1
Anonymity and Privacy / Re: Linux Anonymity
« on: May 17, 2015, 05:14:20 am »The wiping sounds hard for the disk...Not so bad for regular platter HDD, but it will wreck an SSD pretty quick.
Correct me if it's wrong.
Kind regards
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
The wiping sounds hard for the disk...Not so bad for regular platter HDD, but it will wreck an SSD pretty quick.
Correct me if it's wrong.
Kind regards
This is what worries me a bit, because my main intent of using Archlinux is to set up my computer for Anonymity. Then try to follow some tutorials on how to hack, I will most likely experiment from something simple like my own network. But i really need to get the anonymity step right otherwise by first try could by my last.You're choosing the wrong distro. Arch linux is only a good foundation if you know how to build the system you want already.
I sense a great power here. Thousands of posts, hundreds of cookies and words full of wisdom. (bow) Thank you, master. Apologies for my worthless thread. And may the force be with you always.
haha, you misunderstand me.Oooh... Gotcha... I feel that way too when I do things I shouldn't be doing, it's called guilt. But I don't do anything shady on tor... infact the only time I don't use tor is when I'm doing something shady (or i need the speed bump).
What i am saying is that it is a psychological feeling of unease whenever i use Tor no matter how illogical it may be.
It has been drawing way too much attention for years now and has been both a love hate relationship for LE.Says the guy who frequents on open hack forum. Do you really think you're not already on several watch lists?
I do not feel safe using something that has a big huge fat target on its back.
So, I've targeted a site, and have penetrated it using an error based SQLI.The admin username and password have been obtained, although the password seems to be encrypted in some weird hash like form that I have not seen before.
The hash is this - qw7mmXe2w/qkIpdX.9Gxe/
Thanks in advance (and sorry in advance is this is the noobiest shit you've ever seen),
@nonytan
I mean that i would not trust Tor.Why?
Hi,
i just install the lastest linux mint debian edition betsy . Well i'am Planning to customized it to be able to use it as my Daily use distro and also i'am Planning to installing Pentest tool on it so that i can build out a personal set in my laptop
And i wonder any good website where i could download these set Manually ? i mean Pentesting tool
Too much Tor for my taste but its a nice idea...And what do you mean by that?
I've been reading about how it was recently discovered that your true IP/location can be discerned by a server using the "STUN" request in browsers and apps which can open up browser windows. If this is true than VPNs are essentially useless now, right? Could anyone educate me on this please?
thanks
I hear they had to cut the competition short last time, people started to collaborate too much :/All you ever hear about Cicada is "what people hear about Cicada".
Hello i was wondering what programming langauge is best for coding exploits.For general scripting python is awesome, easy to use and expand on. But it's a higher level language.
I know this is probably asked alot but people say one thing then another all the time
I know that python is great for coding hacking tools but for 0day exploits its all right was just wondering
if there was another thanks and sorry for the short thread.
VGhpcyBpcyBvbmx5IHRoZSBmaXJzdCBzdGVwIG9mIGEgam91cm5leSBvZiBhIHRob3VzYW5kIG1pbGVzLiBBcmUgeW91IHJlYWR5IHBsYXllciBvbmU/DQo=
Virtual HUMINTâ„¢ is a unique methodology pioneered by Terrogence for use over virtual web-platforms to gain trust, form connections and ultimately collect valuable intelligence from entities of interest in virtual cyberspace.
Much like a traditional intelligence agency might recruit and operate live human assets in physical spaces in order to obtain information, Terrogence specializes in cultivating and operating virtual identities in online spaces, that act and access social media platforms like a natural netizen – a citizen of the internet.
I like this option and it is pretty close to the way I deal with people I dont want to talk, see a questionable motherfucker walking across the street towards me? Get the gun(whatever it happens to be) out of the backseat or trunk of my car and walk inside, he is NOT gonna follow you, he doesnt know its not loaded. (Assuming we're following the law here).
That being said, one thing, If I see someone shoulder carrying a long arm there's an instant assumption of "has no idea what he's doing" since it is literally the worst way to carry a firearm and any safety instructor worth his salt would smack the shit out of you for doing so. Not saying thats the case here and its probably just because the gun is unloaded that you don't care about safer carries but it's still worth considering. I'd just be more wary of someone whom I felt was in total control and at total ease with the rifle/shotgun. (obviously lots goes into that, the carry type is just the only thing in the post)
But I'm also not a criminal, and I also grew up handling firearms about as often as tonka trucks (for legal reasons) so I might be the wrong person to comment on the mentality of some street thug whose gonna be casing a place.
@Deque, you seem to have the same issue lots of people have where they are too polite. Gotta learn to just say "no, leave" or "no you may not come in" right off the bat rather than listening for the sake of being polite.