Jump to content

Search the Community

Showing results for tags 'vpn'.

The search index is currently processing. Current results may not be complete.
  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Informatii generale
    • Anunturi importante
    • Bine ai venit
    • Proiecte RST
  • Sectiunea tehnica
    • Exploituri
    • Challenges (CTF)
    • Bug Bounty
    • Programare
    • Securitate web
    • Reverse engineering & exploit development
    • Mobile security
    • Sisteme de operare si discutii hardware
    • Electronica
    • Wireless Pentesting
    • Black SEO & monetizare
  • Tutoriale
    • Tutoriale in romana
    • Tutoriale in engleza
    • Tutoriale video
  • Programe
    • Programe hacking
    • Programe securitate
    • Programe utile
    • Free stuff
  • Discutii generale
    • RST Market
    • Off-topic
    • Discutii incepatori
    • Stiri securitate
    • Linkuri
    • Cosul de gunoi
  • Club Test's Topics
  • Clubul saraciei absolute's Topics
  • Chernobyl Hackers's Topics
  • Programming & Fun's Jokes / Funny pictures (programming related!)
  • Programming & Fun's Programming
  • Programming & Fun's Programming challenges
  • Bani pă net's Topics
  • Cumparaturi online's Topics
  • Web Development's Forum
  • 3D Print's Topics

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start



Website URL










  1. It’s been a few months since I’ve sat down to put write something. I’ve been taking a break trying to pick up some woodworking skills and spend a bit more time with the family during this COVID-19 lockdown. On March 5, I left work to take a week off for Spring Break and never returned to the office. Today is May 5. I wasn’t prepared for being at home and since I don’t regularly work from home, I don’t have any hardware here other than a normal desk setup. At the office, we have a build lab and I have access to numerous hardware models that I can test with. At home, I just have my company-issued laptop and a VPN connection, which is generally fine for the few days per month that I’m actually working from home. We have a VMWare build farm as well where I generally do most of my image builds and testing unless I need to test drivers or other device specific things. One thing that our VMWare farm doesn’t have is direct internet access – we only have a business network VLAN, which makes it impossible to test VPN-related things (split-tunneling, Cloud Management Gateway, internet-only clients, etc.). More on Split-Tunneling and Microsoft Updates from ConfigMgr here from @RobDotYork and @MikeTerrill https://techcommunity.microsoft.com/t5/configuration-manager-blog/managing-remote-machines-with-cloud-management-gateway-in/ba-p/1233895 https://techcommunity.microsoft.com/t5/configuration-manager-blog/managing-patch-tuesday-with-configuration-manager-in-a-remote/ba-p/1269444 https://miketerrill.net/2020/03/18/forcing-configuration-manager-vpn-clients-to-get-patches-from-microsoft-update/ The Problem So here I am, stuck at home, with a mandate from management to get split-tunneling working to reduce VPN bandwidth for Microsoft Updates, with no way to test other than my primary device – which is never fun to do. So I started thinking. I had just spun up Hyper-V to build a new ConfigMgr lab for some Intune testing so I decided to see if I could somehow use build a new VM to our standards that I could test VPN on. The semi-obvious answer would be to use AutoPilot, except I would need line-of-sight to the domain controller for hybrid-join to work and we are just beginning to get Intune configured in production (see note about lab build above…). Our VPN client requires user domain credentials and a valid computer certificate issued from our CA in order to connect. The domain credentials are easy, the client certificate, not so much. So I started playing around with DJOIN and had a breakthrough. I’ve never needed to use DJOIN so this was a cool learning experience for me. So if you want to see what I was able to do, keep reading. The Plan Here are the steps I’ll be going through: Use DJOIN on Domain Joined device to create offline join blob Use DJOIN to “install” the offline blob on a new clean VM Install the company VPN client Install the ConfigMgr client Run our standard OSD Task Sequence in Apps-Only mode to standardize the VM DJOIN Provision If you’ve ever looked at logs during OSD, you’ve likely seen references to DJOIN – that’s pretty much where my experience with DJOIN ends. SetupAct.Log from the Panther folder As I started playing with it I discovered that it is a very powerful tool capable of not only creating an offline domain joined object, but you can specify the OU, certificate template and more. It was like finding a Swiss Army Knife while on a desert island. You can read more about DJOIN here https://docs.microsoft.com/en-us/previous-vhttps://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/ff793312(v=ws.11)ersions/windows/it-pro/windows-server-2012-r2-and-2012/ff793312(v=ws.11) You can look up the parameter info on the link above, but essentially this command line will do the following: /PROVISION /DOMAIN – Join the domain /MACHINE – Specify the device name /MACHINEOU – Put the device in a specific OU, /SAVEFILE – Save to a file /CERTTEMPLATE – Generate a computer auth cert using our domain computer template /REUSE – Reuse the device name if it exists Provision.cmd DJOIN /PROVISION /DOMAIN "asd.net" /MACHINE "ASD-MyVM1" /MACHINEOU "CN=Computers,DC=asd,DC=net" /SAVEFILE "C:\Temp\ASD-MyVM1_ODJ.txt" /CERTTEMPLATE "ASD-DomainComputerTemplate" /REUSE Once you run this command, you can check Active Directory and you should see your new computer in the OU that you specified and you’ll have a text file in the /SAVEFILE location. RequestODJ STOP! Ensure that you have a local Admin account on the target device at this stage. If you don’t, you won’t be able to use admin rights after this step. Also, you could choose to install your VPN client before this step, but I’m doing it afterwards. Doesn’t make a huge difference. As mentioned, you’ll need a new, clean device. I used Hyper-V but this will work with a VM or physical device. You can do this by using DISM to mount a WIM and running the commands (exclude /LOCALOS) or spin up the device the run the command from the new device (Include /LOCALOS). Simply copy your Offline Domain Join (ODJ) text file to the new device and run the following: /REQUESTODJ – Tells the device to request an offline domain join on the next restart /LOADFILE – specifies the ODJ blob file that you generated with /PROVISION /WINDOWSPATH – the path to Windows for an offline image or if used with /LOCALOS the windows directory of the device you are running the command on. /LOCALOS – targets the local OS RequestODJ.cmd DJOIN /REQUESTODJ /LOADFILE c:\Temp\ASD-MyVM1_OSJ.txt /WINDOWSPATH %SystemRoot% /LOCALOS Once you run the command, reboot the device and you’ll be prompted to log in with your domain credentials. Since you won’t be on the domain yet, log back in with your local admin credentials. To verify that this all worked, you can check Computer Management to see that you’re on the domain and check your Local Computer personal certificate store and see that you have a domain CA cert issued to the device name that you specified and the root and intermediate certs should be there as well. VPN This is the part that may be a show stopper for you, depending on the type of VPN you use and the auth requirements for it. I got lucky with the device cert and user domain creds. At this point, you simply want to install your company VPN client and configure it properly. Since everyone will have something different, I’m not going to go into details. In my case, once the client was installed from an MSI, I was able to connect to the VPN portal and sign in with my domain credentials, using the device certificate in the background as well. Once I establish the tunnel successfully the first time, the VPN client is ready to go. I can reboot the machine, then log in with my domain credentials and I’m on! That’s pretty much it From here, what you do is up to you. You should have a computer that’s domain joined and on VPN. For me, I wanted to test using a device that matched our standard build. If you don’t need to do this, then you can pretty much stop here. Standardizing the Image If you want to complete your build, you will need to manually install the ConfigMgr client using the command lines appropriate to your site. From a domain connected device, copy the client installation media to the new device. Once installed, drop the machine into a collection that has your “Apps-Only” Task Sequence (keep reading) advertised to it and run it once it shows up. If you’ve read any of my Task Sequence blogs, you may have come across my “Building a Smarter Task Sequence” post. In it, I detail how to build a OS Deployment Task Sequence that is able to be re-run on failed devices without reinstalling the whole OS. You may also be able to just break out everything after the Setup Windows and ConfigMgr step in your Task Sequence and create a new “Apps-Only” sequence that will finish installing all of the bits that make up your company’s standard build. This would be equivalent the Task Sequence you’d want to build if you use the new PROVISIONTS commandline option in ConfigMgr 2002 to auto launch a Task Sequence right after the ConfigMgr client is installed via AutoPilot. Ultimately, if you have Windows on the box, everything else SHOULD just be apps and policies. Now, if you are offline servicing and doing a bunch of tweaking to your image or even using a reference image, you may not end up quite standard. We don’t do any of that, so this process is perfect. I just need to install a few standard apps and add a registry key to tag this as a standard build and my device should match anything we’ve built from bare metal. Give It A Spin Once you’ve built your new machine, you should have a device that looks like any other standard device. I was able to spin up several Hyper-V VMs using this process and successfully tested several VPN scenarios to validate our split-tunnel configuration, which made all of the effort worth it. I’m sure there is more to learn about DJOIN but this is what I’ve learned so far. Hope you find some inspiration in this. Soapbox I’ve been saying this to anyone who will listen for the past few years and I have been fighting to make this a reality in my production environment as well – the less you bake into your image and the less you customize your builds, the easier it will be to move to AutoPilot or an Apps-Only TS model that allows you to take advantage of the OS already being on the box. There are MANY reasons why this is an unattainable goal for many orgs, but you I challenge you to keep chipping away at your customizations to deliver a vanilla image that could easily be replicated by installing some apps and applying some policies. It’s a worthwhile endeavor and I’m very glad that we are on a journey to zero (or as close as we can get to zero) customizations. Source asquaredozen.com
  2. Hello all Get Free VPN For 3 Days!! (Free + Open Port 1194 for hacking PC) go ahead https://www.youtube.com/watch?v=Q6uiO0LrjNU&t=202s
  3. VPN providers often advertise their products as a method of surfing the web anonymously, claiming they never store logs of user activity, but a recent criminal case shows that at least some, do store user activity logs. The case in question is of Ryan Lin, a 24-year-old man from Newton, Massachusetts, arrested on Thursday, October 5, on charges of cyberstalking. More on https://www.bleepingcomputer.com/news/security/cyberstalking-suspect-arrested-after-vpn-providers-shared-logs-with-the-fbi/
  4. Hello, Romania Security Team ! The Company In-Disguise . Com - Anonymous Internet Surfing, Anonymous File Sharing Torrent-P2P, Amonymous WiFI. Fully Automatic and Anonymous VPN Service NO Logs , You don?t have to waste time on: 1 - Search Supports if disconnected from a server, search for a standard installation OpenVPN client spend time for installing downloaded configs to the program. Troubleshoot the upgraded system for a stable connection to the VPN. Access to all servers for just 9 EURO. DoubleVPN, OPENVPN and PPTP / L2TP / IpSec VPN - Access to 40 Servers in 29 Countries! Subscribe to All Servers of Our Service for 9 Euro Month; 3 months = 20 Euro; 6 months = 35 Euro; 1 year = 55 Euro. 2 - Unique VPN Client is easy to install on All Kinds of Operating Systems: MAC / Windows / Linux / Android !!! Will allow you to switch easily between the VPN servers in USA / CA / DE / UK / IT / SP / NL / LU / EG / PA / RO / MY Continuing In the near future our service will be available in Spain, Greece, Sweden, Mexico, Czech Republic, Poland, China, Belgium ... Types of VPN connections included in a single subscription - DoubleVPN and OpenVPN. The Speed Of All Our Servers OpenVPN = 1000 M.Bit / Unlimited Traffic !!! 3 - The program features an easy configuration of a VPN connection to your Internet: - Automatically Block Internet Connection when Disconnected from a VPN. - Automatic connection to the VPN when you turn on the Internet. 4 - Also, our Service has a unique N-tier, Partnership Program: You will get 30% of total payments of your customers! 5 - Company Takes All Kinds Of Payments in Full Auto Mode! WebMoney / Visa / Master Card / PayPal / Perfect Money / BitCoin / SMS and many others. Our Anonymous VPN Service Is Here! in-disguise . com Disguise Your Internet Connect! If You Have Question - Please Contact: ICQ: 6850058 Jabber: In-Disguise-VPN@jabber.org E-mail: manager@in-disguise.com Skype: In-Disguise-VPN Sincerely, Your Anonymous VPN Service : In-Disguise . Com ================================================== Dear Administration, I give You Free VPN, in All time, If You Don't to Delete My Post - Contact Me Please. ----- Dear Users Community, We Giving All Users This Community, Test VPN Access, If You Reply How Work our VPN Service.
  5. https://www.proxyrack.com/access/signup/vpn
  6. O lista fresh & free de PPTP VPN din Ukraina. admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin guest guest guest guest guest guest test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test user user user user user user user user 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 vpn vpn vpn vpn vpn vpn vpn vpn vpn vpn vpn vpn vpn vpn # Fac rost de PPTP VPN din orice TARA/ORAS/REGIUNE.
  7. Can anyone help me with any safe vpn program , need to make click on ads ?
  8. Smart DNS Proxy IPS (expiring on Tuesday, July 19, 2016) ////////////////////////////////////////////////////// Australia - Melbourne Australia - Sydney Brazil Canada - Montreal Canada - Toronto Germany India Ireland Israel Italy Japan Mexico Netherlands New Zealand Singapore South Africa 1 South Africa 2 Spain Sweden Switzerland Turkey US East - N. Virginia US Center - Dallas US West - Los Angeles
  9. https://www.steganos.com/specials/?m=chip0516&p=sos
  10. Salut; am un cont valabil pana in Septembrie, de la omul meu @conteaza, si din moment ce nu il mai folosesc... asa ca, cine chiar are nevoie sa imi dea un PM. Apropo, are cineva de aruncat pe geam un cod de KILLING FLOOR 2, pentru Steam?
  11. https://rstforums.com/forum/107930-pptp-vpn.rst#post669106
  12. Salut, am cumparat o licenta pentru avast VPN, paltforma windows si eu nu am ce face cu ea si am zis sa o postez aici Instructions 1, Download and install Avast SecureLine VPN. 2, Double-click the license file and confirm activation. NOTE: If you already have Avast Antivirus installed on your PC, proceed to step 2 right away. Software http://secureline.tools.avast.com/tools/secureline/avast_secureline_setup.exe License: CC/Atg2AtgsL4hIMqb6nRrxK=BhiiX5DoTiKRAGHqqxMTB6HKLHp=LgK8u5pLQyHZLHKqX6fkP6ST9xfGA6SiHgfeXmHg65fokJgzHHi Decode: Reverse Base64 Atom-128, ordinea o stabiliti voi
  13. OkayFreedom VPN. A simple VPN service enabling private, uncensored web surfing. Access websites blocked in your country Use all of your favorite websites when abroad Access the web securely – even in public hotspots Surf the Net anonymously Protect your privacy on the internet OkayFreedom VPN Premium (100% Discount)
  14. Steganos Online Shield VPN (100% Discount) Nu l-am testat.
  15. 1. Introduction The idea of Virtual Private Network (VPN) is to simulate a private network over a public network. A VPN tunnel can be used to securely connect LANs of the company over an insecure Internet (VPN gateways are responsible for making the connection secure). This article describes how tunneling and cryptography can be used to build VPN tunnels without going into the details of existing VPN protocols. 2. TCP/IP model and encapsulation One needs to understand these topics first before tunneling is discussed. There are four layers in the TCP/IP model: Layer 4: Application layer Layer 3: Transport layer Layer 2: Internet layer Layer 1: Network access layer From the point of view of the sender, the data goes through layers 4 ? 1 (1 ? 4 from the perspective of the receiver). L4PDU (Layer 4 Protocol Data Unit) is sent from the application layer to the transport layer. A TCP header is appended to L4PDU and L3PDU (Layer 3 Protocol Data Unit) is created. L3PDU is called segment. Then L3PDU is sent from the transport layer to the Internet layer. IP header is appended to L3PDU and L2PDU (Layer 2 Protocol Data Unit) is created. L2PDU is called datagram. This simplified description shows that L3PDU (segment) becomes a part of the L2PDU (datagram). In fact, the segment is included in the datagram and this inclusion is called encapsulation. Then the datagram is appended with another header and L1PDU (Layer 1 Protocol Data Unit) is created. L1PDU is called frame. Finally the frame is sent via transmission medium in the form of zeros and ones. From the perspective of the receiver, the exact reverse process occurs (layers 1 ? 4) and is called four step decapsulation. 3. VPN tunnel Normally the data of the application layer is encapsulated into the segment of the transport layer which is further encapsulated into the datagram of the Internet layer. Then the frame of the network access layer encapsulates the datagram and finally the bits are transferred via a physical medium. When VPN tunnel is concerned, one datagram (the internal one) is encapsulated in the another datagram (the external one). This encapsulation is used to carry private addresses through the tunnel. We want to carry private IP addresses through the tunnel, because the goal is to connect local area networks (LANs) at both ends of the tunnel. That’s why the external IP (the one which is not tunneled) is a public address used to connect to the VPN gateway and the internal IP (the one which is tunneled) is a private address. Let’s analyze the real world analogy of tunneling to better understand how it works. The car wants to drive from city C1 to city C2 and these cities are separated by the river. The car is loaded into the ship and transported from C1 to C2. This is exactly how the tunneling works. The internal datagram is tunneled inside another datagram that reaches the VPN gateway. Here the internal datagram is extracted and can be sent to another host. Although the private addresses are not routable in the Internet, they can be traversed using this approach. There is one thing missing. We need to make the tunneling secure, and cryptography is used for this purpose. 4. Using crypto to secure the tunnel The intention of this part of the article is to present briefly how crypto can be applied to make the tunnel secure without going into the cryptographic details. First of all we want the authentication to be achieved. Digital certificates can be used for this purpose. Moreover, the communication should be confidential so that unauthorized users can’t see it. The confidentiality can be achieved by symmetric encryption. Before the symmetric encryption happens, the symmetric key needs to be securely distributed. Asymmetric encryption is used for the purpose of key distribution. Let’s assume that A is communicating with B. The symmetric key is generated by A, encrypted with the public key of B and sent to B. Only B can decrypt it, because B is the only one that has the corresponding private key. In addition to this, we want to be sure that the communication has not been modified. HMAC is used for this purpose (hash of the message sent and the symmetric key). The symmetric key can be regenerated periodically. Then it is called a session key (randomly generated and valid only for one session). If an attacker learns the session key, then he can only decipher the messages sent after the last regeneration of the key and before the next regeneration. This is the way Forward Secrecy is achieved. As far as symmetric encryption is considered, some encryption mode is needed to change the ciphertext in a random way in order not to weaken the encryption key. The solution is a cipher block chaining (CBC) mode of encryption. 5. Summary Remote work via VPN is a standard nowadays. VPN simulates a private network (secure) over the public one (insecure). TCP/IP model and encapsulation were presented first. Then it was described how tunneling works. Finally, we’ve seen how cryptography can be used to make the VPN tunnel secure. Source
  16. Twitter dau prin pm! proof http://tinypic.com/r/29qfedh/8 http://tinypic.com/r/vsc2tw/8 uploaded.to combo:LittleAmok - 123456 Duration: 1 Week 1 day and 12 hours Points: 7.500 Balance: 0,00 € eMail: LittleAmok@web.d Starter VPN Data Protection: 2325MB / month Devices: 4 of 5 available devices Renewal Date: May 25, 2015 Use On: Windows, OSX, iOS, Android https://masterhunt@hotmail.co.uk:petcorrector@accounts.surfeasy.com/login ..................................... https://karsten1998@live.com:07876363724k@accounts.surfeasy.com/login Starter VPN Data Protection: 1625MB / month Devices: 3 of 5 available devices Renewal Date: June 5, 2015 Use On: Windows, OSX, iOS, Android ................................. https://smeelonig@gmail.com:mysandwich@accounts.surfeasy.com/login Starter VPN Data Protection: 1625MB / month Devices: 1 of 5 available devices Renewal Date: May 11, 2015 Use On: Windows, OSX, iOS, Android ................................... https://www.premiumize.me/account ellyn.fanthome : ellyn.fanthome1 Your account data E-Mail ellyn.fanthome@vsimcard.com Customer ID 276253134 PIN Show PIN Renew Fair use status Green 0% (learn more) Premium status Inactive ............................... Expire_date: 7/7/2015, traffic_left: 3128367965964 http://massimo.bracci@tin.it:massimo58@rapidgator.net/api/user/login? ptidav86 (Déconnexion)|0|? 151.48 GB / ? 198.56 GB |Ratio: 0,76 |Menu http://www.t411.io/ Cam atat pentru azi..
  17. Steganos Online Shield VPN Protects internet connection with 256-bit AES encryption Displays devices in your network that could pose a threat Blocks ads Includes the functionality of Steganos Internet Anonym VPN Prevents social tracking by Facebook und Twitter Automatically deletes cookies after surfing Simple operation via presets Sura: https://www.steganos.com/en/products/vpn/online-shield-vpn/features/
  18. Here's an outline: 1. Anonymizing Your Internet Usage 2. Securing Your Browser 3. PGP Encryption 4. Changing Your Mac Address 5. Anonymous IM 6. Anti-virus 1. Anonymizing Your Internet Usage The easiest way to anonymize your internet usage is to use TOR or a VPN RELIGIOUSLY. NON-STOP 24/7 FUCKING TOR ACTION NOT EVEN A SINGLE GOOGLE OUTSIDE TOR/VPN VPN A Virtual Private Network helps to ensure privacy by creating an encrypted tunnel between your computer and a remote VPN server. Example setup without VPN: Home PC -> ISP -> Internet Example setup with VPN: Home PC => ISP => VPN server -> Internet Once data has entered the VPN tunnel (=…=) it is hidden from view by encryption protocols so that no-one, not even your Internet Service Provider (ISP), can ‘see’ it. The only computers that can see the data are the ones at each end of the VPN tunnel. Because the VPN server can see all data going into and out-of the tunnel (and trace it back to you), it is vital to choose a VPN provider you trust, and who keeps no logs of your internet activity. If you are concerned about privacy then you should never pick a VPN provider who keeps logs, and the comments below assume a no logs service. Providers we particularly like that are good for keeping no logs are Mullvad, AirVPN and Private Internet Access (although the fact that PIA is US based has introduced considerable uncertainty to this recommendation). Pros: As long as your VPN provider is trustworthy and keeps no logs, VPN is a very secure and anonymous means of surfing the internet It is also good for securing connections at public WiFi hotspots, and for evading firewalls used to censor the internet It is a lot faster than Tor (although there will be a small hit to your internet speeds) It is very good for P2P filesharing, and ‘spoofing’ IPs in order to stream geo-restricted media content (e.g. Hulu). Cons: It relies on trusting your VPN provider, and is therefore not as secure as Tor It costs money (typically between $7 to $10 per month, with substantial discounts for bulk purchases). Many VPN providers accept Bitcoin payments. It is obvious to observers that you are using VPN. TOR (You should be familiar with TOR, but I'll throw it in here for educational purposes.) Tor is an anonymity network that supplies free software which lets you use the internet anonymously. Basically you connect though a number of randomly selected nodes (at least three), with the data being re-encrypted each time. This means that although each node knows who is connecting to it, and who it connects to, no node knows the whole route (circuit). The final link in the chain, the one that connects you to the internet, is known as an exit node, and is one of the biggest weaknesses of the system. See a Sybil attack for more information on this. My favorite motto is: "You're only as safe as the exit node you're connected to." Also, don't run exist nodes because if anyone watches CP through it, you're responsible and they will take you down. This has led to a fairly small number of public exit nodes being available, and has meant that restrictive governments such as China, who monitor these nodes, have been able to block access to many of them. There are still plenty of nodes around however, but it does mean that Tor users in some countries my need to reconnect to a number of different nodes before they find one that has not been blocked. Pros: Very secure and anonymous (in fact it is generally considered the most secure and anonymous way to access the internet available, and is therefore suitable for political dissidents and the like) It is also good for securing connections at public WiFi hotspots and for evading firewalls used to censor the internet (although see comments blocked exit nodes above) Free Cons: Slow (often very) Restrictive countries can make finding unblocked public exit nodes a pain Not good for P2P downloading and streaming from spoofed IPs – not only are network speeds too slow for this to be practical, but doing so slows down the system even more for other users. In addition to this, volunteers running the exit nodes may be held accountable for your copyright violations, so it is considered very rude It is obvious to observers that you are using Tor, and some websites (such as PayPal) may refuse to play ball Other services which may be of interest include JonDonym, Lahana, I2P and Psiphon. === 2. Securing Your Browser By now you're probably using the Tor Browser Bundle or TBB for short. This is the easiest way to go about things. a. Ensure NoScript is disabling scripts globally. b. Click the 3 bars/settings menu, then click HTTPS and finally enable "Block All HTTP Requests". This makes it so that you can't get ARP poisoned for cleartext passwords. Never hurts to make all your connections HTTPS, right? c. Click again on the 3 bars. Now select 'Options' and navigate to the Privacy tab. Select 'Do not tell sites...' and under "History" choose 'Never Remember History'. FLUSH YER DNS! Computers automatically cache the hostname of the websites you have visited to make reloading the pages faster than if there was no cache. This is clearly not wanted. ipconfig /flushdns CCleaner CLEARNET LINK: https://www.piriform.com/ccleaner CCleaner cleans out pesky Flash cookies and also a host other rubbish that is slowing your computer down and leaving traces of your internet activity behind. Flash cookies or ‘zombie cookies’ are bits of persistent Flash code which respawn regular cookies when they are modified or deleted. To configure CCleaner to work properly and delete these, 1. Open CCleaner, then navigating to Options -> Include -> Add: C:\ -> Users -> User name -> AppData -> Roaming > Macromedia > Flash Player -> #SharedObjects and C:\ ->Users -> User name -> AppData -> Roaming -> Macromedia -> Flash Player > macromedia.com -> support -> flashplayer -> sys 2. Then go to ‘Exclude’ and ‘Add’: C:\ -> Users -> User name -> AppData -> Roaming -> Macromedia -> Flash Player -> macromedia.com -> support -> flashplayer -> sys -> settings.sol Windows XP users should: 1. Include: C\: -> Documents and Settings -> User name -> Application Data -> Roaming -> Macromedia -> Flash Player -> macromedia.com -> support -> flashplayer -> sys and C -> Documents and Settings -> User name -> Application Data -> Roaming -> Macromedia -> Flash Player -> #SharedObjects 2. Exclude: C\: -> Documents and Settings -> User name -> Application Data -> Roaming -> Macromedia -> Flash Player -> macromedia.com -> support -> flashplayer -> sys -> settings.sol HTML web storage CLEARNET LINK: https://addons.mozilla.org/en-US/firefox/addon/betterprivacy/ This extension is said to remove web storage automatically on a regular basis. Privacy Badger CLEARNET LINK: https://www.eff.org/privacybadger Privacy Badger is a browser add-on that stops advertisers and other third-party trackers from secretly tracking where you go and what pages you look at on the web. If an advertiser seems to be tracking you across multiple websites without your permission, Privacy Badger automatically blocks that advertiser from loading any more content in your browser. To the advertiser, it's like you suddenly disappeared. Red means Privacy Badger believes this domain is a tracker, and has blocked it. Yellow means the domain is believed to be both a tracker and necessary for the functioning of the page, so Privacy Badger is allowing it but blocking its cookies. Green means that Privacy Badger believes this is not tracker. Other very useful Browser Extensions are: Lastly use Duck Duck Go or Startpage INSTEAD of Google. Google = bad bad bad! === 3. PGP Encryption If you aren't using PGP Encryption when sending messages you might as well off yourself right now. It is extremely vital to use it. As Ping once said 'The longer the better '. Download GPG4Win Here: CLEARNET LINK: Gpg4win - Secure email and file encryption with GnuPG for Windows Run the downloaded file and select to install only Kleopatra and GPA. Open GPA Keys > New Key Fill in the information with whatever you want people to see your public key as. NOTE: DO NOT USE YOUR REAL NAME! After selecting your alias it asks for an e-mail adress. This e-mail should be non existent, and be linked to a website that also doesn’t exist. Take the example below: Then make a backup of your key. Find where you put the back up of your key. It will be an .asc file. Open it with Notepad. When sharing your key with others, you wan’t to copy and paste from the beginning dashes to the end dashes. To import other people's keys into GPA, create a blank text document. Paste their key in. Open GPA. Import Keys. Select File. Confirm. Done. SENDING AN ENCRYPTED MESSAGE: 1. Open GPA. 2. Open up clipboard. 3. Write your message. 4. Encrypt. Choose the receiver's key. 5. You'll now have an encrypted message. 6. Just email/message that to them. To decrypt a message sent to you: 1. Open GPA. 2. Open Clipboard. 3. Paste funky looking message. 4. Decrypt - enter password. === 4. Changing Your Mac Address CLEARNET LINK: http://devices.natetrue.com/macshift/ Very easy. Download, open cmd, run macshift -r -i "Wireless" #If you're using Wireless macshift -r -i "Ethernet" #If you're using Ethernet 5. Anonymous IM CLEARNET LINKS: https://www.pidgin.im/ + https://otr.cypherpunks.ca/ Run both installers - pidgin with the default settings. Set it up how you want, currently I only have it set up for Google Hangouts which kind of defeats the purpose. If I can get it set up later, I'll edit this. ONLY USE XMPP If you want to connect to a hidden service, for example the jabber.ccc.de hidden service I use the following configuration: 6. Anti-virus 10/10 would recommend the AVG + Malwarebytes combo. If someone lands malware on your machine, you're 110% fucked. Nuff said. === Lastly, if you want to be the safest, run it in a virtual machine. To Hackerjon - I wrote this following your restrictions (no VM, no Tails, no Linux). Having all three of those is by far your safest bet, but whatever. === Source: hell
  19. Steganos Online Shield VPN (100% Discount) =((
  20. Uriasul


    Free VPN http://www.vpnreactor.com/ [US] http://www.vpnpop.com/ [US] http://www.vpnour.com/ [US] http://www.xpdo.net/ [US] http://launch.spotflux.com/ [US] http://www.vpntool.com/services.php [US] http://www.freevpntoday.com/ [US] http://www.sshour.com/ [US] http://www.bestukvpn.com/ [UK] http://www.vpn169.com/ [US] http://www.facebookvpns.com/ [US]
  21. Valid until Feb. 01, 2016 rickdiii@aol.com:jrd7666 http://www.hsselite.com/account/ have fun!
  22. call911

    Free VPN

    pppoe vpn. Windows 7 PPTP VPN Client Setup China=========>admin:admin: China=========>admin:admin: China=========>admin:admin: China=========>admin:admin: China=========>admin:admin: China=========>admin:admin: China=========>test:test: China=========>test:test: China=========>test:test: China=========>test:test: China=========>test:test: China=========>test:test: China=========>test:test: China=========>test:test: China=========>test:test: China=========>test:test: China=========>test:test: China=========>test:test: China=========>test:test: China=========>vpn:vpn: China=========>vpn:vpn: China=========>vpn:vpn: China=========>vpn:vpn: China=========>vpn:vpn: China=========>vpn:vpn: China=========>vpn:vpn: China=========>vpn:vpn: China=========>vpn:vpn: China=========>vpn:vpn: China=========>vpn:vpn: China=========>vpn:vpn:
  23. Guest

    365 Days FREE VPN

    365 Days FREE VPN ll Port Support Free VPN Client Software | Free VPN Proxy | Free VPN Download
  24. Licenta pe 3 luni https://freedome.f-secure.com/exclusive/3m/
  • Create New...