133.81.90 tried to authenticate with nonexistent user 'phpconfig'
[Apr 30 04:45:47] NOTICE[4389] manager.c: 174.133.81.90 failed to authenticate as 'phpconfig'
[Apr 30 04:47:25] NOTICE[4583] manager.c: 174.133.81.90 tried to authenticate with nonexistent user 'admin'
[Apr 30 04:47:25] NOTICE[4583] manager.c: 174.133.81.90 failed to authenticate as 'admin'
[Apr 30 04:49:01] NOTICE[4766] manager.c: 174.133.81.90 tried to authenticate with nonexistent user '6666'
[Apr 30 04:49:01] NOTICE[4766] manager.c: 174.133.81.90 failed to authenticate as '6666'
[Apr 30 04:50:38] NOTICE[4910] manager.c: 174.133.81.90 tried to authenticate with nonexistent user 'pbx'
[Apr 30 04:50:38] NOTICE[4910] manager.c: 174.133.81.90 failed to authenticate as 'pbx'
Hack 4:

Code: Select all

May 11 03:07:59] NOTICE[19174] chan_sip.c: Peer 'John' is now Reachable. (215ms / 1000ms)
[May 11 04:35:23] NOTICE[18050] manager.c: 162.144.94.250 tried to authenticate with nonexistent user 'admin'
[May 11 04:35:23] NOTICE[18050] manager.c: 162.144.94.250 failed to authenticate as 'admin'
[May 11 04:35:23] NOTICE[18051] manager.c: 162.144.94.250 tried to authenticate with nonexistent user 'cdr'
[May 11 04:35:23] NOTICE[18051] manager.c: 162.144.94.250 failed to authenticate as 'cdr'
[May 11 04:35:23] NOTICE[18066] manager.c: 162.144.94.250 tried to authenticate with nonexistent user 'admin'
[May 11 04:35:23] NOTICE[18066] manager.c: 162.144.94.250 failed to authenticate as 'admin'
[May 11 04:35:24] NOTICE[18067] manager.c: 162.144.94.250 tried to authenticate with nonexistent user 'admin'
[May 11 04:35:24] NOTICE[18067] manager.c: 162.144.94.250 failed to authenticate as 'admin'
[May 11 04:35:25] NOTICE[18068] manager.c: 162.144.94.250 tried to authenticate with nonexistent user 'monitor'
[May 11 04:35:25] NOTICE[18068] manager.c: 162.144.94.250 failed to authenticate as 'monitor'
[May 11 04:35:25] NOTICE[18069] manager.c: 162.144.94.250 tried to authenticate with nonexistent user 'myasterisk'
[May 11 04:35:25] NOTICE[18069] manager.c: 162.144.94.250 failed to authenticate as 'myasterisk'
[May 11 04:35:26] NOTICE[18070] manager.c: 162.144.94.250 tried to authenticate with nonexistent user 'admin'
[May 11 04:35:26] NOTICE[18070] manager.c: 162.144.94.250 failed to authenticate as 'admin'
[May 11 04:35:27] NOTICE[18071] manager.c: 162.144.94.250 tried to authenticate with nonexistent user 'AstTapiMinRights'
[May 11 04:35:27] NOTICE[18071] manager.c: 162.144.94.250 failed to authenticate as 'AstTapiMinRights'
[May 11 04:35:29] NOTICE[18083] manager.c: 162.144.94.250 tried to authenticate with nonexistent user 'a2billing'
[May 11 04:35:29] NOTICE[18083] manager.c: 162.144.94.250 failed to authenticate as 'a2billing'
[May 11 04:35:29] NOTICE[18084] manager.c: 162.144.94.250 tried to authenticate with nonexistent user 'a2billinguser'
[May 11 04:35:29] NOTICE[18084] manager.c: 162.144.94.250 failed to authenticate as 'a2billinguser'
[May 11 04:35:31] NOTICE[18086] manager.c: 162.144.94.250 tried to authenticate with nonexistent user 'remote_mgr'
[May 11 04:35:31] NOTICE[18086] manager.c: 162.144.94.250 failed to authenticate as 'remote_mgr'
[May 11 04:35:31] NOTICE[18085] manager.c: 162.144.94.250 tried to authenticate with nonexistent user 'dialer'
[May 11 04:35:31] NOTICE[18085] manager.c: 162.144.94.250 failed to authenticate as 'dialer'
[May 11 04:35:31] NOTICE[18087] manager.c: 162.144.94.250 tried to authenticate with nonexistent user 'a2billinguser'
[May 11 04:35:31] NOTICE[18087] manager.c: 162.144.94.250 failed to authenticate as 'a2billinguser'
[May 11 04:35:31] NOTICE[18088] manager.c: 162.144.94.250 tried to authenticate with nonexistent user 'call'
[May 11 04:35:31] NOTICE[18088] manager.c: 162.144.94.250 failed to authenticate as 'call'
[May 11 04:35:32] NOTICE[18091] manager.c: 162.144.94.250 tried to authenticate with nonexistent user 'manager'
[May 11 04:35:32] NOTICE[18091] manager.c: 162.144.94.250 failed to authenticate as 'manager'
Hacker address:
Image

The scariest thing is that I am within a NATed network. So I thought it would be quite safe as we are not exposed directly to the Internet which is a treacherous place. FYI I have not announce my IP and my external IP is dynamic. I have activated fail2ban ever since and so far have not seen another instance.

It is better to be safe than sorry.

Last but not least, checkout closely on the last hacker address. He seems to come out from the US Rocky Mountains. Is that the NSA??? :shock:

User avatar
francois
Contributor
Contributor
Posts: 5082
Joined: 28 Dec 2010, 14:25
Distribution: kde xfce porteus manjaro kubun
Location: Enfin l'été, le changement climatique attendu: le soleil.

Re: Anonymity techniques

Post#12 by francois » 04 Sep 2014, 14:38

Oh! I have read on tails. :bad: I might even try it. 8)

Maybe we should have a porteus tail edition!
Voltaire: Le mieux est l'ennemi du bien.

Bogomips
Full of knowledge
Full of knowledge
Posts: 2563
Joined: 25 Jun 2014, 15:21
Distribution: 3.2.2 Cinnamon & KDE5
Location: London

Re: Anonymity techniques

Post#13 by Bogomips » 29 May 2015, 21:02

On principle no mobile phone, but quiite a few sites requiring activation thru SMS. There is a plethora of sites offering help with anonymity. Some however turn out to be blacklisted, others have stale cell phone numbers, yet others work ok, but the SMS never gets posted, look like rip-offs to sell their private numbers.

Anyone had any luck getting round this? Suggestions gratefully accepted. :Rose:
Linux porteus 4.4.0-porteus #3 SMP PREEMPT Sat Jan 23 07:01:55 UTC 2016 i686 AMD Sempron(tm) 140 Processor AuthenticAMD GNU/Linux
NVIDIA Corporation C61 [GeForce 6150SE nForce 430] (rev a2) MemTotal: 901760 kB MemFree: 66752 kB

Post Reply