Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- First off I’m pretty much a n00b but know a little as far as Computer Security. BTW look into Virtual Machines. Just google it and you’ll find what you need. Here are some “Basic” security tips I think you’ll Benefit from. It is my Belief that everyone with a P.C. NEEDS a VPN, (Virtual Private Network) as Hackers are everywhere. Also with your I. P. (Internet Protocol) “exposed” people can literally track down your ADDRESS. I mean sadly that is life. Your I.P. Address tells LOTS about you. As far as VPN’s DON’T get one from a company located in the U.S. or any country where Police can take their Log credentials. The best companies I think are like is the Netherlands, Germany, Russia ... Etc. I can tell you what VPN providers NOT to get. Do NOT use HMA (Hide My Ass) as they are in England and in one Legal Case handed over their Logs. See PRIVACY is very Important EVEN if you do nothing but GOOD online which I HOPE that is what you are doing. I’ve heard CyberGhost is good but it’s in America however. P.I.A. (Private Internet Access) is supposed to be very good. Another Great VPN is Express VPN. You’ll need to do your own research on that though.
- Okay now we come to Mac Address Changers. See your Mac Address, is where you are PHYSICALLY located that DOES NOT change even with a great VPN. If you look online there are Great Free Mac Changers that are EASY to install. With a Mac Changer installed all you have to do is open it and press a button and your Physical Address changes just like that. Now if like me it cuts off your internet connection so you MUST completely shut down your Computer and unplug your modem for roughly 30 seconds then plug it back in. You then turn your computer on and it’s like starting from scratch. Obviously when your turn your computer on you log into your VPN too.
- Okay now to keep your “Cache”, and Browsing history private. After each online session, go to control panel, and hopefully from there you know how to delete your browsing history. Is that enough though? NO ! There is a Great Free program called CCleaner. BUY PRO VERSION though What is does is empties out not only your Browsing History, Searches, Caches, but all saved passwords, cookies, saved formed information, last places you downloaded from. Basically you are pretty much wiped cleaned HENCE keep all your info written down somewhere and HIDDEN good NOT by your PC. Also a External Hard Drive or USB stick is good too.
- So is steps to me IMHO these are the ways to end every computer session. One point, the Tor browser is good but VERY slow. Just use the Incognito mode on your favorite browser. Okay if you are using the Incognito Mode to need to by your Browser erase your History just sign out of everything and close browser. Then use Control Panel to delete cookies and browsing, BUT afterwords use CCleaner too. After that, sign out of your VPN. Then you open your Mac Address Changer and change your Mac Address. Then shut down computer and unplug modem for roughly 30 seconds. To log back on, just turn your P.C. on, and log into your VPN, and use a Incognito Mode on your favorite browser. Afterwards just to the steps above like I said. Yes it takes a few minutes but YOUR PRIVACY and ANONYMITY is what is important at the end of then day. Thanks, Enjoy, and be SAFE :)
- GREAT VIDEO
- https://youtu.be/J1q4Ir2J8P8
- Here is a great place to get a MAC Address Changer.
- https://technitium.com/tmac/
- Here is a good email provider, that encrypts your emails.
- https://protonmail.com/
- A great email surface BUT make sure you use Tor as your “Headers” won’t chance.
- https://www.guerrillamail.com/
- Here is CCleaner Download again it’s free but if you can get Pro version.
- https://www.piriform.com/ccleaner/download
- Don’t worry this is not a “Onion”, but has tons of Great Articles and computer advice. https://www.deepdotweb.com/
- P.S. For Cyber Teams
- Keep everything quiet, don’t brag like so many teams too because as you’ll see they are in Jail most are. Look at #LizardSquad for example. Only communicate through burn phones in which you use only that once, then wipe clean, and throw the battery and phone itself away in different locations. Any other phone take batteries out when you aren’t using them. Use code words which only you and your team know and CHANGE them. Set up a Proton mail account, that only you and your team know. Only you and your team know the password and decryption key. Never send a thing from that email rather save it as a Draft, that way when your team signs on they can read it from the draft, then delete it. Trust no one but yourself. How you put together a team is up to you. People should be vetted at least by 3 other people, not just one or two. Even with all these precautions if they really are after you, you will get caught. Don’t be “interesting” as doing so brings unwanted attention. Actually being a bit boring and coming off a bit dumb is good.
- Please see here my guide to “U.C. Work”, and “Sock” Accounts.
- https://www.facebook.com/notes/ed-eddini-draughn/eds-guide-for-undercover-work-sock-accounts-etc/10154255281107777
- Very good article. Again I don’t hack nor encourage people do to so.
- http://www.hackzzon.com/2016/04/how-to-leave-no-trace-while-hacking_96.html#.WCKlfymiSzQ.facebook
- Besides Maltego here is a great site for Intelligence Gathering.
- https://inteltechniques.com/menu.html
- Here is a Tutorial on the more specifics of using this Great Tool.
- https://youtu.be/eGbtvhepy-k
Add Comment
Please, Sign In to add comment