Wednesday 15 January 2014

How To protect yourself when doing illegal or blackhat activity.




In this guide, you will learn how to effectively protect yourself when doing illegal or blackhat activity. The Guide Has Been Posted By Cyber Elite.This guide is only for those SERIOUS about blackhat hacking, and not 13 year olds that want to be l33t hackers, who are an insult to the l33t Community .

WHAT YOU WILL NEED:

#1 Cheap, medium power netbook or laptop.

Why is this needed?

Computers have features and information stored on them that would allow government agencies to actively track the source of hacking activity directly to the PC it came from. Although networking, and the internet connection of the machine is also used, the computer itself can be traced.

You won’t need anything major. A medium power I3, 4 gigs of RAM and an intel graphics chip will suffice. Simply go into your local computer hardware store, and browse the machines designed for family or low power use.

#2 Non contract mobile internet.

Why is this needed?

A home, contract connection is a massive vulnerability. Although it can be masked, if the masking is removed, your IP address along with the information your ISP can give that goes with it will be enough for you to be seized.

Mobile internet boxes can be bought without having to supply any personal information. They can be recharged and replaced at any time, and allow you to take your connection with you everywhere you go. Combined with masking software you will be more or less invulnerable from discovery via your connection.

#3 A linux distro that can be booted from a USB or CD (if the machine you buy has a CD drive)

Why is this needed?

Linux is an open source, free operating system favored by almost every hacker. It is completely open platform, and provides none of the downsides associated with semi closed platform operating systems such as Windows and OSX.

#4 Proxies and (or) a VPN.

Why is this needed?

Proxies and VPNs allow masking of the hacker’s IP address. Although you will be using a mobile internet box, if your IP is discovered then you can be geo located.

Both of these will massively slow your internet connection, but are probably the most essential thing listed here.

#5 Truecrypt.

Why is this needed?

Truecrypt is a powerful, free encryption software. Encryption is massively important for a hacker. It allows him to hide his files in containers that are password protected. A good password is 64 characters long and contains a mix of upper and lower case letters, numbers and symbols. A password like this can take tens, sometimes hundreds of years to brute force.

Truecrypt allows encryption of the entire hard drive, requiring a password on boot.

»»»»»> PRO TIPS ««««««««

Always have something to destroy your equipment. If it’s discovered that you’re compromised, you may sometimes only have a few minutes or hours before you’re pulled in. Complete and utter destruction of hardware should always be, even if a last resort, an
option.

Never hack from home. Go to a McDonald’s, starbucks, anywhere, but never from your house. Good luck hackers! I hope you enjoyed my guide, a thanks is appreciated!

Follow The Admin :- https://www.facebook.com/GoGoTheHacker
Blogger :- http://undergroundhackersworld.blogspot.in/
Youtube :- https://www.youtube.com/channel/UChV8z4YOx5OVIMepZhOx19Q
Twitter :- https://twitter.com/UGHackersWorld


No comments:

Post a Comment