How-To Be Anonymous 11-23-2014, 06:11 AM
#1
How-To Be Anonymous by Master Antrax
NOT Like The Hackers.
Introduction to Anonymity
Spoiler:
What is being anonymous on the web? Well the main part of it is protecting your IP(Internet Protocol). You do this using proxies. Also being anonymous is also not only proxies but VPNs(Virtual Private Network). Both a VPN and a proxy are very important tools in being anonymous. But lets not forget the homefront. Our computer itself! You might be thinking how do I be anonymous on MY computer. Well being anonymous on YOUR computer is doing things like protecting yourself from keyloggers. Keyloggers are basically used to log your key presses. You will learn how to protect from this threat in this tutorial, too. So lets get started! ![Smile Smile](https://sinister.ly/images/smilies/set/smile.png)
![Smile Smile](https://sinister.ly/images/smilies/set/smile.png)
Hiding IP
Spoiler:
In this tutorial there are 2 tools we will use to hide our IP. These 2 tools are Tor Browser, and Cyber Ghost 5. You can use one or the other, or both at once. Which ever one you perfer. We will start with Tor Browser:
After you download and install Tor open it and you will get a window like this:
![[Image: init.png]](http://static.thegeekdaily.com/wp-content/uploads/2012/06/init.png)
After that you will be at the Tor startup page:
![[Image: images?q=tbn:ANd9GcT9iW54fc6UksN74zJVG1l...4zYYXQiuBd]](http://t1.gstatic.com/images?q=tbn:ANd9GcT9iW54fc6UksN74zJVG1lSyHlDGMDev1QMCEYtFl0LfMbP9W4zYYXQiuBd)
Now your IP is protected:
Now we will install Cyber Ghost:
Really there is not much need to use both. To wrap this up I will briefly explain the difference between the 2(Cyber Ghost, Tor)
Cyber Ghost: Uses 1 Proxy, Faster
Tor: Chain Proxies, Slower
That is the difference between Tor and Cyber Ghost. Tor chains proxies together, so it is harder to trace, even though it would be severely hard to get past 1 proxy.
Spoiler:
Spoiler:
Spoiler:
![[Image: init.png]](http://static.thegeekdaily.com/wp-content/uploads/2012/06/init.png)
Spoiler:
Spoiler:
NOTE: YOUR IP MAY BE DIFFERENT
![[Image: images?q=tbn:ANd9GcTlL4LrHvj1JQtzxWT3I4P...2GAIcG9oeQ]](https://encrypted-tbn3.gstatic.com/images?q=tbn:ANd9GcTlL4LrHvj1JQtzxWT3I4PEO4GlR1gYqb6-pWAc-dYUT0X8B2GAIcG9oeQ)
Spoiler:
You can download Cyber Ghost from HERE:
![[Image: ?di=14141671620213]](http://www.imagesup.net/?di=14141671620213)
When you open it, let it load and then click this button:
![[Image: ?di=914167163327]](http://www.imagesup.net/?di=914167163327)
Wait for it and it will give you a proxy. In my experience these proxies are FAST! If you want even faster proxies you can upgrade to premium for $19.99/year!
Spoiler:
Spoiler:
Cyber Ghost: Uses 1 Proxy, Faster
Tor: Chain Proxies, Slower
That is the difference between Tor and Cyber Ghost. Tor chains proxies together, so it is harder to trace, even though it would be severely hard to get past 1 proxy.
Defending Against Keyloggers
Spoiler:
This seems complicated, but it is very simple. All you need is 1 just ONE program. 1 program? Yes! Are you sure 2 pineapples won't work? Yes. Now please bring your stupidity somewhere else, jk. ![Smile Smile](https://sinister.ly/images/smilies/set/smile.png)
Ok but the only program you need is a program called KeyScrambler. You can obtain this from HERE. This is how the preogram works:
![[Image: ?di=11141671744814]](http://www.imagesup.net/?di=11141671744814)
Basically it encrypts your keystrokes, so lets say I type 'Hello World!' the keylogger may see it as 'a7pu2 ad24rp'. Therefore your passwords are safe! Unless they steal them from Chrome or FileZilla, etc. from their own programs files. Other than that your safe.
![Smile Smile](https://sinister.ly/images/smilies/set/smile.png)
Ok but the only program you need is a program called KeyScrambler. You can obtain this from HERE. This is how the preogram works:
Spoiler:
Anti-Fingerprinting
Spoiler:
Anti-fingerprinting I believe is not well recognized. Well enough as it should be, it is yet another one of things that help in your anonymity on the web. It does not work as well as Proxies, and VPNs, but it still helps. This also helps prevent RATs, and other tools from stealing your private data. Moving on, the first tool we will be using is TrueCrypt. This will encrypt your harddrive where only the people who have the password can get it. This can be replaced by bitlocker(comes defaultly installed on some machines). You can see if you have bitlocker installed by just searching bitlocker in Windows search bar. If not get true crypt from HERE. I would suggest using bitlocker though if you have it. You can use that to encrypt your hard drive. If that does not work for you then you can use other tools, too. There is just one last thing I would like to share on this topic. This is probably used by A LOT of people and they don't even realize they're doing it. It is using VMs. Yes VMs. Since the VM is in its own virtual state a virus cannot get to your physical computer. Now to make a VM is pretty simple you can look up an iso download for an os like Ubuntu and download that. Then go download VirtualBox or VMWare, it is your choice which one you choose. *psst I honestly like VMWare better, but what do I know?
Well that wraps this tutorial up. I hope you have enjoyed it, and remember to leave feedback. I love some feedback... Ok well I hope you enjoyed it,
Master Antrax
![Smile Smile](https://sinister.ly/images/smilies/set/smile.png)
Have Fun Being Anonymous!