Jump to content
Not connected, Your IP:


  • Content Count

  • Joined

  • Last visited


Reputation Activity

  1. Like
    Neonknight reacted to Staff in Announcement for Eddie Windows edition users   ...
    We would like to inform you that according to hundreds of reports we have been receiving in the last weeks, Eddie 2.10.3 and older versions stopped working properly in Windows 7, 8 and 10. While they seem to run correctly, they are not able to establish any connection with any connection mode.
    While we ignore the reason of this malfunction, we will probably not investigate, because Eddie 2.10.3 and older versions are no more supported since a long ago.
    We remind you that Eddie 2.10.3 is a three years old version and that it is deprecated. The only non-deprecated Eddie versions are 2.13.6 and 2.15.2 (as well as 2.16.1 which is currently under testing). We strongly recommend that you don't use any Eddie version older than 2.13.6.
    We kindly ask you to check your version in "AirVPN" > "About" and upgrade to Eddie latest release if necessary. Eddie for Windows can be downloaded here:
    Kind regards
    AirVPN Staff
  2. Like
    Neonknight reacted to Staff in Using AirVPN with OpenVPN Client for Android   ...
    We don't recommend this software, because it's closed sourceInstall OpenVPN Client for Android. Launch your internet browser.
    NOTE: don't use the default Android browser because it has an unresolved bug.
    Chrome and Opera have been tested by us and work. Connect to AirVPN website, login and create the configuration files from our Config Generator.
    Choose Linux as platform (only direct TCP and UDP connections are supported) and finally click then "Generate" button to download it. Downloaded .ovpn files may be imported directly into the application but the behavior depends on many factors (employed browser, files manager, Android version, etc).
    For simplicity's sake, we assume in this guide that you saved .ovpn generated files under the Download's directory in the Android filesystem. Open OpenVPN Client and tap the bottom right "+" button:
    Tap the "Import VPN Profile" button:
    Locate your .ovpn files, click on the configuration file you want to import:
    Long press on the profile to change the configuration (optional):
    Once done click on the top right save button (optional):
    Click on profile's switch button to connect:
    A warning from the Android OS is displayed, click OK to continue:
    Now you are connected to the selected profile, when you need to disconnect from the VPN click on the "Disconnect" button from the app's notification:
  3. Like
    Neonknight reacted to Staff in Do you allow p2p? How can I optimize performance of eMule and BitTorrent with AirVPN?   ...
    Do you allow p2p? How can I optimize performance of eMule and BitTorrent with AirVPN?

    Yes, p2p is allowed, as well as any other protocol. Currently p2p is a set of the most efficient protocols to share and access information on the Internet. We do not discriminate against any protocol.

    To obtain the best performance with a BitTorrent client or an eMule client, log your account in our web site and proceed to remotely forward a port from the menu "Client Area"->"Forwarded ports". Pick a port or let the system choose an available one for you. Pick "TCP & UDP". Remember the port number.

    Then, configure the "Port used for incoming connections" (also called "Listening port") in your BitTorrent client so that it matches the port number you have just forwarded remotely. On eMule, go to "Options"->"Connection" tab. Write in both fields of "Client ports" the number of the port that you have forwarded. Disable UPnP, NAT-PMP and any possible automatic port mapping feature that can modify the listening port. 
    If you run uTorrent or any other software with bandwidth management, make sure to disable such management (such as uTP in uTorrent).

    In this way your clients will be able to accept incoming connections from the Internet, enhancing performance in several cases and making initial seeding possible. This procedure can be performed just once and for all, as long as you don't wish to change port(s) on your clients. On BitTorrent clients, make sure to disable the option to pick random ports at every startup.

    If you forward a port for a p2p torrent client, do NOT remap it to a different local port and make sure that the torrent client port matches the remotely forwarded port number, otherwise your client will communicate to trackers (if you use them) and DHT the wrong port: torrent clients will communicate to trackers and DHT the port number you have configured in them. As a result, you will get no incoming packets from the swarm and the torrent client network status token will remain yellow.

    IMPORTANT: do NOT forward on your router the same ports you use on your Bittorrent or eMule client (or any other listening service) while connected to the VPN. Doing so exposes your system to correlation attacks and potentially causes uncencrypted packets to be sent outside the tunnel from your client.

  4. Like
    Neonknight reacted to itguy2017 in How to check, if your machine is compromised...   ...
    Security Analyst and Senior Network Engineer here. I've worked for several AV companies as well.
    Common themes that may indicate a compromise;
    1) Slowdowns, Lag, hitching on the PC.
    2) Website load errors. For MiTM and State Sponsored Injections it's very common to notice webpages don't load properly at times. Often requiring the browser to hit-reload on a web page. This is very common with Man in the Middle types of interception on your machine. One way to test is to go to a site with an Extended Validation Certificate (EVC), if it hitches there it's a good chance you are MiTM'd. Then you need to start looking for forged or self-issued Root CA's on the machine, proxies and forged CA's in the browser, etc.
    3) Recurrent infections/compromises. If you fix things and they happen again it's time to start looking for things like NIC and HD firmware compromises. We isolated a CIA compromise 9 years ago that allowed exploits to be reinstalled from HD firmware. I had a stack of 7 hard drives that kept reinstalling exploits even after OS format. Later, Snowden documents revealed HD FW is compromised.
    4) APPINIT, check your registry for APPINIT, this is a DLL preload before the launch of normal programs. Delete them from Registry. We found compromises a few years ago that launched a DLL over top of Chrome as it was launched with a 'shadow' Chrome running on top of the real one. A second icon for Chrome overlayed the normal one on the taskbar so most people wouldn't notice.
    5) Fake OpenSource programs. NSA/CIA both have their own fake compiled Firefox browsers for example. Functionally and visually identical to NORMAL Firefox, but they own it and they can do what they want when it's installed. We've isolated these in a few cases over the years. This doesn't mean to give up your opensource, it means be very careful and source them properly and be aware of versions and MD5 signatures of apps.
    6) Watch your directory structure. Often we find exploits installed in a directory off of C:\ or on C: root. A lot of anti-malware products scan the 'most common threat surface locations' (program files, user/appdata, windows/system32, etc. Totally avoiding malware installed elsewhere. That's how 'quick scans' are so quick with most products. Do full-scans with your products and be observant of rogue directories!
    7) Watch how WIFi works.. Disconnects and Reconnects? It's not always your WiFi... Also watch for hidden and/or sporadic appearance of WiFi adapters on your devices. We found a laptop that was being used as a Rogue-AP in broadcast mode to connect to the internal network by utilizing the laptop as an AP itself. Very interesting, very effective. We caught it by observing the unstable WiFi and what happened during the instability, a rogue AP popped up each time disconnecting the user for a second or two.
    8) DISCERN, AWARE.. Watch for anomalies. Almost all of the threats we find present anomalies on the system at some level. Even the big stuff, from NSA/CIA presents anomalies to the observant person. Their best stuff isn't immune to not impacting the system, stability or presenting oddities to even the untrained eye.
    That should cover most things.
  • Create New...