Tuesday, December 24, 2013

Hey guys this is my another help full tutorial for peoples who wish to be anonymous in internet.If you are planning to be Black/ Grey/ Green Hat hacker,
then you will be really worried about you anonymity. What
concerns you most have to be "How to stay Anonymous?" .
So here are some methods to stay anonymous. These are
only some basic anonymity techniques and the more
advanced techniques will be lectured in the following
tutorials.


A. VPN

VPN is the acronym of Virtual Private Network. As from a
hacker's point of view, here are the facts that justifies its
need:

1) Counterfeit the lSP's packet detection measures.
Maintain your anonymity and boost by keeping your ISP
from throttling, inspecting and prioritizing the data sent to
and from your system.

2) Keep your IP address anonymous.
Prevent the places your packets are traversing from
identifying your connection information and location.

3) Hide your online activities from third parties.
As a VPN provides a secure tunnel to make a connection
to the outside world, it will keep the third parties away from
finding your online activities.

4) And of-course, prevent location identification and Geo
targeting.
Yeah! the title says it all.
To help you start, below are some of the FREE VPN's that
are available.
Cyberghost http://cyberghostvpn.com/ --> Good for
germany
USA IP http://www.usaip.eu/en/free_vpn.php
Free VPN http://thefreevpn.com/
VPN Tool http://wwwvpntool.com/services.php --> good
US
SecurityKlS http://wwwsecuritykiss.com/sk/index.php
Hotspot Shield http://anchorfree.com/downloads/hotspot-
shield/
ProXPN http://proxpn.com/
Open VPN http://openvpn.net/
Tor VPN https://torvpn.com/information.html
Its Hidden http://itshidden.com/


B. Proxies

Proxies are another less secure alternative for VPN's.
Proxies does the same job as VPN's as it hides your IP
when you are surfing through the internet. There are
different types of proxies ranging from less anonymous to
high anonymous proxies. One thing that you have to keep
in mind is that the proxies will not last for ever. The
available proxy address will change from time to time
(which is a best thing for staying anonymous).
Below are some of the Proxy sites that you can use as a
starting leveler.
http://proxify.com/
http://www.hidemyass.com/
http://hidefromyou.com/
http://proxy6.org/
http://www.httpsurf.com/
http://www.safersurfing.net/
http://unblocked.in/
http://www.proxeasy.com/webclient.aspx
http://newipnow.com/

C. Virtual Machines

I suggest you to use a virtual machine while doing your
stuffs. It is a best way to test your exploits without the pain
of buying a new computer. For White hatters this is a
heaven, because using a Virtual machine to test the
servers(Remote Administration Tools) without the fear of a
breach into your actual working environments. Now a days,
the RATS and ciypting techniques (will be discussed in
RAT and Keyloggers section) became far more advanced in
the favor of Black Hat hackers so that they can bye pass
the Virtual machine environment and actually do their stuff
in the host environments.
Below are some of the Popular VM's that you can use

VMLite - http://www.vmlite.com/index.php?option=c...Itemid=I53

VMWare - https://my.vmware.com/web/vmware/downloads

Virtual Box - https://www.virtualbox.org/wiki/Download


D. Be Easy With Your DOX Info

Another common mistake someone will do is that, he will
put his details like nick name, email address, county etc
on their slaves for the sake of name, You should do it only
if you feel that much confident. As you are reading this
now, I am pretty sure that, you take my word for this. Your
confidence is what I say "Over Confidence". Don't put any
kind of information after you are done. There is a site Fake
Name Generator - http://www.fakenamegenerator.com/
which can help you generate some fake profiles. Believe
me, you can get random profiles with a lots and lot of
information from this site.


E. A Final Word

As I said in the starting of this tutorial, these are only some
basic level Anonymity tools whose service you can make
use of to stay anonymous. These cannot assure 100%
anonymity and if you did something Black Hat stuffs and
when you hear a door knock and see some cops outside
your door, don't blame me

Related Posts:

  • How to create Your Own Keyloger [ Full TUT]When you are done with this tutorial you will be able to Make and Use a keylogger that is close to fully undetectable, without the victim getting suspicious. You will be able to keylog just about anyone.This Guide will be spl… Read More
  • HOW TO SPREAD YOUR SERVER/VIRUS[TUT] HeLLO FRIENDS!Today I will show you how to spread your RAT server to many people in short time!Note - This is my first ever thread on HF please give me some feedback on how it is. ThanksI am assuming you already know how t… Read More
  • How To Create a 100% FUD crypter [TUT] [Noob Friendly] What is a Crypter? Okay before we get into the good stuff, lets first clear up all your questions you have been having by really getting into all the fundamentals of Crypters. Oh and if you have any questions of anything t… Read More
  • How to hack Your School netwok [TUT]hello Huys!here i came again with most wanted trick So, a lot of people here should want to hack his school's network.It can be really easy, and it can be quite difficult if your scholl have actives network administrators.Any… Read More
  • Send free sms anywhere in the world.[No Number need]hello guys!Send free sms anywhere in the world.Easy and fast.It works 100%.If there are many requests may saturate enjoy~~ direct link.. use it wisely..am not responsible any harm you do Click Here to see the link … Read More

0 comments:

Post a Comment

adf popup

adf

MY SKYPE

Powered by Blogger.

Random Posts

Featured Post

Form Grabber Released Works With IE,CROME and FIREFOX ,Unicode support [ 14-02-2016]

Hello guys! here i am releasing My form grabber Today, i have been coding this for oven 6 months and finally its time for public sales.....

Followers

Recent in Culture

News

Lorem 1

Pages

Popular Posts

Popular Posts