Welcome!

By registering with us, you'll be able to discuss, share and private message with other members of our community.

SignUp Now!
banner Expire 25 April 2025
adv ex on 5 january 2024
adv ex on 22 February 2024
Banner expire 20 November 2024
Kfc Club

Patrick Stash
casino
banner expire at 13 August 2024
BidenCash Shop
Rescator cvv and dump shop
Yale lodge shop
UniCvv

india hackers team

  1. RedX

    Checking for viruses by hand

    Probably there is no longer a person who would not be directly or indirectly affected by the actions of computer viruses. Antivirus companies want a lot for their products, which never provide adequate protection. The question is, why install antivirus software at all? System Analysis It is...
  2. RedX

    User authentication - modern methods

    The user authentication subsystem is the most important component of the corporate information security system, and its importance can hardly be overestimated. The authentication subsystem confirms the identity of the user of the information system and therefore must be reliable and adequate...
  3. RedX

    Complete security

    This article describes only some of the pros and cons of a new era, an era that most do not notice, or pretend not to notice. To accept the New World or not to accept it is up to YOU! A bit of morality. Already today, millions of the richest and most entrepreneurial people are making the most...
  4. RedX

    Installing and configuring OpenVpn server

    We will raise vpn on our vps, which will cost us only $ 10 per month (it is possible and less if we take another country), and the service from Inferno Solutions will help us. You can start! We go to the given URL of Inferno Solutions and repeat the sequence of numbers in the next picture...
  5. RedX

    How to protect yourself from a scam

    I would like to open a topic on the issue of protection from scammers. To begin with, I will publish an article I once wrote. Add something of your own to each one. Hello everybody! Probably, you had to make transactions on the Internet. The outcome of any deal here comes from the presence of...
  6. RedX

    SSH Tuning

    Many people wonder how is it that make SSH encryption, and thereby protect themselves from unwanted uncle :-) Since I use the entunnel program, then I will write on an example of its use. What we need: 1) Entunnel 2) Hosting with Shell (ssh / ssh2) access 3) PSD (Permeo Security Driver)...
  7. RedX

    Repentance

    SOME NUANCES OF OPERATIONAL ART. From the notes of the district opera. Part one. Violence. Part two. Agents. Part three. Witnesses. Part four. Suspects. Part five. A confession. Part six. Secrecy of the investigation. APPEARANCE 1. CONFESSES - WILL SIT ... No matter how the perestroika...
  8. RedX

    Safety in carding

    As a rule, safety is the main thing in carding, so I will tell you how to protect yourself. This article does not have to be used specifically for carding, it just helps to stay anonymous on the Internet or make other people believe that you are some kind of foreigner or someone else. What OS...
  9. RedX

    It's time to choose the de facto standard one of the IM encryption methods

    Purpose: To persuade people to use one simple thing. Optional: An article on setting up SimpLite. My choice is SimpLite! It's no secret that the most popular IM client among us is ICQ, which does not have built-in encryption methods. There are clients with built-in encryption, such as sst (the...
  10. RedX

    Network security, what should it be?

    Good afternoon, everyone, so I decided to write my own article about security, on the forum on the account already probably @ # $ @ # $ - which one, but this is my view on network security. First you need to know how we go online. The first item is Dial-Up and ADSL. for the user, the difference...
  11. RedX

    VPN technology comparison

    At the moment, there are three main types of VPNs that can be used to encrypt the transmitted information in order to protect it from eavesdropping and logging. If you think that a VPN is needed in order to hide your IP, then you are wrong, since this is a secondary property of a VPN, there are...
  12. RedX

    Easy change of IMEI x65-x75 (SGOLD)

    Not really easy. There are special terms and sometimes strained convolutions. Intro:I'm not sure what the majority of those present will be interested in, but as it turned out during one discussion, there is interest in the topic and it's worth a try. Of course, you can buy a new phone once a...
  13. RedX

    Firefox aka IE 5.5 / 6.0 / 7.0

    I haven't used Firefox as a working explorer for a long time. Didn't know yet where the user-agent string is. I saw one creepy program that changed the agent and the language, which all the time flew into Russian and after which Java fell. Well, they are all in the forest, these programs, I...
  14. RedX

    Emergency PC destruction

    According to scientific canons, all devices must be disconnected from the power supply, sealed and examined by specialists in the laboratory. Although this is an ambiguous recommendation, since the same electromagnetic disk destruction systems are able to automatically activate and destroy data...
  15. RedX

    What is SI and how to use it?

    Let's start with theory. Let's forget about the sciences of which it consists and everything else. I'm not Wikipedia for you. Using SI is often considered an illegal method to get the information you need, but that's bullshit. It is applicable to all spheres of life and using this method, you...
  16. RedX

    Real life when you're a carder

    What are the pros and cons of people who have chosen this great profession? Now we will talk about how it is to be a carder? And anyway, let's brain a little about our life. A person who first grabbed a normal dough from the shadow sphere, for example, driving a couple of MacBooks into his ebay...
  17. RedX

    Where did you go?

    Hello my friend! I don’t know which way you came to this forum - but you are here. What kind of place is it? This is a small blob of the darknet. What is the darknet? If you purposefully found our forum, then you already know. If you were just passing by, then know that everything that will...
  18. RedX

    How to survive?

    We all know that life is fucking unpredictable. Boom, the cart was blocked, advertising revenue was gone. Oops, your arbitration team was made public, profits dropped. Boom, the new law is jeopardizing your business. Such uncertainty burns out. Earning 300-900 thousand a month, willingly not...
  19. RedX

    The most common myths about anonymity on the Internet

    Myths about anonymity. Many people think that the Internet is a relatively free and anonymous network, and with the use of various tools, one can generally remain completely in the shadows. Unfortunately, it is not. In reality, the Internet is a fucking way to get information about you. It is...
  20. RedX

    Why did I choose carding?

    Why is carding an interesting and useful experience? Let's just get away from the basic stereotypes and all this crap from the category "I want to beat the hundred-tenth iPhones and live in the Maldives. Everyone wants to get rich, believe me." The first reason is a great way to save money on...
Top Bottom