I haven't seen some anonymity tutorials out there except the sticky, so I decided to create an updated guide for newbies out there. I'm not an expert on this field, but I want to share my knowledge to the other members.
Guide to Anonymity, Security and Anti-Forensics
So, you want to be secure and anonymous online, prevent threats and leave no traces? well, this is a comprehensive guide to anonymity and security on your computer and when surfing the internet. Alongside with the other tutorials, this one is effective, and I will try to keep it understandable. Please continue reading and I hope you might find this useful.
Online AnonymityHiding online identity and anonymity is essential; because it prevents you from getting traced or tracked down.
ProxiesProxies are used mainly for security purposes and IP Address, it may be also used to speed up the loading of resources by caching, bypass parental controls and open blocked sites.
Proxy address switcher:
http://www.eliteproxyswitcher.com/EPS_setup.exeFree working proxy server list (Updated realtime):
http://hidemyass.com/proxy-list/Web ProxiesWeb Proxies are services that provides proxy access using a website, the function is, when you request a webpage, the server will contact the website indirectly and will server the resource to your web browser.
Free Web Proxies:
http://zfreez.com/http://vtunnel.com/http://zendproxy.com/http://4freeproxy.com/http://boomproxy.com/http://www.webproxy.ca/http://webproxy.stealthy.co/http://kproxy.com/http://anonymouse.org/VPNsVPNs are similar to proxies, it hides your IP address but the advantage is, it encrypts your traffic so that it would not be intercepted by data sniffing tools, it is useful for public wifi hotspots and for home/office use.
Free VPNs:
Spotflux -
http://spotflux.com/HotSpotShield -
http://hotspotshield.com/Paid VPNs:
ExpressVPN -
http://expressvpn.com/HotSpotShield Elite -
http://hsselite.com/User-Agent Switcher
Spoofs and mimics a user-agent to hide the browsers' identification.
Chrome -
https://chrome.google.com/webstore/detail/user-agent-switcher-for-c/djflhoibgkdhkhhcedjiklpkjnoahfmgFirefox -
https://addons.mozilla.org/en-US/firefox/addon/user-agent-switcher/IPFuck/IPFlood
Used for hiding IP address by using multiple proxies simultaneously, which obfuscates the user's IP address.
Chrome -
https://chrome.google.com/webstore/detail/ipfuck/bjgmbpodpcgmnpfjmigcckcjfldcicndFirefox -
https://addons.mozilla.org/en-us/firefox/addon/ipflood/SecurityGetting secured and safe while on the computer is very important, and also the pattern of getting infected is not that pathetic, atleast you can prevent it by following different measures.
Disk EncryptionDisk encryption is a way of encrypting HDD so that the private files won't be breached,
the data won't be readable due to protection; and cannot be decrypted easily without authorization.
TrueCrypt Disk Encryption Software:
http://www.truecrypt.orgAntivirus, AntiMalware, AntiKeyloggers and FirewallsAntiviruses and Antimalware are a great boon these days, it protects your computer against viruses and other malicious software.
Free Antivirus:
http://avast.com/Free AntiMalwares:
http://malwarebytes.org/http://superantispyware.com/Free Virus Removal Tools:
http://www.softpedia.com/get/Antivirus/Kaspersky-Virus-Removal-Tool.shtmlhttp://www.bitdefender.com/free-virus-removal/http://www.microsoft.com/security/pc-security/malware-removal.aspxFree Antikeylogger:
http://www.aplin.com.au/neos-safekeys-v3...s-v3-workshttp://networkintercept.com/vrkeyboard.htmlFree Firewall:
http://personalfirewall.comodo.com/http://www.zonealarm.com/security/en-us/zonealarm-pc-security-free-firewall.htmWindows Firewall (Windows XP/7 built-in)
Paid AVs and AMs:
http://kaspersky.com/http://bitdefender.com/Online Malware-scanning tools:
http://camas.comodo.com/http://virustotal.com/https://mwanalysis.org/http://anubis.iseclab.org/http://bleepingcomputer.com/startups/http://malwr.com/http://minotauranalysis.com/http://onlinescan.avast.com/http://www.isthisfilesafe.com/http://online.us.drweb.com/http://vxvault.siri-urz.net/ViriList.phpAnti-ForensicsAnti-forensics, is basically a method to make it hard to recover data, secure deletion and system wiping to stay out of privacy and security breaches.
Anti-forensic toolsCCleaner -
http://piriform.com/CCleaner can clear browsing history/cache/cookies, temporary system files, windows log files, DNS cache, IIS log and other files.
BCWipe -
http://www.jetico.com/wiping-bcwipe/BCWipe uses military-grade procedures to remove any traces of file, BCWipe complies with U.S. Department of Defense (DoD 5220.22-M), U.S. Department of Energy (DoE M 205.1-2) and other deletion standards.
BleachBit -
http://bleachbit.sourceforge.net/BleachBit quickly frees disk space and tirelessly guards your privacy. Free cache, delete cookies, clear Internet history, shred temporary files, delete logs, and discard junk you didn't know was there.
Eraser -
http://eraser.heidi.ie/Eraser is an advanced security tool for Windows which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns.
Windows Anti-Forensics Guide[1.2 GB, 3hrs and 7 mins] -
DL VID |
PDF DLYoutube:
http://www.youtube.com/watch?v=YxlSqvIpq5wMore:
http://www.irongeek.com/i.php?page=security/windows-forensics-registry-and-file-system-spotsCheck your anonymity onlinehttps://panopticlick.eff.org/index.phphttp://browserspy.dk/headers.phphttp://stayinvisible.com/Anonymity Tips1. Do not post private information in the web, including your address, birthdate and contact info, including on your registration details, if the authorities found one, they will use it to track you.
2. Do not engange private activities while on public places, other people might see you.
3. Always use anonymity tools so your IP address is masked, if in case they found it out, the IP is fake.
4. Do not brag or talk about hacking, obviously, if you brag/talk about it with your friends, they might report you to the police.
5. Hide your files in an encrypted container, encrypting data on the USB is better.
6. Always use SSL when its available; it encrypts your details so that it would be safe.
7. Use SSH (Secure Shell) when connecting to a remote system, one good example is PuTTy.
8. A quote of the game "Hitman": "Never trust anyone; and rely on your instincts."
9. Try "proxy chaining", or using of multiple proxies.
10. Use a VPN together with a high-anonymity proxy so that there would be an increased privacy advantage.
If you're caught1. Do not panic, always be calm. never say anything suspicious when the cops are inspecting your computer.
2. If you store your files in a removable drive, hide and take it away off the scene (make sure they wouldn't see).
Written by: Rapture
Website:
http://www.afflictionx.comOther references:
http://www.evilzone.org,
https://websiteanalystsresource.wordpress.com/2012/08/19/list-of-tools-and-their-use/, IronGeek, Fur, 0poitr
end-notes:
-If you want to copy this guide, leave the author information below.
-It took me several hours to finish this tutorial, a simple thank you and a feedback would be very appreciated.