Wednesday, July 5, 2017
Stay Anonymous and Secure Online Offline
Stay Anonymous and Secure Online Offline
Offline Protection
Note : In this part, offline protection refers to protecting your computer from viruses, Trojans, root kits, etc. It may also refer to encryption, such as File Encryption, OS protection, and such. It is very important to protect your files because we cant always trust the ways of Online Anonymity. If it goes wrong, our offline protection should save us. Trojans and viruses remain a great challenge to our Anonymity. There are always Trojans around and if we get infected, the attacker may use our machine as a proxy, and has full control on our machines.
Protect yourself from Malware
Malwarebytes Anti-Malware
Malwarebytes Anti-Malware (MBAM) is a computer application that finds and removes malware. Made by Malwarebytes Corporation
More and download
Encrypt your Keystrokes using KeyScrambler
KeyScrambler
KeyScrambler is an anti-keylogging program designed specifically to strengthen your PC security.
More and download
Get a Firewall
COMODO firewall
It is always recommended to use a Firewall when doing hacking. I recommend Comodo Firewall. COMODO firewall is Award-Winning personal firewall software on Internet.
Download here
Protect your files and OS using True Crypt.
TrueCrypt
TrueCrypt is a free open-source disk encryption software for Windows 7/Vista/XP, Mac OS X, and Linux.
Source and more: http://www.truecrypt.org/
Download here
Use Virtual Machines for hacking (VMWare Player)
VMWare Player
It is always a good idea on hacking from a VM (Virtual Machine) because if anything goes wrong just delete it using a good file eraser.
Source and more : https://www.vmware.com/products/desktop_...rview.html
Download Here
Deepfreeze your PC to prevent common attacks
DeepFreeze
Faronics Deep Freeze makes your PC indestructible. It protects your computer by freezing its original configuration, which prevents unwelcome or unwanted changes made while in-session from sticking. With a simple restore-to-reboot, your system integrity is maintained helping your machines to run smoothly and efficiently giving you more up-time and boosting user productivity.
Source and more : http://www.faronics.com/en-uk/enterprise...e_en-uk-2/
Download Here
Spoof your Mac Address using TMAC
TMAC
Technitium MAC Address Changer allows you to change (spoof) Media Access Control (MAC) Address of your Network Interface Card (NIC) irrespective to your NIC manufacturer or its driver. It has a very simple user interface and provides ample information regarding each NIC in the machine.
Source and more : http://www.technitium.com/tmac/index.html
Download here
Use CCleaner, the multi-purpose tool
CCleaner
Cleaner is a multi-purpose tool which can be used for deleting files, clearing temp files, cache, etc.
Source and more : http://www.piriform.com/ccleaner/
Download here
Clear the evil cookies
Flash Cookie Remover
Flash cookies are evil because they persist even if you delete your browsers cookies. They are stored separately from normal site cookies and therefore need a special tool to delete them.
Source and more : http://www.trojanhunter.com/flash-cookie-remover/
Download here
Other tips : Dont think that using Linux or Mac cant get you viruses. There are also malware that works on this Operating Systems. Malware programmers dont feel the need to write malware for this OSs since they are not used by many people.
Online Protection
Now we are moving to Online Protection. As you know, this is very important also more than Offline Protection. Common methods of Online protection are discussed below.
Types of Online Protection
- VPN(s)
- Proxies
- Tor
- SSH Tunneling
VPN (Virtual Private Network)
A virtual private network (VPN) is a network that uses primarily public telecommunication infrastructure, such as the Internet, to provide remote offices or traveling users access to a central organizational network.
VPN provides us a secure way of connecting to websites by hiding our IP and encrypting our information.
Source and more : http://en.wikipedia.org/wiki/Virtual_private_network
Free VPNs
- Cyberghost
- HotSpot Shield
- Pro XPN
- Open VPN
Paid VPNs
- nVPN
- SwissVPN
HTTP Proxies and SOCKS5
Get Proxy lists from this sites.
- Alive Proxy
- Hide My Ass
- Proxy list
For Premium and Private SOCKS5, you can search Google. Because the sites I use get down constantly.
Some Proxy sites
http://www.ninjacloak.com
http://www.hidemyass.com
http://go-between.me
http://ir2.me
http://rapidsurf.info
http://go-between.me
http://ir2.me
http://rapidsurf.info
http://yourownproxy.info
http://proxy.co.cc
http://iknownothing.org
http://accessyouth.info
http://buwk.com
http://UnblockFree.net
http://hillofbeans.biz
http://aptunnel.com
http://goaheadmakemyday.org
http://lameproxy.info
http://centerfoldproxy.info
http://proxylist.co
http://sneaky9.com
http://freesurfproxy.com
http://goflyakite.org
http://fastieproxy.com
http://ihaveacunningplan.info
http://schoolfreezone.com
http://proxify.net
http://passmethru.com
http://proxy2use.com
http://0001.cz.cc
http://www.hidemyass.com
http://go-between.me
http://ir2.me
http://rapidsurf.info
http://go-between.me
http://ir2.me
http://rapidsurf.info
http://yourownproxy.info
http://proxy.co.cc
http://iknownothing.org
http://accessyouth.info
http://buwk.com
http://UnblockFree.net
http://hillofbeans.biz
http://aptunnel.com
http://goaheadmakemyday.org
http://lameproxy.info
http://centerfoldproxy.info
http://proxylist.co
http://sneaky9.com
http://freesurfproxy.com
http://goflyakite.org
http://fastieproxy.com
http://ihaveacunningplan.info
http://schoolfreezone.com
http://proxify.net
http://passmethru.com
http://proxy2use.com
http://0001.cz.cc
Use Tor for secure browsing
Tor
Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis
Source and more : https://www.torproject.org/about/overview.html.en
SSH Tunneling
Things you will need for SSH Tunneling
- PuTTy
- Firefox (Preferred)
- Open PuTTY
- Enter your IP on the Hostname or IP Address text box
- To find your IP, you can use Command Prompt. Just type ipconfig and click Enter.
- Now to the left of PuTTy, you will see a list.
- Click the + symbol of SSH.
- From the drop down, click Tunnels
- You need to input a port and the click "Dynamic".
- Now click Add and open the connection. You will be connected.
- Now in your browser proxy settings, type 127.0.0.1 for IP and the selected port for port.
- Thats it. It is done!!
Get link for download