Advertisement
Narzew

How to secure your computer and surf fully anonymous BHStyle

Nov 4th, 2014
442
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.39 KB | None | 0 0
  1. This tutorial was created by MasterPirate and has been titled: How to secure your computer and surf fully Anonymous BLACK-HAT STYLE
  2. Its original name is: The Ultimate Guide for Anonymous and Secure Internet Usage v1.0.1. Let's begin.
  3. By the time you are finished reading and implementing this guide, you will be able to securely and anonymously browse any website and to do so anonymously. No one not even your ISP or a government agent will be able to see what you are doing online. If pr
  4. In order to prepare this guide for you, I have used a computer that is running Windows Vista. This guide will work equally well for other versions of Windows. NOTE: We have added to this tutorial to include Ubuntu linux. If you use a different operating system, you may need to have someone fluent in that operating system guide you through this process. However, most parts of the process are easily duplicated in other operating systems.
  5. I have written this guide to be as newbie friendly as possible. Every step is fully detailed and explained. I have tried to keep instructions explicit as possible. This way, so long as you patiently follow each step, you will be just fine.
  6. In this guide from time to time you will be instructed to go to certain URLs to download files. You do NOT need TOR to get these files, and using TOR (while possible) will make these downloads very slow.
  7. This guide may appear overwhelming. Every single step is explained thoroughly and it is just a matter of following along until you are done. Once you are finished, you will have a very secure setup and it will be well worth the effort. Even though the gui
  8. For windows users, it is highly recommended that you close *ALL* applications running on your computer before starting.
  9. This tutorial has been broken down into parts to make it easier to work with. Here is an overview of everything that will be covered.
  10. Table of contents:
  11. Obtaining Tor Browser
  12. Using and Testing Tor Browser for the first time
  13. Securing Your Hard Drive
  14. Setting up TrueCrypt, Encrypted Hidden Volumes
  15. Testing TrueCrypt Volumes
  16. Securing your Hard Disk
  17. Temporarily Securing Your Disk, Shredding Free Space
  18. Installing VirtualBox
  19. Installing a Firewall
  20. Firewall Configuration
  21. Installing Ubuntu
  22. Ubuntu Initial Setup
  23. Installing Guest Additions
  24. Installing IRC (Optional)
  25. Installing Torchat (Optional)
  26. Creating TOR-Only Internet Environment
  27. Other parts available at: http://hacktut.ugu.pl
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement