wangdu

Stay Anonymous and Secure

May 18th, 2016
65
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.78 KB | None | 0 0
  1. Introduction
  2.  
  3.  
  4. Hello, in this tutorial, I will demonstrate various ways on how to remain anonymous on the Internet. Privacy is a must, in today's world. Currently, there are a lot of crimes going on, such as Swatting, Doxing etc. When our identity gets leaked, it is a big loss for us and it is somewhat one of the big mistakes of our lives. Which is why, staying secure, and anonymous online is essential.
  5.  
  6.  
  7. This tutorial is about two types of protection.
  8.  
  9.  
  10. Online Protection
  11. Offline Protection
  12.  
  13.  
  14.  
  15.  
  16. First, we should get some offline protection. There are many ways on protecting ourselves. Remember, you should always have offline protection before hacking.
  17.  
  18.  
  19. Pro Tip : Never trust anyone on the Internet. There are a lot of bots and individuals that add us on IM services for the sole purpose of infecting us.
  20.  
  21.  
  22.  
  23.  
  24. Offline Protection
  25.  
  26.  
  27. Note : In this part, offline protection refers to protecting your computer from viruses, Trojans, root kits, etc. It may also refer to encryption, such as File Encryption, OS protection, and such. It is very important to protect your files because we can't always trust the ways of Online Anonymity. If it goes wrong, our offline protection should save us. Trojans and viruses remain a great challenge to our Anonymity. There are always Trojans around and if we get infected, the attacker may use our machine as a proxy, and has full control on our machines.
  28.  
  29.  
  30.  
  31.  
  32. Protect yourself from Malware
  33.  
  34.  
  35. Malwarebytes' Anti-Malware
  36.  
  37.  
  38. Malwarebytes' Anti-Malware (MBAM) is a computer application that finds and removes malware. Made by Malwarebytes Corporation
  39.  
  40.  
  41. More and download
  42.  
  43.  
  44.  
  45.  
  46. Encrypt your Keystrokes using KeyScrambler
  47.  
  48.  
  49. KeyScrambler
  50.  
  51.  
  52. KeyScrambler is an anti-keylogging program designed specifically to strengthen your PC security.
  53.  
  54.  
  55. More and download
  56.  
  57.  
  58.  
  59.  
  60. Get a Firewall
  61.  
  62.  
  63. COMODO firewall
  64.  
  65.  
  66. It is always recommended to use a Firewall when doing hacking. I recommend Comodo Firewall. COMODO firewall is Award-Winning personal firewall software on Internet.
  67.  
  68.  
  69. Download here
  70.  
  71.  
  72.  
  73.  
  74. Protect your files and OS using True Crypt.
  75.  
  76.  
  77. TrueCrypt
  78.  
  79.  
  80. TrueCrypt is a free open-source disk encryption software for Windows 7/Vista/XP, Mac OS X, and Linux.
  81.  
  82.  
  83. Source and more: http://www.truecrypt.org/ (http://www.truecrypt.org/)
  84.  
  85.  
  86. Download here
  87.  
  88.  
  89.  
  90.  
  91. Use Virtual Machines for hacking (VMWare Player)
  92.  
  93.  
  94. VMWare Player
  95.  
  96.  
  97. It is always a good idea on hacking from a VM (Virtual Machine) because if anything goes wrong just delete it using a good file eraser.
  98.  
  99.  
  100. Source and more : https://www.vmware.com/products/desktop_...rview.html (https://www.vmware.com/products/desktop_...rview.html)
  101.  
  102.  
  103. Download Here
  104.  
  105.  
  106.  
  107.  
  108. Deepfreeze your PC to prevent common attacks
  109.  
  110.  
  111. DeepFreeze
  112.  
  113.  
  114. Faronics Deep Freeze makes your PC indestructible. It protects your computer by freezing its original configuration, which prevents unwelcome or unwanted changes made while in-session from sticking. With a simple restore-to-reboot, your system integrity is maintained helping your machines to run smoothly and efficiently giving you more up-time and boosting user productivity.
  115.  
  116.  
  117. Source and more : http://www.faronics.com/en-uk/enterprise...e_en-uk-2/ (http://www.faronics.com/en-uk/enterprise...e_en-uk-2/)
  118.  
  119.  
  120. Download Here
  121.  
  122.  
  123.  
  124.  
  125. Spoof your Mac Address using TMAC
  126.  
  127.  
  128. TMAC
  129.  
  130.  
  131. Technitium MAC Address Changer allows you to change (spoof) Media Access Control (MAC) Address of your Network Interface Card (NIC) irrespective to your NIC manufacturer or its driver. It has a very simple user interface and provides ample information regarding each NIC in the machine.
  132.  
  133.  
  134. Source and more : http://www.technitium.com/tmac/index.html (http://www.technitium.com/tmac/index.html)
  135.  
  136.  
  137. Download here
  138.  
  139.  
  140.  
  141.  
  142. Use CCleaner, the multi-purpose tool
  143.  
  144.  
  145. CCleaner
  146.  
  147.  
  148. Cleaner is a multi-purpose tool which can be used for deleting files, clearing temp files, cache, etc.
  149.  
  150.  
  151. Source and more : http://www.piriform.com/ccleaner/ (http://www.piriform.com/ccleaner/)
  152.  
  153.  
  154. Download here
  155.  
  156.  
  157.  
  158.  
  159. Clear the evil cookies
  160.  
  161.  
  162. Flash Cookie Remover
  163.  
  164.  
  165. Flash cookies are evil because they persist even if you delete your browser's cookies. They are stored separately from normal site cookies and therefore need a special tool to delete them.
  166.  
  167.  
  168. Source and more : http://www.trojanhunter.com/flash-cookie-remover/ (http://www.trojanhunter.com/flash-cookie-remover/)
  169.  
  170.  
  171. Download here
  172.  
  173.  
  174.  
  175.  
  176. Other tips : Don't think that using Linux or Mac can't get you viruses. There are also malware that works on this Operating Systems. Malware programmers don't feel the need to write malware for this OSs since they are not used by many people.
  177.  
  178.  
  179.  
  180.  
  181. Online Protection
  182.  
  183.  
  184. Now we are moving to Online Protection. As you know, this is very important also more than Offline Protection. Common methods of Online protection are discussed below.
  185.  
  186.  
  187.  
  188.  
  189. Types of Online Protection
  190.  
  191.  
  192. VPN(s)
  193. Proxies
  194. Tor
  195. SSH Tunneling
  196.  
  197.  
  198.  
  199.  
  200. VPN (Virtual Private Network)
  201.  
  202.  
  203. A virtual private network (VPN) is a network that uses primarily public telecommunication infrastructure, such as the Internet, to provide remote offices or traveling users access to a central organizational network.
  204.  
  205.  
  206. VPN provides us a secure way of connecting to websites by hiding our IP and encrypting our information.
  207.  
  208.  
  209. Source and more : http://en.wikipedia.org/wiki/Virtual_private_network (http://en.wikipedia.org/wiki/Virtual_private_network)
  210.  
  211.  
  212.  
  213.  
  214. Free VPNs
  215. Cyberghost
  216. HotSpot Shield
  217. Pro XPN
  218. Open VPN
  219.  
  220.  
  221. Paid VPNs
  222. nVPN
  223. SwissVPN
  224.  
  225.  
  226. HTTP Proxies and SOCKS5
  227.  
  228.  
  229. Get Proxy lists from this sites.
  230. Alive Proxy
  231. Hide My Ass
  232. Proxy list
  233.  
  234.  
  235. More here.
  236.  
  237.  
  238. Pro-Tip : Don't use HideMyAss for hacking.
  239.  
  240.  
  241. You can also get Proxies from HF, here.
  242.  
  243.  
  244.  
  245.  
  246. For Premium and Private SOCKS5, you can search Google. Because the sites I use get down constantly.
Add Comment
Please, Sign In to add comment