Welcome!

By registering with us, you'll be able to discuss, share and private message with other members of our community.

SignUp Now!
adv ex on 5 january 2024
adv ex on 22 February 2024
banner Expire 26 October 2024
Rescator cvv and dump shop
banner expire at 13 May

Yale lodge shop
UniCvv
banner Expire 1 April  2021

perfect money adder

  1. R

    6 WAYS TO SEND ANONYMOUS EMAILS AND HIDE YOUR IDENTITY

    Anonymous email in which third party servers are used to send email. Mostly these anonymous email servers are used to hide actual sender’s address. There are many servers available online for sending mails. Some are paid & free. We will looking at freely available anonymous email servers...
  2. R

    Detecting three

    The task of protecting against software bookmarks can be considered in three fundamentally different ways: - to prevent the introduction of software bookmarks into a computer system; - to identify the embedded software bookmark; - delete an embedded program bookmark. Considering these options...
  3. R

    Password generators

    The best thing a computer can do is generate a pseudo-random sequence, which, although it looks random, is actually not. The period of the pseudo-random sequence must be large enough for its subsequence of the required length to be aperiodic, i.e., to have a period that coincides with its...
  4. R

    Continuing the topic on anonymous browsers

    Introduction You have probably heard more than once stories about how law enforcement officers, having burst into the apartment of another failed hacker, detain, invite attesting witnesses, draw up a protocol, seal and take the hacker's workstation with them for examination. Many even laugh at...
  5. R

    Data destruction. A hands-on approach.

    In everyone's life, a situation may arise when you need to quickly and most importantly get rid of any information with high quality (regardless of its importance). In the attachment, the material (not all of mine, data from other Internet resources were used), in which you can look at the...
  6. R

    Checking for viruses by hand

    Probably there is no longer a person who would not be directly or indirectly affected by the actions of computer viruses. Antivirus companies want a lot for their products, which never provide adequate protection. The question is, why install antivirus software at all? System Analysis It is...
  7. R

    User authentication - modern methods

    The user authentication subsystem is the most important component of the corporate information security system, and its importance can hardly be overestimated. The authentication subsystem confirms the identity of the user of the information system and therefore must be reliable and adequate...
  8. R

    Complete security

    This article describes only some of the pros and cons of a new era, an era that most do not notice, or pretend not to notice. To accept the New World or not to accept it is up to YOU! A bit of morality. Already today, millions of the richest and most entrepreneurial people are making the most...
  9. R

    Installing and configuring OpenVpn server

    We will raise vpn on our vps, which will cost us only $ 10 per month (it is possible and less if we take another country), and the service from Inferno Solutions will help us. You can start! We go to the given URL of Inferno Solutions and repeat the sequence of numbers in the next picture...
  10. R

    How to protect yourself from a scam

    I would like to open a topic on the issue of protection from scammers. To begin with, I will publish an article I once wrote. Add something of your own to each one. Hello everybody! Probably, you had to make transactions on the Internet. The outcome of any deal here comes from the presence of...
  11. R

    SSH Tuning

    Many people wonder how is it that make SSH encryption, and thereby protect themselves from unwanted uncle :-) Since I use the entunnel program, then I will write on an example of its use. What we need: 1) Entunnel 2) Hosting with Shell (ssh / ssh2) access 3) PSD (Permeo Security Driver)...
  12. R

    Repentance

    SOME NUANCES OF OPERATIONAL ART. From the notes of the district opera. Part one. Violence. Part two. Agents. Part three. Witnesses. Part four. Suspects. Part five. A confession. Part six. Secrecy of the investigation. APPEARANCE 1. CONFESSES - WILL SIT ... No matter how the perestroika...
  13. R

    Safety in carding

    As a rule, safety is the main thing in carding, so I will tell you how to protect yourself. This article does not have to be used specifically for carding, it just helps to stay anonymous on the Internet or make other people believe that you are some kind of foreigner or someone else. What OS...
  14. R

    It's time to choose the de facto standard one of the IM encryption methods

    Purpose: To persuade people to use one simple thing. Optional: An article on setting up SimpLite. My choice is SimpLite! It's no secret that the most popular IM client among us is ICQ, which does not have built-in encryption methods. There are clients with built-in encryption, such as sst (the...
  15. R

    Socks, tunnels, dedies. What it is?

    Hello Friend! Today I will tell you about such a necessary thing as "socks" and tunnels. " What is called" sock "? You have come across this word more than once while drinking tea after school and flipping through the regular carder forum. Sock - aka SOCKS - is this a network protocol that...
  16. R

    What is antifraud? How does he spoil your life?

    Antifraud - if you don’t fuck your head, then these are measures directed by a certain site (its merchandise) to ensure that you cannot cheat anything from it. A kind of protection against incomprehensible transactions. Wikipedia on the subject says this: Antifród (from the English anti-fraud...
  17. R

    Carder's interview

    - What happened in your life that made you go to hell? After all, you need an acute lack of cache to go for it. Of course, this is a lack of money. We lived with my stepfather, who constantly spared money for food for his family, but at the same time drank thousands of dollars a month. It was a...
  18. R

    Anonymous Jabber for paranoid beginners

    Hello, I would like to tell you about PGP message encryption and how to make Jabber more anonymous. I will try to remove all the water from the article and explain it as clearly as possible. Go! The main thing in PGP PGP (English Pretty Good Privacy) is a computer program, also a library of...
  19. R

    Anonymity on the Internet. What are the cops shooting? And what is VPN?

    Working in a field in which guys in uniform will be happy to welcome you hot, you definitely need to think about your safety. I'll just describe the basic postulates that are worth relying on and that work well and will continue to work. Comp Your computer, on which the dotka is located, will...
  20. R

    Suspicious Payment

    Affiliate marketers have quite a few problems with leaking to gray or black topics. The main trouble is the ban of accounts, which leads to related problems. For example, a card that was tied to a banned ak. Popular solutions: The overwhelming majority of affiliates solve the issue in just a...
Top Bottom