Ethical Experts
Ethical Experts

A Community Dedicated to Helping and Learning . Here You Will Get Hacking Tutorials and Monetizing Methods . We Hope You Have a Pleasant Stay
HomeHome  SearchSearch  FAQFAQ  RegisterRegister  Log in  
Still Currently working on the forum design, until I find a perfect design that can sit there for the whole life :p .. Please Bare with us if you see the design change while / after you refresh a page or return ! Sorry for the Inconvenience ~!

Display results as :
Rechercher Advanced Search
Latest topics
» Hack Pack : Largest Hacking Tools Collection
Tue Apr 28, 2015 9:35 am by THE-OUTSIDER

» Hi everyone!
Fri Nov 07, 2014 11:24 pm by zekrum

» Hacking Email ID's
Thu Sep 25, 2014 7:22 pm by NAVEEN KUMAR . S

» entering in a computer binary
Sat Sep 20, 2014 1:29 pm by erosh23

» hi hackers
Sat Sep 20, 2014 1:26 pm by erosh23

» Introduce Yourself !
Sat Sep 20, 2014 1:23 pm by erosh23

» Hello guys
Wed Jul 30, 2014 10:52 pm by RZero67

» need botnet like zues Betabot or any good botnet files please admin help me
Fri Jul 25, 2014 9:44 pm by sire_roktiv

» Extension Spoofer v0.1 [Beta Release]
Fri Jul 11, 2014 9:33 am by The Joker

Most Viewed Topics
Hack Pack : Largest Hacking Tools Collection
Hack Your BroadBand !! RISK FREE !!
How to Hack the Windows Admin Password Using OphCrack in Backtrack tutorial
Hacking With Keyloggers Prorat
How to Get Unlimited time in an Internet Cafe ... :D
How to Hack Websites & Servers - Tutorial
Cracking a WPA/WPA-2 Password.. ;)
Backtrack and Facebook
Credit Card Generating Sequence
wifi LARGEST hack netcat
Facebook Like
Similar topics

Share | 

 Staying Secure and Anon

Go down 
The Joker

Posts : 182
Join date : 2012-06-11
Age : 27

PostSubject: Staying Secure and Anon   Sun Jan 06, 2013 1:14 pm

Hello, In this tutorial, I will demonstrate various ways on how to remain anonymous on the Internet. Privacy is a must, in today's world. Currently, there are a lot of crimes going on, such as Swatting, Doxing etc. When our identity gets leaked, it is a big loss for us and it is somewhat one of the big mistakes of our lives. Which is why, staying secure, and anonymous online is essential.

This tutorial is about two types of protection.

1. Online Protection
2. Offline Protection

Note : In this part, offline protection refers to protecting your computer from viruses, Trojans, root kits, etc. It may also refer to encryption, such as File Encryption, OS protection, and such. It is very important to protect your files because we can't always trust the ways of Online Anonymity. If it goes wrong, our offline protection should save us. Trojans and viruses remain a great challenge to our Anonymity. There are always Trojans around and if we get infected, the attacker may use our machine as a proxy, and has full control on our machines.

1. Protecting yourself from malwares
2. Encrypting keystrokes from keyloggers
3. Using a Firewall
4. Protect your Files and OS by encryption
5. Using Virtual Machines For Hacking
6. Deepfreeze your PC to prevent common attacks
7. Spoof your Mac Address using TMAC
8. Use CCleaner, the multi-purpose tool

Quote :
Don't think that using Linux or Mac can't get you viruses. There are also malware that works on this Operating Systems. Malware programmers don't feel the need to write malware for this OSs since they are not used by many people.


Now we are moving to Online Protection. As you know, this is very important also more than Offline Protection. Common methods of Online protection are discussed below.

Types of Online Protection

1. VPN(s)
2. Proxies
3. Tor
4. SSH Tunneling

VPN (Virtual Private Network)

A virtual private network (VPN) is a network that uses primarily public telecommunication infrastructure, such as the Internet, to provide remote offices or traveling users access to a central organizational network.

VPN provides us a secure way of connecting to websites by hiding our IP and encrypting our information.

Source and more :

List Of Free VPN's

1. Cyber Ghost VPN (referral Link)
2. Hostspot Shield
3. Expat Shield
4. ProXPN

HTTP Proxies and Socks

1. Alive Proxy
2. Hide my Ass
3. Proxy List

More Here

Use Tor for secure browsing


Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis

Source and more :

SSH Tunneling

Things you will need for SSH Tunneling

1. Putty
2. Firefox (preferable)

How to perform SSH tunneling

1. Open PuTTY
2. Enter your IP on the Hostname or IP Address text box
3. To find your IP, you can use Command Prompt. Just type ipconfig and click Enter.
4. Now to the left of PuTTy, you will see a list.
5. Click the '+' symbol of SSH.
6. From the drop down, click Tunnels
7. You need to input a port and the click "Dynamic".
8. Now click Add and open the connection. You will be connected.
9.Now in your browser proxy settings, type for IP and the selected port for port.
10. That's it. It is done!!

Do NOT PM me until you are DONATING or Your Upgrade  hasn't been completed even after you have purchased it .
If is one of the above, you can either choose to PM or mail me ..
Back to top Go down
View user profile
Staying Secure and Anon
Back to top 
Page 1 of 1
 Similar topics
» Staying Equal
» How to Secure Your Text Messages

Permissions in this forum:You cannot reply to topics in this forum
Ethical Experts :: Hacking Section :: Hacking Tutorials-
Jump to: