macchanger --help
Code: Usage: macchanger [options] device
-h, --help Print this help
-V, --version Print version and exit
-s, --show Print the MAC address and exit
-e, --endding Don't change the vendor bytes
-a, --another Set random vendor MAC of the same kind
-A Set random vendor MAC of any kind
-r, --random Set fully random MAC
-l, --list[=keyword] Print known vendors
-m, --mac=XX:XX:XX:XX:XX:XX Set the MAC XX:XX:XX:XX:XX:XX
ln -s /etc/init.d/script.sh /etc/rcX.d/K10script.sh
hostname imatransvestite
vendorclassid isc-dhclient-V3.1.3:Linux-2.6.32-45-generic-ubuntu:x86
NAME
shred - overwrite a file to hide its contents, and optionally delete it
SYNOPSIS
shred [OPTION]... FILE...
DESCRIPTION
Overwrite the specified FILE(s) repeatedly, in order to make it harder
Usage: shred [OPTION]... FILE...
Overwrite the specified FILE(s) repeatedly, in order to make it harder
for even very expensive hardware probing to recover the data.
Mandatory arguments to long options are mandatory for short options too.
-f, --force change permissions to allow writing if necessary
-n, --iterations=N overwrite N times instead of the default (3)
--random-source=FILE get random bytes from FILE
-s, --size=N shred this many bytes (suffixes like K, M, G accepted)
-u, --remove truncate and remove file after overwriting
-v, --verbose show progress
-x, --exact do not round file sizes up to the next full block;
this is the default for non-regular files
-z, --zero add a final overwrite with zeros to hide shredding
--help display this help and exit
--version output version information and exit
#! /bin/bash
# Truncate all files in /var/log
find /var/log -type f exec sh -c '> "{}"' \;
# Clear any other log files you deem necessary
cat /dev/null > ~/.cache/config/openbox/openbox.log
cat /dev/null > blahblah.txt
shutdown -h now
alias shutdown='/path/to/bash/script/shutdown.sh'
[ProxyList]
# add proxy here ...
# meanwile
# defaults set to "tor"
socks4 127.0.0.1 9050
type host port
socks4 198.10.23.100 80
proxyresolv targethost.com
Going to read this tomorrow - looks very thorough though. Can i ask was OS you're using? Slackware? Arch?
Fucking beautiful tutorial lucid. Its gonna be between this and my sister to keep me anonymous. It's stupid, she just got her degree in computer forensics and shes working for a company that sells church steeples. I don't know anybody that knows networking better than her, and shes sitting behind voip taking phone calls.
Wonderful guide, its quite obvious your browser preference is firefox over chrome :P
for useragent examples:
http://www.user-agents.org/ (http://www.user-agents.org/)
for chrome plugins:
http://downloadsquad.switched.com/2010/11/01/15-google-chrome-extensions-for-better-privacy-control/ (http://downloadsquad.switched.com/2010/11/01/15-google-chrome-extensions-for-better-privacy-control/)
Thanks for the great read! It was very insightful especially for a beginner like me who knows squat about anonymity and hacking. I'm hoping to stick around here and learn as much as possible. ;D Just a question, you say you don't want to speak about Tor in your post, is it bad or..? I'm using Tor with most of the add-ons you spoke of in the post.
I don't like Tor because it's slow for one thing. Not to mention it's very easy to expose who a person is and what they are doing, it's easy to slip and leak some information about yourself. Plus the .onion net isn't as interesting as people make it out to be. Endnodes can sniff and hijack your session. It's no where near a perfect anonymity service. Don't ever use it for any serious hacks or anything like that.
It's alot safer if you use it inside of a VM though. Maybe set up a host/workstation VM and use SSH.
Allright, I understand! Thanks for your input. In your opinion, though, what's the best way to be at least partially anonymous for free, that doesn't involve paying for Proxies or VPNs? Again pardon if my questions are rather dumb as I am quite new to all of this. :)
A great tutorial. Why didn't I see it before?
I guess, because I don't read topics like that as you said yourself, they are almost all boring and exchangeable. I only saw it, because it was nominated for the EZine +1
I don't like Tor because it's slow for one thing. Not to mention it's very easy to expose who a person is and what they are doing, it's easy to slip and leak some information about yourself. Plus the .onion net isn't as interesting as people make it out to be. Endnodes can sniff and hijack your session. It's no where near a perfect anonymity service. Don't ever use it for any serious hacks or anything like that.
It's alot safer if you use it inside of a VM though. Maybe set up a host/workstation VM and use SSH.
, are you aiming at DNS leaks ?
- VMware: I put it inside my encrypted system drive (internally or externally, doesn't matter). So if I see something went wrong, just delete the VM files. You're good to go.
Shredding, on the other hand, probably will.Likely will yes, I believe bleachbit also has some nice functions related to this.
1. Whonix is technically supposed to work out of the box. I'm sure a handful of these tweaks you could apply to whonix but at least you know you don't have to mess with the IP tweaks or anything like that.
2. http://support.microsoft.com/kb/240247 (http://support.microsoft.com/kb/240247). Try that. Keep in mind that you don't want to spoof you vendor class ID to something linux if you are using windows. For windows you are going to have to keep it as some kind of windows otherwise it will be quite obvious that you have spoofed it.
3. Not entirely sure what you mean by that last question. Want to clarify?
I wanted to know if I install a vpn client on host os will it give an extra layer of security to any virual os like whonix? Because I think all network connections through the host is untorrified, and it may leak DNS or IP. So do I need to configure the host as well for complete anonymity?
ifconfig wlan0 up
ifconfig wlan0 up
Logic saves the day yet again.
ifconfig wlan0 up
Logic saves the day yet again.
Gee i dunno.. maybe i tried that -.-... it doesnt work.
Gee i dunno.. maybe i tried that -.-... it doesnt work.
# Tor
why are you refuse to talk about Tor? it is not a secure browser?
# MAC Address
are you think The Live USB OS is really spoof the our MAC? I think it is using the some encryption option and transport with our spoof MAC. but this is only my mind. it correct or wrong? "with Using wireshark
And yes I would also use TOR just to prevent those snooping locals.
8) Enjoyed~Glad you got something out of it. I had created a script awhile back which randomized MAC on startup before DHCP, effectively making it look as though a different client is requesting an IP everytime I connected to said network. Eventually, my router stopped giving me new IP addresses..... lmao.
Me used to write a script that randomize the MAC address of network interface.
You don't talk about tor, but this serious.It amazes me how people adamantly refuse to give up on Tor and move on. Tor is absolutely not necessary for privacy and anonymity, as there are many better options out there. It is flawed in that it's easy to track anyone who exits Tor, and it's heavily watched for obvious reasons. Certainly it has it's uses still, but you are a fool if you think you are even remotely safe on Tor. So please, can we stop insisting that we need to talk about Tor every time the topic of being anonymous is brought up? I've grown tired of hearing about it.
Although I fail to see why this needs to be included in my tutorial about anonymity. If you would like to create a wifi security tutorial be my guest. Certainly it's good to secure your home network, but from an anonymity standpoint, it's better to just not do anything serious from home.
It amazes me how people adamantly refuse to give up on Tor and move onI did not say the opposite.
I contact you further to a configuration of your service(department), here we are, I shall wish i can choose my countries of connections, the problem it is that the function " AvoidCountries " does not work, her as others.
Blabla:
*
*
*
<Configuration>
Only the function "ExcludesNodes" is functional, impossible to relaunch the TOR service
You will have understood him, I look for the anonymity and offshore countries
Even with your "WiFi" ("access point" would be the correct designation here) secured and locked away, if you're using your home connection (the one your ISP assigned to you, the one with YOUR true name associated) you'll never be anonymous.
What?
We imagine that your neighbor crack your WiFi, he can now make a MITM is thus, steal your private data (and know your activities) and... you are not anonymized.
You seem like your are decently knowledgeable, if only I could understand your post better. Although I fail to see why this needs to be included in my tutorial about anonymity. If you would like to create a wifi security tutorial be my guest. Certainly it's good to secure your home network, but from an anonymity standpoint, it's better to just not do anything serious from home.It amazes me how people adamantly refuse to give up on Tor and move on. Tor is absolutely not necessary for privacy and anonymity, as there are many better options out there. It is flawed in that it's easy to track anyone who exits Tor, and it's heavily watched for obvious reasons. Certainly it has it's uses still, but you are a fool if you think you are even remotely safe on Tor. So please, can we stop insisting that we need to talk about Tor every time the topic of being anonymous is brought up? I've grown tired of hearing about it.
On another note, thanks for the feedback at least.
Is there a consensus on I2P's ability to keep users safe, secure, and anonymous?Not yet. Not on this forum at least. I've honestly never used I2P either.
Not yet. Not on this forum at least. I've honestly never used I2P either.
I don't like Tor because it's slow for one thing. Not to mention it's very easy to expose who a person is and what they are doing, it's easy to slip and leak some information about yourself. Plus the .onion net isn't as interesting as people make it out to be. Endnodes can sniff and hijack your session. It's no where near a perfect anonymity service. Don't ever use it for any serious hacks or anything like that.
The feds fund 60% of its budget, it originated as DARPA technology, the exit nodes are best assumed as compromised, most Tor users use 1024-bit RSA/DH keys that the NSA can feasibly crack, the FBI recently made headlines for using a JavaScript exploit to infiltrate onion services, some protocols and poor browser configurations inadvertently leak information and so on.
I'm not saying Tor is a perfect solution to anonymity because I don't think there is one, I just think its the best solution for the majority of use cases. VPN's and proxies are vulnerable to the same problems and introduce new ones.No there certainly is not one you're right. Although anonymity is a lot more then just using either a VPN, a proxy, or Tor. The most effective ways are ways that are rarely talked about in public, or on the public internet. Every search you make on Google about being anonymous will tell you to use either a proxy, Tor, or a VPN. It would be silly to think that all the ways of being anonymous that exist could be found on Ask.com
Being anonymous only means you have something to hide.
That there... That is why the human race is fucked.That there.... That is why the human race has a slight chance of at least not being fucked as a whole.
Being anonymous only means you have something to hide.If you really got nothing to hide (from whoever), you seriously are some boring fuck of a human being, lol.
What about RDP (remote desktop protocol)? I think this is a good way to hide make you a shadow. - VPS with Windows / Linux (not PC). This is a good tutorial.