Skip to main content

Staying Anonymous

If you are planning to be Black/ Grey/ Green Hat hacker, then you will be really worried about you anonymity. What concerns you most have to be "How to stay Anonymous?" . So here are some methods to stay anonymous. These are only some basic anonymity techniques and the more advanced techniques will be lectured in the following tutorials.

VPN                                                                                     

VPN is the acronym of Virtual Private Network. As from a hacker's point of view, here are the facts that justifies its need:

1) Counterfeit the ISP's packet detection measures.    Maintain your anonymity and boost by keeping your ISP from throttling, inspecting and prioritizing the data sent to and from your system.
2) Keep your IP address anonymous.    Prevent the places your packets are traversing from identifying your connection information and location.
3) Hide your online activities from third parties.    As a VPN provides a secure tunnel to make a connection to the outside world, it will keep the third parties away from finding your online activities.
4) And of-course, prevent location identification and Geo targeting.    Yeah! the title says it all.

To help you start, below are some of the FREE VPN's that are available.


Cyberghost http://cyberghostvpn.com/ 


PROXIES                                                                             

Proxies are another less secure alternative for VPN's . Proxies does the same job as VPN's as it hides your IP when you are surfing through the internet. There are different types of proxies ranging from less anonymous to high anonymous proxies. One thing that you have to keep in mind is that the proxies will not last for ever. The available proxy address will change from time to time (which is a best thing for staying anonymous).

Below are some of the Proxy sites that you can use as a starting leveler. http://proxify.com/http://www.hidemyass.com/http://hidefromyou.com/http://proxy6.org/http://www.httpsurf.com/http://www.safersurfing.net/http://unblocked.in/http://www.proxeasy.com/webclient.aspxhttp://newipnow.com/



Below are some of the Popular VM's that you can use .VMLite - http://www.vmlite.com/index.php?option=c...Itemid=153VMWare - https://my.vmware.com/web/vmware/downloadsVirtual Box - https://www.virtualbox.org/wiki/Download


Note:- As I said in the starting of this tutorial, these are only some basic level Anonymity tools whose service you can make use of to stay anonymous. These cannot assure 100% anonymity and if you did something Black Hat stuffs and when you hear a door knock and see some cops outside your door, don't blame me :)

Comments

Popular posts from this blog

How To Grab Someone's IP Address ?

In this tutorial I will you show you how to grab someone’s IP address using  PHP script.  This method can be used to grab someone Ip address on yahoo or Facebook  chat  or by sending mail to victim. So Lets get started. How To  Hack  Someone Ip Address ? 1. Copy the below codes into  Notepad  and save it as  Grab.php  (.php is must)  <?php $hostname = gethostbyaddr($_SERVER['REMOTE_ADDR']); $img_number = imagecreate(400,95); $backcolor = imagecolorallocate($img_number,10,102,153); $textcolor = imagecolorallocate($img_number,255,255,255); imagefill($img_number,0,0,$backcolor); $number0 = " This is Your IP/Proxy"; $number1 = " IP: $_SERVER[HTTP_X_FORWARDED_FOR]"; $number2 = " Host/Proxy: $hostname"; $number4 = " _________________________________"; Imagestring($img_number,10,5,5,$number0,$textcolor); Imagestring($img_number,10,5,25,$number1,$textcolor); Imagestring($img_number,10,5,45,$number2,$textcolor); Imagestring...

How to Trace Any IP Address

How to Trace the IP Address Back to the Source? In fact, tracing an IP address back to its location is a lot simpler than what many people imagine. There exists many online tools using which you can accomplish this job. One of my favorite site is  IP2Location.com . Just go to  http://www.ip2location.com/demo.aspx  and enter the IP address that you want to trace in the dialog box and click on “Find Location”‘. With just a click of a button you can find the following information for any given IP address: Country  in which the IP is located City  to which the IP address belongs to Latitude/Longitude  of the IP’s location Zip Code  of the region to which the IP belongs to Time Zone  associated with the IP Name of the ISP  to which the IP address belong to Internet Speed  of the computer associated with the IP Weather Station  associated with the region of the IP Domain name  associated with the I...

Windows Security

Security Architecture of Windows  There are three components of Windows Security:  LSA (Local Security Authority)  SAM (Security Account Manager)  SRM (Security Reference Monitor) LSA (Local Security Authority)  LSA is the Central Part of NT Security. It is also known as Security Subsystem. The Local Security Authority or LSA is a key component of the logon process in both Windows NT and Windows 2000. In Windows 2000, the LSA is responsible for validating users for both local and remote logons. The LSA also maintains the local security policy.  During the local logon to a machine, a person enters his name and password to the logon dialog. This information is passed to the LSA, which then calls the appropriate authentication package. The password is sent in a nonreversible secret key format using a one-way hash function. The LSA then queries the SAM database for the User’s account information. If the key provided matches the one in the SAM, the ...