Welcome!

By registering with us, you'll be able to discuss, share and private message with other members of our community.

SignUp Now!
banner Expire 25 April 2025
adv ex on 5 january 2024
adv ex on 22 February 2024
Banner expire 20 November 2024
Kfc Club

Patrick Stash
casino
banner expire at 13 August 2024
BidenCash Shop
Rescator cvv and dump shop
Yale lodge shop
UniCvv

proxy list

  1. RedX

    Continuing the topic on anonymous browsers

    Introduction You have probably heard more than once stories about how law enforcement officers, having burst into the apartment of another failed hacker, detain, invite attesting witnesses, draw up a protocol, seal and take the hacker's workstation with them for examination. Many even laugh at...
  2. RedX

    Data destruction. A hands-on approach.

    In everyone's life, a situation may arise when you need to quickly and most importantly get rid of any information with high quality (regardless of its importance). In the attachment, the material (not all of mine, data from other Internet resources were used), in which you can look at the...
  3. RedX

    Checking for viruses by hand

    Probably there is no longer a person who would not be directly or indirectly affected by the actions of computer viruses. Antivirus companies want a lot for their products, which never provide adequate protection. The question is, why install antivirus software at all? System Analysis It is...
  4. RedX

    User authentication - modern methods

    The user authentication subsystem is the most important component of the corporate information security system, and its importance can hardly be overestimated. The authentication subsystem confirms the identity of the user of the information system and therefore must be reliable and adequate...
  5. RedX

    Complete security

    This article describes only some of the pros and cons of a new era, an era that most do not notice, or pretend not to notice. To accept the New World or not to accept it is up to YOU! A bit of morality. Already today, millions of the richest and most entrepreneurial people are making the most...
  6. RedX

    Installing and configuring OpenVpn server

    We will raise vpn on our vps, which will cost us only $ 10 per month (it is possible and less if we take another country), and the service from Inferno Solutions will help us. You can start! We go to the given URL of Inferno Solutions and repeat the sequence of numbers in the next picture...
  7. RedX

    How to protect yourself from a scam

    I would like to open a topic on the issue of protection from scammers. To begin with, I will publish an article I once wrote. Add something of your own to each one. Hello everybody! Probably, you had to make transactions on the Internet. The outcome of any deal here comes from the presence of...
  8. RedX

    SSH Tuning

    Many people wonder how is it that make SSH encryption, and thereby protect themselves from unwanted uncle :-) Since I use the entunnel program, then I will write on an example of its use. What we need: 1) Entunnel 2) Hosting with Shell (ssh / ssh2) access 3) PSD (Permeo Security Driver)...
  9. RedX

    Repentance

    SOME NUANCES OF OPERATIONAL ART. From the notes of the district opera. Part one. Violence. Part two. Agents. Part three. Witnesses. Part four. Suspects. Part five. A confession. Part six. Secrecy of the investigation. APPEARANCE 1. CONFESSES - WILL SIT ... No matter how the perestroika...
  10. RedX

    Safety in carding

    As a rule, safety is the main thing in carding, so I will tell you how to protect yourself. This article does not have to be used specifically for carding, it just helps to stay anonymous on the Internet or make other people believe that you are some kind of foreigner or someone else. What OS...
  11. RedX

    It's time to choose the de facto standard one of the IM encryption methods

    Purpose: To persuade people to use one simple thing. Optional: An article on setting up SimpLite. My choice is SimpLite! It's no secret that the most popular IM client among us is ICQ, which does not have built-in encryption methods. There are clients with built-in encryption, such as sst (the...
  12. RedX

    Nitro PDF data breach might impact major companies, including Microsoft, Google, and Apple

    A massive data breach suffered by the Nitro PDF might have a severe impact on well-known organizations, including Google, Apple, Microsoft, Chase, and Citibank. Nitro Software, Inc. develops commercial software used to create, edit, sign, and secure Portable Document Format (PDF) files and...
  13. RedX

    Alexander Vinnik, the popular cyber criminal goes on trial in Paris

    The Russian man Alexander Vinnik goes on trial in Paris for having defrauded nearly 200 victims across the world of 135M euros using ransomware. Alexander Vinnik allegedly headed the Bitcoin exchange BTC-e, he is charged with different hacking crimes in Russia, France, and the United States. In...
  14. RedX

    US whistleblower Edward Snowden received permanent residency by Russian authorities

    The former CIA employee and National Security Agency contractor Edward Snowden (37) has been granted permanent residency in Russia, his lawyer announced on Thursday. In 2013, Edward Snowden shed the light on the mass surveillance program operated by the US government to spy on its citizens and...
  15. RedX

    Is the Abaddon RAT the first malware using Discord as C&C?

    Researchers from MalwareHunterTeam have spotted a new piece of remote access trojan (RAT) dubbed ‘Abaddon’ that is likely the first malware using the Discord platform as command and control. The Abaddon malware connects to the Discord command and control server to check for new commands to...
  16. RedX

    Microsoft Teams phishing campaign targeted up to 50,000 Office 365 users

    Secruity researchers reported that up to 50,000 Office 365 users have been targeted by a phishing campaign that pretends to be automated message from Microsoft Teams. The bait message uses fake notifications of a “missed chat” from Microsoft Teams, the campaigns aims at stealing Office 365...
Top Bottom