> Yes could be, he has a "social engineering" approach to people. He places 
> people and
> himself on the same level of machines. Then he searches vulnerability on 
> persons.
> He makes extensive use of corruption to take advantage on his personal war. 
> From this
> point of view also a vpn provider could be very vulnerable because as many 
> people know
> vpn providers are not big rich companies.

You would use a VPN to escape the claws of your own government, but not the 
claws of
some corrupt individual in your country. Therefore I see no reason, why you 
would use
a VPN, and its required software to use it would just increase your attack 
surface.

> About authorities it would be my next step when I'll find proofs of what I'm 
> saying.
> Because as you saw the first thing they think it will be "this guy is 
> paranoid".

That's the great benefit of virtual machines with snap shoting: unless the 
"evil hackers"
can not only control your running system, but can also break through the 
boundaries set
by your virtual machine, you have reasonable ways to collect evidence. Just 
create snaps
whenever your system feels strange, and you can inspect these snapshots at a 
later, more
convenient moment. You can also perform comparisons between snap shots.

> Yes I thought to try to use vm on linux, but you know the linux kernel is 
> hole with some
> code around.

Yes, they say all kinds of nasty stuff about linux, but overall it works well, 
and the
vast majority of public facing servers run linux.

Your best bet will probably be some kind of variety of systems: linux, windows, 
freebsd,
maybe throw some openbsd into the pool. if "evil hackers" have to check your 
system first,
and probably throw some non-working exploits at it before breaking through, 
then you have
a good chance of catching them in the act. make your setup as unpredictable as 
you can,
and "they" will leave undeniable traces.

Once you have these traces, you can probably learn more about the hacker's 
methods and
develop a strategy to get rid of them for good.

PS: It would probably attract more helpful talent here, if people had reason to 
assume,
that your efforts serve some common goal and are not some private quest for 
free security
consulting. Care to share, why you think your computers are under attack?

Reply via email to