Usr6 Posted October 6, 2010 Report Posted October 6, 2010 Why are you writing this guide, Kyek? Recently, some unknown newcomers to our scene have posted propaganda to our forums, claiming to be hackers who can get into Apple's E-mail, claiming to work for Apple, or a multitude of other things. Some of these people I've been able to very pointedly disprove, but others.. well, it's anyone's guess as to whether they're telling the truth or not. Most likely, they're just pissed-off developers who spent 15 minutes on google digging up a little dirt, and want to scare everyone away. The problem is, two of these posters have been able to find the real names of two of our crackers, and because of this many crackers are running off screaming, claiming they'll never crack another app. This drives me nuts, because that's exactly what these people want. And so, I'm writing this guide to give tips on how to protect yourself in our scene, showing you how to make it near-impossibly hard for anyone to figure out who you are in real life.How this guide works There are always extra layers of security you can add, giving yourself more and more protections. So, I'll be describing things in terms of "levels". "Level 1" is the most basic stuff you can do, Level 2 is what you can do if you're not satisfied with the little bit of protection level 1 gives, Level 3 is what you can do to protect yourself even more, etc. Just keep going until you're comfortableArticol CompletLectura placuta. Quote
adi003user Posted October 7, 2010 Report Posted October 7, 2010 piggybanking e o idee foarte buna dar wpa2 e foarte greu de spart. iar vecinii deja au schimbat wep-ul . a uitat de masini virtuale. dar asta deje e paranoia. Quote