Login Register






The stories and information posted here are artistic works of fiction and falsehood. Only a fool would take anything posted here as fact.
Thread Rating:
  • 0 Vote(s) - 0 Average
Thread Closed 


Tutorial What one hacker should have and should not have. filter_list
Author
Message
RE: What one hacker should have and should not have. #11
(12-22-2012, 09:40 PM)Synchro Wrote:
(12-22-2012, 09:29 PM)Kinanizer Wrote:
(12-22-2012, 09:23 PM)The Protagonist Wrote: Social Networks are not fine. If you share your email somewhere then I can just search that email on Facebook and I have your account right there in front of me. If you do wish to use a social network turn up your privacy settings and security goddammit.

Or you can use a different email for your hacking and social life.

Yes but a lot of hackers don't do it and there are other ways to find account in social network for example if he look on the wall and the hacker have post something with him name for example.

Well don't make a FB for your hacker alias. It will be very hard to DOX someone who made an email just for this forum and their keylogger. Then of course don't make your wall public.


RE: What one hacker should have and should not have. #12
If you use an email for multiple things, you should not be considering yourself a hacker, and if you use the same email for illegal activity and personal details, you deserve to be arrested.

As for the proxy argument, the fact that you think that chaining proxies willy nilly will somehow increase operation security shows just how little you know.


RE: What one hacker should have and should not have. #13
(12-23-2012, 08:33 AM)w00t Wrote: If you use an email for multiple things, you should not be considering yourself a hacker, and if you use the same email for illegal activity and personal details, you deserve to be arrested.

As for the proxy argument, the fact that you think that chaining proxies willy nilly will somehow increase operation security shows just how little you know.

This will be enough for BTC transfer I don't say that this will protect you, but there isn't something illegal in transferring money right ?


RE: What one hacker should have and should not have. #14
If there's nothing illegal about the money you're transferring, why not just do bank wires?


RE: What one hacker should have and should not have. #15
(12-23-2012, 08:46 PM)w00t Wrote: If there's nothing illegal about the money you're transferring, why not just do bank wires?

Because they don't keep logs for a long of time and if the hacker get caught, it will be hard to get you in trouble too.


RE: What one hacker should have and should not have. #16
Bitcoin has permanent logs, and as I said are simply traced.


RE: What one hacker should have and should not have. #17
Great tutorial, read the whole thing!

Love it.


RE: What one hacker should have and should not have. #18
I use proxies for torrenting, however have never had luck setting up Skype proxies. They simply haven't worked..
[Image: GMVc3.png]


RE: What one hacker should have and should not have. #19
(12-27-2012, 05:52 AM)Phoenix Wrote: I use proxies for torrenting, however have never had luck setting up Skype proxies. They simply haven't worked..

Have you try with Proxifier ?


RE: What one hacker should have and should not have. #20
(12-21-2012, 08:33 PM)Synchro Wrote: Alot of VPNs keep logs almost every VPN keep logs because they are induced to keep them from federal agancy.

Not all VPNs are located in USA, and there are many countries with laws that explicitelly prohibit keeping logs. Use a non-US located VPN, like http://cloudnymous.com and a proxy in another country, this way at least there will be much more bureaucratic work to be done by an agency to get the logs.








Users browsing this thread: 4 Guest(s)