How can I restrict visibility to my SMB server to public (internet)? [on hold]

I have a SMB server running on pi4 behind an ADSL router from my ISP.

Although there is only 1 ssh port-forwarding rule to my pi4 server, the SMB server is visible to the internet! So, I don’t have DMZ enabled on my ISP ADSL router and there is only 1 port forward rule – to access ssh on my pi4.

Is there any way to restrict SMB server visibility to the public internet from smb.conf or other methods? I searched all over the internet and found nothing.

How to Bypass Iran intranet Restrictions for google access and international internet access? [on hold]

The government restricted all the international internet connections for almost 70 Millions Iranian people for 7 days at November of 2019!!!

enter image description here

I have heard the cost of doing this is 1 billion US‌ Dollar for one year by help of DLP Italian communities LCC, SO i think The DLP Engineers must know what can we do now? can we have access to some of liberal similar DLP Company (Any Forum or … )?

How to bypass internet restriction in Iran to get access to to some simple sites like google.

Also if this is not possible how we could be in contact with each other when we don’t have international connection like these days or when the internet totally banned by government?

I found some apps like firechat, Is this possible to be done by block-chain technology?

Is this possible to create some app like torrent by converting every mobiles phone to one server for communication between each other ?

Also i asked this question here (https://meta.stackexchange.com/questions/338946/proper-se-site-to-ask-about-how-to-bypass-irans-internet-restrictions-for-googl) and @Rob said:

From [NetBlocks.org][5], Nov 23, 2019:

“… Current connectivity levels have risen to 64% after earlier flatlining at 5% for several days. Mobile internet remains generally unavailable. …”.

It looks like a hole was found on the 17th, which >was quickly plugged.

Internet shut off, except for a hole that was quickly patched.

So these spikes has been seen at the other country with internet restriction like Iraq (https://netblocks.org/reports/internet-restored-in-iran-after-protest-shutdown-dAmqddA9) as seen here:

enter image description here enter image description here

How this happened and could be done again?

I know asked too question here,you could bold the proper question for helping us.

Thanks for your attention.

Can I surf the internet with a Virtual Machine not trying to malware test but may run into some

For this project I want to access software using a VM that may contain malware but I won’t be trying to malware test. I understand that malware can breach but are there any precautions to use the internet and not have the malware come back into my host machine and host network?

Could you anonymously upload a file on the internet if the threat model was the entire world trying to find your identity after you do so?

Thought experiment: You need to upload a file, and the threat model is the entire world trying to find out who you are after you do so.

I know this is absurd, but bear with me, it’s a thought experiment that I thought would be fun to have, where the scenario is the following:

You are a normal citizen, and you have a file (assume that you just have it, and the file doesn’t have metadata or information related to you) that is somehow so compromising that, if uploaded on the internet, the entire world would actively try to find out who you are. Everyone, military, every country’s agencies, civilians, that grandma going to the grocery store, yes, her too, to the best of her ability. People who run TOR relays too, everyone.

Your mission is to upload it on the internet without your identity being revealed. How would you go about it?

Update: File is in your pendrive, has a size of few MB, it’s ok if it just shows up eventually. No-one should really guess what country you might live in. We can think of the user as average-citizen, with average knowledge of technology, but can follow instructions (for example, setting up Tails). Assume that who had access to this information was not relevant, because no-one had access to this data before. We can invent an unrealistic scenario for this, for example, you have material that prove the existence of aliens or something.

Is it possible to safely connect to the internet using a malicious router?

If you connect to a router that’s controlled by a hacker, is there some way you can safely surf the internet without getting hacked? By using a vpn and firewall maybe?

Does it make a difference what kind of router it is?

1) A wired router

2) A wireless router

3) A 4g usb dongle ( Could this be used for a bad usb attack?)

How far is my Access Point BSSID sent in my internet packets?

My question relates to this question: How does Google know where I am? and ask a similar question to this (but that accepted answer doesn’t pertain to BSSIDs).

The chosen answer in my first linked question describes a large database of previously saved geolocation information (GPS, cell towers) mapped to BSSIDs.

The reason for wanting to construct such a database must mean that BSSID can be retrieved at their (database maintainers, such as Google) end and then matched to their saved location. Is that correct? If that is correct, I wonder why BSSID would need to be sent beyond the Access Point?

Thanks

nueva comunidad de hosting en internet fue lanzada

de forma y de sumar un poco a la comunidad.

Hemos lanzado la comunidad https://foroshosting.com soporte exclusivo en español de hosting para los centros de datos mas populares.

es gratis 🙂

buscamos ayudar a usuarios que tengan problemas en el mundo del web hosting. emprendedores que acaban de iniciar sus empresas y tienen pocos conocimientos en estas áreas.

todo suma, y todo cuenta. es nuestro lema.

los esperamos.