JuanDeLemos

Basic Computer Security / Intel Techniques

Dec 22nd, 2016
23,449
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.47 KB | None | 0 0
  1. First off I’m pretty much a n00b but know a little as far as Computer Security. BTW look into Virtual Machines. Just google it and you’ll find what you need. Here are some “Basic” security tips I think you’ll Benefit from. It is my Belief that everyone with a P.C. NEEDS a VPN, (Virtual Private Network) as Hackers are everywhere. Also with your I. P. (Internet Protocol) “exposed” people can literally track down your ADDRESS. I mean sadly that is life. Your I.P. Address tells LOTS about you. As far as VPN’s DON’T get one from a company located in the U.S. or any country where Police can take their Log credentials. The best companies I think are like is the Netherlands, Germany, Russia ... Etc. I can tell you what VPN providers NOT to get. Do NOT use HMA (Hide My Ass) as they are in England and in one Legal Case handed over their Logs. See PRIVACY is very Important EVEN if you do nothing but GOOD online which I HOPE that is what you are doing. I’ve heard CyberGhost is good but it’s in America however. P.I.A. (Private Internet Access) is supposed to be very good. Another Great VPN is Express VPN. You’ll need to do your own research on that though.
  2.  
  3. Okay now we come to Mac Address Changers. See your Mac Address, is where you are PHYSICALLY located that DOES NOT change even with a great VPN. If you look online there are Great Free Mac Changers that are EASY to install. With a Mac Changer installed all you have to do is open it and press a button and your Physical Address changes just like that. Now if like me it cuts off your internet connection so you MUST completely shut down your Computer and unplug your modem for roughly 30 seconds then plug it back in. You then turn your computer on and it’s like starting from scratch. Obviously when your turn your computer on you log into your VPN too.
  4. Okay now to keep your “Cache”, and Browsing history private. After each online session, go to control panel, and hopefully from there you know how to delete your browsing history. Is that enough though? NO ! There is a Great Free program called CCleaner. BUY PRO VERSION though What is does is empties out not only your Browsing History, Searches, Caches, but all saved passwords, cookies, saved formed information, last places you downloaded from. Basically you are pretty much wiped cleaned HENCE keep all your info written down somewhere and HIDDEN good NOT by your PC. Also a External Hard Drive or USB stick is good too.
  5.  
  6. So is steps to me IMHO these are the ways to end every computer session. One point, the Tor browser is good but VERY slow. Just use the Incognito mode on your favorite browser. Okay if you are using the Incognito Mode to need to by your Browser erase your History just sign out of everything and close browser. Then use Control Panel to delete cookies and browsing, BUT afterwords use CCleaner too. After that, sign out of your VPN. Then you open your Mac Address Changer and change your Mac Address. Then shut down computer and unplug modem for roughly 30 seconds. To log back on, just turn your P.C. on, and log into your VPN, and use a Incognito Mode on your favorite browser. Afterwards just to the steps above like I said. Yes it takes a few minutes but YOUR PRIVACY and ANONYMITY is what is important at the end of then day. Thanks, Enjoy, and be SAFE :)
  7.  
  8. GREAT VIDEO
  9.  
  10. https://youtu.be/J1q4Ir2J8P8
  11.  
  12. Here is a great place to get a MAC Address Changer.
  13.  
  14. https://technitium.com/tmac/
  15.  
  16. Here is a good email provider, that encrypts your emails.
  17.  
  18. https://protonmail.com/
  19.  
  20. A great email surface BUT make sure you use Tor as your “Headers” won’t chance.
  21.  
  22. https://www.guerrillamail.com/
  23.  
  24. Here is CCleaner Download again it’s free but if you can get Pro version.
  25.  
  26. https://www.piriform.com/ccleaner/download
  27.  
  28. Don’t worry this is not a “Onion”, but has tons of Great Articles and computer advice. https://www.deepdotweb.com/
  29.  
  30. P.S. For Cyber Teams
  31.  
  32. Keep everything quiet, don’t brag like so many teams too because as you’ll see they are in Jail most are. Look at #LizardSquad for example. Only communicate through burn phones in which you use only that once, then wipe clean, and throw the battery and phone itself away in different locations. Any other phone take batteries out when you aren’t using them. Use code words which only you and your team know and CHANGE them. Set up a Proton mail account, that only you and your team know. Only you and your team know the password and decryption key. Never send a thing from that email rather save it as a Draft, that way when your team signs on they can read it from the draft, then delete it. Trust no one but yourself. How you put together a team is up to you. People should be vetted at least by 3 other people, not just one or two. Even with all these precautions if they really are after you, you will get caught. Don’t be “interesting” as doing so brings unwanted attention. Actually being a bit boring and coming off a bit dumb is good.
  33. Please see here my guide to “U.C. Work”, and “Sock” Accounts.
  34.  
  35. https://www.facebook.com/notes/ed-eddini-draughn/eds-guide-for-undercover-work-sock-accounts-etc/10154255281107777
  36.  
  37. Very good article. Again I don’t hack nor encourage people do to so.
  38.  
  39. http://www.hackzzon.com/2016/04/how-to-leave-no-trace-while-hacking_96.html#.WCKlfymiSzQ.facebook
  40.  
  41. Besides Maltego here is a great site for Intelligence Gathering.
  42.  
  43. https://inteltechniques.com/menu.html
  44.  
  45. Here is a Tutorial on the more specifics of using this Great Tool.
  46.  
  47. https://youtu.be/eGbtvhepy-k
Add Comment
Please, Sign In to add comment