viewing paste How to secure your computer and sur | Text

Posted on the
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 960 961 962 963 964 965 966 967 968 969 970 971 972 973 974 975 976 977 978 979 980 981 982 983 984 985 986 987 988 989 990 991 992 993 994 995 996 997 998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 1111 1112 1113 1114 1115 1116 1117 1118 1119 1120 1121 1122 1123 1124 1125 1126 1127 1128 1129 1130 1131 1132 1133 1134 1135 1136 1137 1138 1139 1140 1141 1142 1143 1144 1145 1146 1147 1148 1149 1150 1151 1152 1153 1154 1155 1156 1157 1158 1159 1160 1161 1162 1163 1164 1165 1166 1167 1168 1169 1170 1171 1172 1173 1174 1175 1176 1177 1178 1179 1180 1181 1182 1183 1184 1185 1186 1187 1188 1189 1190 1191 1192 1193 1194 1195 1196 1197 1198 1199 1200 1201 1202 1203 1204 1205 1206 1207 1208 1209 1210 1211 1212 1213 1214 1215 1216 1217 1218 1219 1220 1221 1222 1223 1224 1225 1226 1227 1228 1229 1230 1231 1232 1233 1234 1235 1236 1237 1238 1239 1240 1241 1242 1243 1244 1245 1246 1247 1248 1249 1250 1251 1252 1253 1254 1255 1256 1257 1258 1259 1260 1261 1262 1263 1264 1265 1266 1267 1268 1269 1270 1271 1272 1273 1274 1275 1276 1277 1278 1279 1280 1281 1282 1283 1284 1285 1286 1287 1288 1289 1290 1291 1292 1293 1294 1295 1296 1297 1298 1299 1300 1301 1302 1303 1304 1305 1306 1307 1308 1309 1310 1311 1312 1313 1314 1315 1316 1317 1318 1319 1320 1321 1322 1323 1324 1325 1326 1327 1328 1329 1330 1331 1332 1333 1334 1335 1336 1337 1338 1339 1340 1341 1342 1343 1344 1345 1346 1347 1348 1349 1350 1351 1352 1353 1354 1355 1356 1357 1358 1359 1360 1361 1362 1363 1364 1365 1366 1367 1368 1369 1370 1371 1372 1373 1374 1375 1376 1377 1378 1379 1380 1381 1382 1383 1384 1385 1386 1387 1388 1389 1390 1391 1392 1393 1394 1395 1396 1397 1398 1399 1400 1401 1402 1403 1404 1405 1406 1407 1408 1409 1410 1411 1412 1413 1414 1415 1416 1417 1418 1419 1420 1421 1422 1423 1424 1425 1426 1427 1428 1429 1430 1431 1432 1433 1434 1435 1436 1437 1438 1439 1440 1441 1442 1443 1444 1445 1446 1447 1448 1449 1450 1451 1452 1453 1454 1455 1456 1457 1458 1459 1460 1461 1462 1463 1464 1465 1466 1467 1468 1469 1470 1471 1472 1473 1474 1475 1476 1477 1478 1479 1480 1481 1482 1483 1484 1485 1486 1487 1488 1489 1490 1491 1492 1493 1494 1495 1496 1497 1498 1499 1500 1501 1502 1503 1504 1505 1506 1507 1508 1509 1510 1511 1512 1513 1514 1515 1516 1517 1518 1519 1520 1521 1522 1523 1524 1525 1526 1527 1528 1529 1530 1531 1532 1533 1534 1535 1536 1537 1538 1539 1540 1541 1542 1543 1544 1545 1546 1547 1548 1549 1550 1551 1552 1553 1554 1555 1556 1557 1558 1559 1560 1561 1562 1563 1564 1565 1566 1567 1568 1569 1570 1571 1572 1573 1574 1575 1576 1577 1578 1579 1580 1581 1582 1583 1584 1585 1586 1587 1588 1589 1590 1591 1592 1593 1594 1595 1596 1597 1598 1599 1600 1601 1602 1603 1604 1605 1606 1607 1608 1609 1610 1611 1612 1613 1614 1615 1616 1617 1618 1619 1620 1621 1622 1623 1624 1625 1626 1627 1628 1629 1630 1631 1632 1633 1634 1635 1636 1637 1638 1639 1640 1641 1642 1643 1644 1645 1646 1647 1648 1649 1650 1651 1652 1653 1654 1655 1656 1657 1658 1659 1660 1661 1662 1663 1664 1665 1666 1667 1668 1669 1670 1671 1672 1673 1674 1675 1676 1677 1678 1679 1680 1681 1682 1683 1684 1685 1686 1687 1688 1689 1690 1691 1692 1693 1694 1695 1696 1697 1698 1699 1700 1701 1702 1703 1704 1705 1706 1707 1708 1709 1710 1711 1712 1713 1714 1715 1716 1717 1718 1719 1720 1721 1722 1723 1724 1725 1726 1727 1728 1729 1730 1731 1732 1733 1734 1735 1736 1737 1738 1739 1740 1741 1742 1743 1744 1745 1746 1747 1748 1749 1750 1751 1752 1753 1754 1755 1756 1757 1758 1759 1760 1761 1762 1763 1764 1765 1766 1767 1768 1769 1770 1771 1772 1773 1774 1775 1776 1777 1778 1779 1780 1781 1782 1783 1784 1785 1786 1787 1788 1789 1790 1791 1792 1793 1794 1795 1796 1797 1798 1799 1800 1801 1802 1803 1804 1805 1806 1807 1808 1809 1810 1811 1812 1813 1814 1815 1816 1817 1818 1819 1820 1821 1822 1823 1824 1825 1826 1827 1828 1829 1830 1831 1832 1833 1834 1835 1836 1837 1838 1839 1840 1841 1842 1843 1844 1845 1846 1847 1848 1849 1850 1851 1852 1853 1854 1855 1856 1857 1858 1859 1860 1861 1862 1863 1864 1865 1866
How to secure your computer and surf fully #anonymous BLACK-HAT STYLE
 
 
Linux - Manually Partitioning Your Drive
June 4, 2015 at 9:59am
Linux - Manually Partitioning Your Drive
Obviously if you decide to go with manually partitioning your drive you will need to consider the kinds of activities that are likely to occur on your system, this will determine what partitions you’ll need. This is completely up to you, however, generally the following parts of the Linux file system are good candidates to get their own partition (pick and choose the ones you think you will require).
 
/ (root)  
 
– it is always a good idea to create the root partition last. Since this partition will contain all the data which you decide not to put in a partition of it’s own, the size required can change drastically. If everything else has it’s own partition then this doesn’t need to be much bigger than 2Gb or so. However, if you decide not to have a separate partition for something else, you will need to increase the size of this partition accordingly.
– this is the root of the file system (clearly :)) and will always get it’s own partition. Anything that doesn’t get a partition of it’s own will become part of the root partition.
The root partition / must always physically contain /etc, /bin, /sbin, /lib and /dev, otherwise you won't be able to boot. Typically 150–310MB is needed for the root partition.
 
/boot  
 
– usually don’t need more than 200Mb but disk space is cheap so give it 500Mb (0.5Gb).
– the kernel and various other data needed for the system to boot live here. This partition can usually be pretty small. The data on this partition changes very infrequently and therefore you may not even need the ext3 file system on it (it can use ext2 instead) and having it as a separate partition can facilitate this.
 
swap
 
– depends on amount of RAM, but for modern system with lots of RAM, make it the same size as the amount of RAM you have (e.g. 2Gb RAM – 2Gb swap)
– the swap partition is used to temporarily store data when the system does not have enough RAM for it’s current tasks. As a guide the swap partition should be double the size of system RAM and doesn’t need to be bigger than about 2 gigabytes. These days, systems often have more than 2Gb of RAM, but you do still need a swap partition (a system could, technically speaking, function without a swap partition, but I wouldn’t recommend it). Considering that disk space is so cheap these days, it is usually not an issue to have a 2Gb (or more) swap partition. The swap partition is never mounted and so does not get a mount point of it’s own (i.e. you won’t be able to browse the files on your swap partition).
 
/tmp  
 
/tmp: temporary data created by programs will most likely go in this directory. 40–100MB should usually be enough. Some applications — including archive manipulators, CD/DVD authoring tools, and multimedia software — may use /tmp to temporarily store image files. If you plan to use such applications, you should adjust the space available in /tmp accordingly.
– this one is pretty self explanatory. It can be used as a temporary space to store files or for programs to write temporary data. Strictly speaking you don’t really need a separate partition for this, but it certainly won’t hurt.  
– once again depends on how you plan to use your system (yeah I know, it always depends :)). This one is normally less important, give it around 10Gb.  
 
/home
 
/home: every user will put his personal data into a subdirectory of this directory. Its size depends on how many users will be using the system and what files are to be stored in their directories. Depending on your planned usage you should reserve about 100MB for each user, but adapt this value to your needs. Reserve a lot more space if you plan to save a lot of multimedia files (pictures, MP3, movies) in your home directory.
– this is where the home directories of all users of your system will live. Having this as a separate partition allows you to reinstall the operating system without losing all your personal data. The other advantage is, if you have a multi-user system, a single user won’t be able to fill up the whole drive with their data and crash the system (at most only this partition will get filled up).
– this one depends on how you plan to use the system, how many users you plan to have and the kind of work they plan to do. It is hard to give a guide for this one, however for a single heavy user (lots of data in home directory), you can plan anywhere between 20Gb – 100Gb or more.
 
/usr  
 
/usr:  contains all user programs (/usr/bin), libraries (/usr/lib), documentation(/usr/share/doc), etc. This is the part of the file system that generally takes up most space. You should provide at least 500MB of disk space. This amount should be increased depending on the number and type of packages you plan to install. A generous workstation or server installation should allow 4–6GB.
It is now recommended to have /usr on the root partition /, otherwise it could cause some trouble at boot time. This means that you should provide at least 600–750MB of disk space for the root partition including /usr, or 5–6GB for a workstation or a server installation.
– most of the packages you install on the system will end up here. Having this as a separate partition will allow you to backup or export this partition to another system easily (if you need to).
– depends on how many packages you plan to install on your system. For standard number of packages plan around 4Gb, for lots of packages anywhere up to 20Gb or more. For a regular home system, 20Gb should be plenty.  
 
/usr/local
 
– many additional packages (those other than Ubuntu core packages, if you’re using Ubuntu), will end up here. Some of the software packages you compile from source will also often end up here. You can have this one as a separate partition for similar reasons to/usr.
– once again depends on how many packages you plan to install, but as disk space is cheap, for a regular home system you can make this one the same size as /usr.
 
/opt    
 
– other packages you install and compile from source get installed here, so once again, for similar reasons to /usr and /usr/local – you might want a separate partition for it.
– similar situation as /usr and /usr/local here, make it the same size as the other two.
 
/var
 
/var : variable data like news articles, e-mails, web sites, databases, the packaging system cache, etc. will be placed under this directory. The size of this directory depends greatly on the usage of your system, but for most people will be dictated by the package management tool's overhead. If you are going to do a full installation of just about everything Debian has to offer, all in one session, setting aside 2 or 3 GB of space for /var should be sufficient. If you are going to install in pieces (that is to say, install services and utilities, followed by text stuff, then X, ...), you can get away with 300–500 MB. If hard drive space is at a premium and you don't plan on doing major system updates, you can get by with as little as 30 or 40 MB.
 – the data here usually changes frequently (hence the name). Much of the system log data, package and accounting information resides here. It is a good idea to have it as a separate partition, if someone runs a job that consumes a lot of disk, this area won’t be affected and you will still have the information you need (such as logs) to diagnose the problem. The only caveat if you’re using Ubuntu is the fact that, the Apache web server will store all it’s web content under /var. So if you’re planning to use the system as a web server, it might be prudent to configure a different location for Apache to use.  
– if you don’t plan to run many severs this doesn’t need to be too big, so around  2Gb should be enough. If you do plan to run a few servers, this may need to be much bigger(depending on what servers you plan to run). Use your judgment here and remember that disk space is not expensive. To give yourself some future flexibility make this one around 20Gb.
 
 
/var/log
 
– system logs usually live here, and so it may be a good idea to isolate the system logs from other parts of the system, considering how important logs can be do diagnose problems when something goes wrong.
 
 
Linux Mount Points
June 4, 2015 at 9:50am
Linux Mount Points
 
1.          / (known as root)                it is always a good idea to create the root partition last !!!
 
2.           swap             the swap partition is used to temporarily store data when the system does not have       enough RAM for it’s current tasks   make it the 1.5  or 2  size as the amount of RAM you have (e.g. 2Gb RAM – 2Gb swap)  
 
3.           /home           Having this as a separate partition allows you to reinstall the operating system without losing all your personal data ( it is like a storage place )  
 
4.           /boot             the kernel and various other data needed for the system to boot live here  (it can use ext2 instead)
 
5.           /tmp              once again depends on how you plan to use your system  
 
6.           /usr                  for lots of packages anywhere up to 20Gb or more, most of the packages you install on the system will end up here. Having this as a separate partition will allow you to backup or export this partition to another system easily
 
7.           /usr/local     once again depends on how many packages you plan to install, you can make this one the same size as /usr.  
 
 
8.           /opt               similar situation as /usr and /usr/local here, make it the same size as the other two
 
 
9.           /var                 depending on what servers you plan to run
 
 
10.       /var/log    
 
 
LINUX DISTROS
June 2, 2015 at 10:22am
LINUX DISTROS (Distribution category: Sucurity)
 
 
 
1. Kali Linux
 
http://distrowatch.com/kali  
http://www.kali.org/
http://forums.kali.org/
 
Kali Linux (formerly known as BackTrack) is a Debian-based distribution with a collection of security and forensics tools. It features timely security updates, support for the ARM architecture, a choice of four popular desktop environments, and seamless upgrades to newer versions.
 
2. Tails
 
http://distrowatch.com/tails  
https://tails.boum.org/
https://tails.boum.org/support/index.en.html
https://mailman.boum.org/listinfo/
 
The Amnesic Incognito Live System (Tails) is a Debian-based live CD/USB with the goal of providing complete Internet anonymity for the user. The product ships with several Internet applications, including web browser, IRC client, mail client and instant messenger, all pre-configured with security in mind and with all traffic anonymised. To achieve this, Incognito uses the Tor network to make Internet traffic very hard to trace.
 
3. Alpine Linux
 
http://distrowatch.com/alpine
http://www.alpinelinux.org/
http://lists.alpinelinux.org/
 
Alpine Linux is a community developed operating system designed for x86 routers, firewalls, VPNs, VoIP boxes and servers. It was designed with security in mind; it has proactive security features like PaX and SSP that prevent security holes in the software to be exploited. The C library used is musl and the base tools are all in BusyBox. Those are normally found in embedded systems and are smaller than the tools found in GNU/Linux systems.
 
4. BackBox Linux
 
http://distrowatch.com/backbox
http://www.backbox.org/
http://groups.google.com/group/backbox-linux
http://forum.backbox.org/
 
BackBox Linux is an Ubuntu-based distribution developed to perform penetration tests and security assessments. It is designed to be fast and easy to use. It provides a minimal yet complete desktop environment, thanks to its own software repositories, which are always updated to the latest stable versions of the most often used and best-known ethical hacking tools.
 
 
5. ClearOS  
 
http://distrowatch.com/clearos
https://clearos.com/
https://clearos.com/clearfoundation/social/community
 
ClearOS Enterprise is a server, network, and gateway platform designed for small businesses and distributed enterprise environments. ClearOS Enterprise is based upon ClearOS Core which is a rebuild of Red Hat Enterprise Linux. The distribution is flexible and includes an extensive list of features and integrated services which can be configured through a web-based interface. Some of the tools found in ClearOS Enterprise include anti-virus, anti-spam, VPN, content filtering, bandwidth manager, file services, SMTP services, print services, SSL certification, and web services. ClearOS includes a marketplace which simplifies the installation of software including 3rd party modules. The distribution is provided as a free download, inclusive of basic OS updates with free registration.
 
6. Wifislax
 
http://distrowatch.com/wifislax
http://www.wifislax.com/
http://foro.seguridadwireless.net/live-wifislax/
 
Wifislax is a Slackware-based live CD containing a variety of security and forensics tools. The distribution's main claim to fame is the integration of various unofficial network drivers into the Linux kernel, thus providing out-of-the-box support for a large number of wired and wireless network cards.
 
7. OpenBSD
 
http://distrowatch.com/openbsd  
http://www.openbsd.org/
http://www.openbsd.org/mail.html
http://www.openbsd.org/ftp.html  
http://www.openbsd.org/report.html
 
The OpenBSD project produces a free, multi-platform BSD 4.4-based UNIX-like operating system. Its efforts emphasize portability, standardisation, correctness, proactive security and integrated cryptography. The project also develops the widely-used and popular OpenSSH (OpenBSD Secure Shell) software, which provides encrypted communication sessions over a computer network using the SSH protocol.
 
8. BlackArch Linux
 
http://distrowatch.com/blackarch
http://blackarch.org/
http://blackarch.org/guide.html
http://blackarch.org/download.html
https://github.com/BlackArch/blackarch/issues
 
BlackArch Linux is an Arch Linux-based distribution designed for penetration testers and security researchers. It is supplied as a live DVD image that comes with several lightweight window managers, including Fluxbox, Openbox, Awesome and spectrwm. It ships with over a thousand specialist tools for penetration testing and forensic analysis.
 
 
9. Qubes OS  
 
http://distrowatch.com/qubes
http://qubes-os.org/
http://groups.google.com/group/qubes-devel
http://wiki.qubes-os.org/
http://qubes-os.org/Screenshots.html
https://wiki.qubes-os.org/wiki/QubesDownloads
 
Qubes OS is a security-oriented, Fedora-based desktop Linux distribution whose main concept is "security by isolation" by using domains implemented as lightweight Xen virtual machines. It attempts to combine two contradictory goals: how to make the isolation between domains as strong as possible, mainly due to clever architecture that minimises the amount of trusted code, and how to make this isolation as seamless and easy as possible.
 
10. Pentoo
 
http://distrowatch.com/pentoo
http://www.pentoo.ch/
http://forums.pentoo.ch/
http://www.pentoo.ch/docs/
http://www.pentoo.ch/download/
https://code.google.com/p/pentoo/issues/list
 
Pentoo is a Gentoo-based Linux live CD with a selection of applications and tools designed to perform penetration testing.
 
11. Zentyal Server  
 
http://distrowatch.com/zentyal
http://www.zentyal.org/
http://lists.zentyal.org/
http://forum.zentyal.org/
http://wiki.zentyal.org/  
http://trac.zentyal.org/screenshots
http://www.zentyal.org/downloads/
http://tracker.zentyal.org/
 
Zentyal Server (formerly eBox Platform) is a unified network server that offers easy and efficient computer network administration for small and medium-size businesses. It can act as a gateway, an infrastructure manager, a unified threat manager, an office server, a unified communication server or a combination of them. These functionalities are tightly integrated, automating most tasks, avoiding mistakes and saving time for system administrators. Zentyal is released under the GNU General Public License (GPL) and runs on top of Ubuntu.
 
12. Openwall GNU/*/Linux
 
http://distrowatch.com/openwall
http://www.openwall.com
http://www.openwall.com/lists/
http://www.openwall.com/Owl/INSTALL.shtml
http://openwall.info/wiki/  
http://www.openwall.com/Owl/screenshots
http://www.openwall.com/Owl/DOWNLOAD.shtml
 
Openwall GNU/*/Linux (or Owl for short) is a small security-enhanced Linux distribution for servers, appliances, and virtual appliances. Owl live CDs with remote SSH access are also good for recovering or installing systems (whether with Owl or not). Another secondary use is for operating systems and/or computer security courses, which benefit from the simple structure of Owl and from the inclusion of the complete build environment.
 
13. Lightweight Portable Security  
 
http://distrowatch.com/lps
http://www.spi.dod.mil/lipose.htm
http://www.spi.dod.mil/docs/lpsmanual.pdf  
http://www.spi.dod.mil/lipose.htm
 
Lightweight Portable Security (LPS) is a Linux-based live CD with a goal of allowing users to work on a computer without the risk of exposing their credentials and private data to malware, key loggers and other Internet-era ills. It includes a minimal set of applications and utilities, such as the Firefox web browser or an encryption wizard for encrypting and decrypting personal files. The live CD is a product produced by the United States of America's Department of Defence and is part of that organization's Software Protection Initiative.
 
14. Network Security Toolkit
 
http://distrowatch.com/nst
http://www.networksecuritytoolkit.org/
http://sourceforge.net/forum/forum.php?forum_id=361524
http://wiki.networksecuritytoolkit.org/
http://nst.sourceforge.net/nst/screenshots/index.html
http://sourceforge.net/projects/nst/files/
http://sourceforge.net/apps/trac/nst/report
 
Network Security Toolkit (NST) is a bootable live CD based on Fedora Core. The toolkit was designed to provide easy access to best-of-breed open source network security applications and should run on most x86 platforms. The main intent of developing this toolkit was to provide the network security administrator with a comprehensive set of open source network security tools. What we find rather fascinating with NST is that we can transform most x86 systems (Pentium II and above) into a system designed for network traffic analysis, intrusion detection, network packet generation, wireless network monitoring, a virtual system service server, or a sophisticated network/host scanner.
 
15. MirOS BSD  
 
http://distrowatch.com/miros
http://www.mirbsd.org/
http://www.mirbsd.org/rss.htm
http://www.mirbsd.org/getting.htm
 
MirOS is an operating system based on OpenBSD and synchronised with the ongoing development of its parent. The most important differences between OpenBSD and MirOS include a completely rewritten bootloader and boot manager, a slim base system without NIS, Kerberos, BIND and i18n, binary security updates for stable releases, and current versions of the GNU developer toolchain.
 
16. NetSecL OS
 
http://distrowatch.com/netsecl
http://netsecl.com/
http://forum.netsecl.com/
http://netsecl.com/gallery
http://netsecl.com/download
 
NetSecL is a security-focused distribution and live DVD based on openSUSE (starting from version 3.0, previous versions were based on Slackware Linux). To improve the security aspect of the distribution, servers have been removed, incoming ports closed and services turned off. Additionally, several penetration tools have been included.
 
17. SELKS  
 
http://distrowatch.com/selks
https://www.stamus-networks.com/open-source/#selks
https://github.com/StamusNetworks/SELKS/wiki
https://www.stamus-networks.com/open-source/#selks
https://github.com/StamusNetworks/SELKS/issues
 
SELKS, a product of Stamus Networks, is a Debian-based live distribution designed for network security management. It provides a complete and ready-to-use Suricata IDS/IPS ecosystem with its own graphic rule manager. The system also includes Kibana IDS/NSM dashboards (for visualising logs and other time-stamped data) a Scirius (a rules management interface for Suricata). SELKS is released under the GNU GPLv3 licence.
 
18. REMnux
 
http://distrowatch.com/remnux
http://sourceforge.net/projects/remnux/files/
 
REMnux is a lightweight, Ubuntu-based Linux distribution for assisting malware analysts with reverse-engineering malicious software. It incorporates a number of tools for analysing malicious executables that run on Microsoft Windows, as well as browser-based malware, such as Flash programs and obfuscated JavaScript. The toolkit also includes programs for analysing malicious documents, such PDF files, and utilities for reverse-engineering malware through memory forensics.  
 
 
How to secure your computer and surf fully #anonymous BLACK-HAT STYLE (Part 1)
December 27, 2013 at 12:49am
 
 
How to secure your computer and surf fully #anonymous BLACK-HAT STYLE
=== The Ultimate Guide for Anonymous and Secure Internet Usage v1.0.1 ===
 
 
This is a guide with which even a total noob can get high class security for his system and complete anonymity online. But its not only for noobs, it contains a lot of tips most people will find pretty helpfull. It is explained so detailed even the biggest noobs can do it^^ :
 
 
=== The Ultimate Guide for Anonymous and Secure Internet Usage v1.0.1 ===
 
Table of Contents:
 
1. Obtaining Tor Browser
2. Using and Testing Tor Browser for the first time
3. Securing Your Hard Drive
4. Setting up TrueCrypt, Encrypted Hidden Volumes
5. Testing TrueCrypt Volumes
6. Securing your Hard Disk
7. Temporarily Securing Your Disk, Shredding Free Space
8. Installing VirtualBox
9. Installing a Firewall
10. Firewall Configuration
11. Installing Ubuntu
12. Ubuntu Initial Setup
13. Installing Guest Additions
14. Installing IRC (Optional)
15. Installing Torchat (Optional)
16. Creating TOR-Only Internet Environment
17. General Daily Usage
 
By the time you are finished reading and implementing this guide, you will be able to securely and anonymously browse any website and to do so anonymously. No one not even your ISP or a government agent will be able to see what you are doing online. If privacy and anonymity is important to you, then you owe it to yourself to follow the instructions that are presented here.
 
In order to prepare this guide for you, I have used a computer that is running Windows Vista. This guide will work equally well for other versions of Windows. If you use a different operating system, you may need to have someone fluent in that operating system guide you through this process. However, most parts of the process are easily duplicated in other operating systems.
 
I have written this guide to be as newbie friendly as possible. Every step is fully detailed and explained. I have tried to keep instructions explicit as possible. This way, so long as you patiently follow each step, you will be just fine.
 
In this guide from time to time you will be instructed to go to certain URLs to download files. You do NOT need TOR to get these files, and using TOR (while possible) will make these downloads very slow.
 
This guide may appear overwhelming. Every single step is explained thoroughly and it is just a matter of following along until you are done. Once you are finished, you will have a very secure setup and it will be well worth the effort. Even though the guide appears huge, this whole process should take at the most a few hours. You can finish it in phases over the course of several days.
 
It is highly recommended that you close *ALL* applications running on your computer before starting.
 
---------------------------------------------------------------------------
 
Next:1 : Obtaining Tor Browser
 
=== 1 : Obtaining Tor Browser ===
 
The first step to becoming secure and anonymous online is to setup and install something called "TOR". "TOR" is short for "The Onion Router". The concepts behind TOR were first implemented by the United States Military, and these principles have been used to create an extremely secure mechanism for being anonymous online. In fact, millions of people world-wide use TOR to browse the internet and communicate anonymously.
 
TOR works by heavily encrypting your communications so that no observer can see what website you are really going to, and what information is really being sent. It all appears as a bunch of random characters to any observer. You simply use the TOR web browser just as you use any other web browser. TOR takes care of the rest.
 
However, TOR by itself is not enough. Even when using TOR, a user can be compromised in a number of ways. First, some websites can be set up to attempt to reveal someone's true IP address (their true identity) by tricking their web browser or other software to transmitting that information. For this reason, anyone who uses TOR will recommend that no one have javascript or flash turned on while browsing TOR. In this guide however, I will show you a much better solution.
 
The second issue is that of human error. Even if you have TOR installed, you may accidentally forget which browser to put in a link. You may also accidentally click on a link from another program, such as a chat program. That program might then load the link you clicked on into a non-TOR browser. When you are using TOR, you must be careful *constantly* that every link goes into the right browser, and that you do not accidentally click the wrong link.
 
So then, let's begin. Obtaining the TOR Browser is easy. Simply go to the following website:
 
http://www.torproject.org
 
Once here, you may feel free to read more about what TOR is and how it works, or you may proceed to immediately download TOR.
 
Here is how to do so:
 
1. Click on "Download TOR", or "Download".
 
2. You will see text that says, "The Tor Browser Bundle contains everything you ned ... Just extract it and run. Learn more >>
 
3. Click on this "Learn more" link. for the "Tor Browser Bundle"
 
4. Assuming you are an English speaker, you would choose the top-most link "English (en-US)". Otherwise, pick the language best suited to you.
 
5. The file being saved will be named: tor-browser-1.3.18_en-US.exe
 
It is ok if the number is not exactly 1.3.18, there are new versions of Tor from time to time. At the time that this guidewas written, 1.3.18 was most current. By the time you are reading this, a more current version of TOR may exist.
 
6. Run this file.
 
7. You will be prompted to extract this to a directory. By default, it will be set to C:UsersYouDownloads This is perfectly ok. You can also choose a different directory if you wish.
 
8. Click "Extract"
 
That's it. TOR Browser is NOW installed. Time to test it out!
 
 
How to secure your computer and surf fully #anonymous BLACK-HAT STYLE (Part 2)
December 27, 2013 at 12:51am
 
 
How to secure your computer and surf fully #anonymous BLACK-HAT STYLE (Part 2)
=== The Ultimate Guide for Anonymous and Secure Internet Usage v1.0.1 ===
 
 
 
Next 2 : Using and Testing Tor Browser for the first time ===
 
 
=== 2 : Using and Testing Tor Browser for the first time ===
 
Now you have successfully downloaded and installed the Tor Web Browser Bundle. You are no doubt anxious to begin using it. First, click on the "start" menu icon, the icon in the lower left of your screen with the windows logo. On the top right will be a listing that says "You", "Documents", "Pictures", "Music"... "You" of course will be replaced by your user name. Click on "You", the top most link. This will open up your main user folder.
 
Now, locate the folder called "Downloads" and double click on it.
 
Now, inside the "Downloads" folder, double click on the folder called "Tor Browser".
 
Lastly, double click on the application: "Start Tor Browser"
 
When you do, you will see the Vidalia Control Panel appear, and you will observe as you connect to the TOR network. When this is complete, your web browser will open up and will automatically connect to the web address: check.torproject.org
 
This is to confirm that you are in fact using TOR. If you have followed this guide correctly, then you will see the following green text, or something similar:
 
"Congratulations. Your browser is configured to use Tor."
 
Now you can use this web browser the same as any other. You can go to any website you wish, and neither your ISP or anyone else will be able to see where you are going, or what you are doing. However, there are still issues that need to be resolved, so don't begin browsing just yet.
 
*************************************
***** IMPORTANT SAFETY NOTE *****
*************************************
If you fill out a form containing your email address, your name, or any other sensitive information while using the TOR browser, be aware that sometimes it is possible for an observer to see that information. When using TOR, use it to access websites and content that you are *not* connected to via your real identity or any username or nick name which links to your real identity. Let TOR be for anonymous browsing solely. Do your online banking, or any other activities involving your real identity using your normal web browser.
************************************
 
 
How to secure your computer and surf fully #anonymous BLACK-HAT STYLE (Part 3)
December 27, 2013 at 12:58am
 
 
How to secure your computer and surf fully #anonymous BLACK-HAT STYLE (Part 3)
=== The Ultimate Guide for Anonymous and Secure Internet Usage v1.0.1 ===
 
Next: 3 : Securing Your Hard Drive ===
 
 
=== 3 : Securing Your Hard Drive ===
 
Being able to browse anonymously is one thing. However, you may choose to download and save sensitive content or material to your computer which you wish to keep private. This may include reading sensitive documents, viewing pictures, or storing any kind of sensitive data.
 
If you save *anything* to your computer's harddrive, then it is possible for someone who has confiscated your computer to determine what it was you saved. This is often true even if you delete the content. For example, suppose I use the Tor Browser and I navigate to a website containing a sensitive document that I wish to read. If I saved that document somewhere on my harddrive, then it is possible for someone else to find it. If I *delete* that document, it may still be possible for someone to undelete it.
 
Further, even if I never save it to my harddrive but I simply look at it using my word processing software, it may still be saved in a number of ways including:
 
1. Often programs keep records of filenames. The filename alone is often enough to incriminate someone.
 
2. Often programs keep parts of the content viewed saved for various reasons, such as for searching. This can include random excerpts of text, thumbnails of images, and more. Often this "partial" data is more than enough to prove what the original data was. Often  the "partial" data is itself incriminating.
 
3. Sometimes, especially if you are running low on system memory, your operating system may choose to use your hard-disk as a temporary RAM. This is known as "SWAP". Normally, whenever you turn off your computer, whatever was in RAM is deleted. However, the data that goes to your SWAP may persist and it may be possible for someone to see what content you had open in your programs if that information is saved in RAM.
 
Generally speaking, you *must* have a plan to secure any content that is saved to your hard disk. Therefore, this guide would be incomplete if we did not thoroughly address this. First, there are two kinds of such content:
 
1. Deliberately saved content.
2. Inadvertently saved content.
 
Deliberately saved content refers to content that you have chosen to save on your harddisk so that you can access this content later. We will
address how to do this later in the guide.
 
Inadvertently saved content refers to content that is saved by programs you use, or your operating system. You have no way to even know what this content might be. Therefore, this is the most dangerous. You may browse and find a dozen sensitive documents, utterly delete them, and some program may have saved the file names and excerpts of the data. This will render your previous efforts futile.
 
Content that is inadvertently saved to your harddisk comes in two flavors:
 
1. Content that is saved to your SWAP space.
 
2. Content that is saved by applications running on your computer, including your operating system.
 
The surest way to prevent content from writing to your SWAP space is to disable your SWAP space altogether. This may result in your computer
running a bit slower than normal, and may mean that you cannot use ram intensive games and applications during the time your SWAP is disabled.
 
Therefore, if you use this method, simply turn back on the SWAP when you want to use those ram intensive applications. Also, you may choose not
to take this step.
 
 
1 - Here is how to disable your swap space if you are using Windows 7:
 
*** ADVANCED INSTRUCTIONS BELOW. SKIP THIS IF YOU ARE NOVICE OR UNCOMFORTABLE WITH THIS OPERATION ***
 
*This step is recommended for advanced users only. If you are not comfortable doing this, you may safely skip this step.*
 
Instructions are less verbose than usual, as these steps are intended for advanced users only. If you do not fully understand these instructions, skip this step.
 
1. From Control Panel, go to "System and Security".
 
2. Click on "System", and then choose "Advanced system settings" in the left-most menu.
 
3. Under the "Advanced" tab, under "Performance", click "Settings".
 
4. Under this "Advanced" tab, under "Virtual Memory", click "Change".
 
5. Uncheck "Automatically manage paging file sizes for all drives".
 
6. Select "No paging file".
 
7. Save, reboot, and follow these same first 5 steps to confirm that "No paging file" is still selected. This means that you have successfully disabled your swap. This means that *nothing* from RAM will be inadvertently saved to your harddrive.
 
To resume using SWAP again, simply click "Automatically manage paging file size for all drives." You can switch between these two modes as you desire.
 
Generally speaking, your computer will run fine without a swap file, provided you have enough RAM.
 
*** END OF ADVANCED INSTRUCTIONS ***
 
The next issue we need to address is how to prevent applications and/or your operating system from saving content inadvertently that you do not want
saved. For this, we are going to set up a "Virtual Machine".
 
A "Virtual Machine" is like a computer inside of your computer. Everything you do inside the Virtual Machine (vm for short) will be fully contained within
itself and no one will be able to see what the vm has been doing. Ideally, you want *ALL* of your sensitive computer usage of any kind, TOR or NON TOR, to take place within a vm. In this way, you can keep everything private that you wish while still using your computer fully and getting the most out of it.
 
 
Don't be afraid of this sounds complicated. This guide will take you through every step slowly and methodically. Before we can set up a vm however, we need to take another step.
 
 
How to secure your computer and surf fully #anonymous BLACK-HAT STYLE (Part 4)
December 27, 2013 at 1:17am
 
 
How to secure your computer and surf fully #anonymous BLACK-HAT STYLE (Part 4)
=== The Ultimate Guide for Anonymous and Secure Internet Usage v1.0.1 ===
 
Next: 4 : Setting up TrueCrypt, Encrypted Hidden Volumes ===
 
=== 4 : Setting up TrueCrypt, Encrypted Hidden Volumes ===
 
If you save anything on your computer, it is likely that you do not want just anyone to be able to see what you have saved. You want a way to protect that
information so that you can access it, and absolutely no one else except those you trust. Therefore, it makes sense to set up a system which protects your information and safeguards it against prying eyes.
 
The best such system for this is called "True Crypt". "True Crypt" is an encryption software program which allows you to store many files and directories inside of a single file on your harddrive. Further, this file is encrypted and no one can actually see what you have saved there unless they know your password.
 
This sounds extremely high tech, but it is actually very easy to set up. We are going to do so, right now:
 
1. Go to http://www.truecrypt.org/downloads (or go to http://www.truecrypt.org, and click on "Downloads")
2. Under "Latest Stable Version", under "Windows 7/Vista/XP/2000", click "Download"
3. The file will be called "True Crypt Setup 7.0a.exe" or something similar. Run this file.
4. If prompted that a program needs your permission to continue, click "Continue".
5. Check "I accept and agree to be bound by these license terms"
6. Click "Accept"
7. Ensure that "Install" is selected, and click "Next"
8. click "Install"
9. You will see a dialog stating "TrueCrypt has been successfully installed." Click "Ok"
10. Click "No" when asked if you wish to view the tutorial/user's guide.
11. Click "Finish"
 
At this point, TrueCrypt is now installed. Now we will set up truecrypt so that we can begin using it to store sensitive information.
 
1. Click the "Windows Logo"/"Start" button on the lower left corner of your screen.
2. Click "All Programs"
3. Click "TrueCrypt"
4. Click the "TrueCrypt" application
 
And now we can begin:
 
1. click the button "Create Volume"
2. Ensuring that "Create an encrypted file container" is selected, click "Next"
3. Select "Hidden TrueCrypt volume" and click "Next".
4. Ensuring that "Normal mode" is selected, click "Next"
5. Click on "Select File"
 
Note which directory you are in on your computer. Look at the top of the dialog that has opened and you will see the path you are in, most likely the home directory for your username. An input box is provided with a flashing cursor asking you to type in a file name. Here, you will type in the following filename:
 
random.txt
 
You may of course replace random.txt with anything you like. This file is going to be created and will be used to store many other files inside.
Do NOT use a filename for a file that already exists. The idea here is that you are creating an entirely new file.
 
It is also recommended though not required that you "hide" this file somewhere less obvious. If it is in your home directory, then someone who has
access to your computer may find it easier. You can also choose to put this file on any other media, it doesn't have to be your hard disk. You could for example save your truecrypt file to a usb flash drive, an sd card, or some other media. It is up to you.
 
6. Once you have typed in the file name, click "Save"
7. Make sure "Never save history" is checked.
8. Click "Next"
9. On the "Outer Volume" screen, click "Next" again.
10. The default Encryption Algorithm and Hash Algorithm are fine. Click "Next"
11. Choose a file size.
 
In order to benefit the most from this guide, you should have at least 10 gigabytes of free disk space. If not, then it is worth it for you to purchase
some form of media (such as a removable harddrive, a large sd card, etc.) in order to proceed. TrueCrypt can be used on all forms of digital media not just your hard disk. If you choose to proceed without obtaining at least ten gigabytes of disk space, then select a size that you are comfortable with
(such as 100 MB).
 
Ideally, you want to choose enough space to work with. I recommend 20 GB at least. Remember that if you do need more space later, you can always create additional TrueCrypt volumes using exactly these same steps.
 
12. Now you are prompted for a password. THIS IS VERY IMPORTANT. READ THIS CAREFULLY
 
*** READ THIS SECTION CAREFULLY ***
 
*** The password you choose here is a decoy password. That means, this is the password you would give to someone under duress. Suppose that someone suspects *** that you were accessing sensitive information and they threaten to beat you or worse if you do not reveal the password. THIS is the password that you  *** give to them. When you give someone this password, it will be nearly impossible for them to prove that it is not the RIGHT password. Further, they cannot *** even know that there is a second password.
 
Here are some tips for your password:
 
A. Choose a password you will NEVER forget. It may be ten years from now that you need it. Make it simple, like your birthday repeated three times.
B. Make sure it seems reasonable, that it appears to be a real password. If the password is something stupid like "123" then they may not believe you.
C. Remember that this is a password that you would give to someone if forced. It is *NOT* your actual password.
D. Do not make this password too similar to what you plan to really use. You do not want someone to guess your main password from this one.
 
And with all of this in mind, choose your password. When you have typed it in twice, click "Next".
 
13. "Large Files", here you are asked whether or not you plan to store files larger than 4 GIGABYTES. Choose "No" and click "Next"
14. "Outer Volume Format", here you will notice some random numbers and letters next to where it says "Random Pool". Go ahead and move your mouse around for a bit. This will increase the randomness and give you better encryption. After about ten seconds of this, click "Format".
15. Depending on the file size you selected, it will take some time to finish formatting.
 
"What is happening?"
 
TrueCrypt is creating the file you asked it to, such as "random.txt". It is building a file system contained entirely within that one file. This file system can be used to store files, directories, and more. Further, it is encrypting this file system in such a way that without the right password it will be impossible for anyone to access it. To *anyone* other than you, this file will appear to be just a mess of random characters. No one will even know that
it is a truecrypt volume.
 
16. "Outer Volume Contents", click on the button called, "Open Outer Volume"
 
An empty folder has opened up. This is empty because you have yet to put any files into your truecrypt volume.
 
*** *** DO NOT PUT ANY SENSITIVE CONTENT HERE *** ***
 
This is the "Decoy". This is what someone would see if you gave them the password you used in the previous step. This is NOT where you are going to store your sensitive data. If you have been forced into a situation where you had to reveal your password to some individual, then that individual will see whatever is in this folder. You need to have data in this folder that appears to be sensitive enough to be protected by truecrypt in order to fool them. Here are some important tips to keep in mind:
 
A. Do NOT use porn. Adult models can sometimes appear to be underaged, and this can cause you to incriminate yourself unintentionally.
B. Do NOT use drawings/renderings /writings of porn. In many jurisdictions, these are just as illegal as photographs.
C. Good choices for what to put here include: backups of documents, emails, financial documents, etc.
D. Once you have placed files into this folder, *NEVER* place any more files in the future. Doing so may damage your hidden content.
 
Generally, you want to store innocent data where some individual looking at it would find no cause against you, and yet at the same time they would understand why you used TrueCrypt to secure that data.
 
Now, go ahead and find files and store them in this folder. Be sure that you leave at least ten gigabytes free. The more the better.
 
When you are all done copying files into this folder, close the folder by clicking the "x" in the top right corner.
 
17. click "Next"
 
18. If prompted that "A program needs your permission to continue", click "Continue"
19. "Hidden Volume", click "Next"
20. The default encryption and hash algorithms are fine, click "Next"
21. "Hidden Volume Size", the maximum available space is indicated in bold below the text box. Round down to the nearest full unit. For example, if 19.97 GB is available, select 19 GB. If 12.0 GB are available, select 11 GB.
22. If a warning dialog comes up, asking "Are you sure you wish to continue", select "Yes"
23. "Hidden Volume Password"
 
*** IMPORTANT READ THIS ***
 
Here you are going to select the REAL password. This is the password you will NEVER reveal to ANYONE else under any circumstances. Only you will know it. No one will be able to figure it out or even know that there is a second password. Be aware that an individual intent on obtaining your sensitive information may lie to you and claim to be able to figure this out. They cannot.
 
It is HIGHLY recommended that you choose a 64 character password here. If it is difficult to remember a 64 character password, choose an 8 character password and simply repeat it 8 times. A date naturally has exactly 8 numbers, and a significant date in your life repeated 8 times would do just fine.
 
24. Type in your password twice, and click "Next"
25. "Large Files", select "Yes" and click "Next".
26. "Hidden Volume Format", as before move your mouse around for about ten seconds randomly, and tehn click "Format".
27. If prompted "A program needs your permission to continue", select "Continue"
28. A dialog will come up telling you that the hidden TrueCrypt volume has been successfully created. Click "Ok"
29. Click "Exit"
 
Congratulations! You have just set up an encrypted file container on your hard drive. Anything you store here will be inaccessible to anyone except you. Further, you have protected this content with TWO passwords. One that you will give to someone under threat, and one that only you will know. Keep your real password well protected and never write it down or give it to anyone else for any reason.
 
Now, we should test BOTH passwords.
 
 
How to secure your computer and surf fully #anonymous BLACK-HAT STYLE (Part 5)
December 27, 2013 at 1:19am
 
 
How to secure your computer and surf fully #anonymous BLACK-HAT STYLE (Part 5)
=== The Ultimate Guide for Anonymous and Secure Internet Usage v1.0.1 ===
 
Next:5. Testing TrueCrypt Volumes ===
 
=== 5. Testing TrueCrypt Volumes ===
 
Once you have completed the above section, you will be back at TrueCrypt. Go ahead and follow these steps to test the volumes you have made.
 
1. Click "Select File..."
2. Locate the file you created in the last section, most likely called "random.txt" or something similar. Remember that even though there is both an outer and
a hidden volume, both volumes are contained in a single file. There are not two files, only one.
3. Click "Open"
4. Choose a drive letter that you are not using (anything past M is probably just fine). Click on that, For example click on "O:" to highlight it.
5. Click "Mount"
6. Now you are prompted for a password. Read the below carefully:
 
The password you provide here will determine WHICH volume is mounted to the drive letter you specified. If you type in your decoy password, then O: will show all the files and directories you copied that you would reveal if forced. If you type in your real password, then O: will show the files and directories that you never intend anyone to see.
 
7. After successfully typing in your password, you will see additional detail to the right of the drive letter, including the full path to the file you selected
as well as the kind of volume it is (for example, hidden).
8. Right click on your "Windows Logo"/"Start Menu" icon, and scroll down to the bottom where you can see your different drive letters. You will see the drive letter you selected, for example: "Local Disk (O:)". Click on that.
9. If you selected your decoy password, you will see all the files and folders that you moved there during the installation phase. If you selected the real password, you will see whatever files and directories you have placed so far into the hidden volume, if any.
 
If you selected your hidden volume password, you may now begin moving any sensitive information you wish. Be aware that simply moving it from your main hard disk is not enough. We will discuss how to ensure deleted data is actually deleted later in the guide.
 
"What is happening?"
 
When you select a file and mount it to a drive, you are telling your computer that you have a new drive with files and folders on it. It is the same thing as if
you had plugged in a usb flash drive, a removable harddrive, or an sd card into your computer. TrueCrypt causes your computer to think that there is an
entirely new disk drive on your computer. You can use this disk drive just as if it *was* actually a usb flash drive. You can copy files to it, directories, and use it just as you would use a usb flash drive.
 
When you are done, simply close all open windows/folders/applications that are using your truecrypt drive letter, and then click "Dismount" from within TrueCrypt while you have the drive letter highlighted. This will once again hide all of this data, accessible only by re-mounting it with the correct password.
 
*** VERY IMPORTANT SAFETY INFORMATION ***
 
When a true crypt hidden volume is mounted, someone who has access to your computer can access anything that is inside that hidden volume. If for example you left your computer running while a truecrypt volume was mounted, then if someone gained access to your computer they would be able to see everything you have in that volume. Therefore:
 
*** ALWAYS REMEMBER TO DISMOUNT ANY TRUECRYPT VOLUME CONTAINING ANY SENSITIVE INFORMATION WHEN YOU ARE NOT USING YOUR COMPUTER ***
 
You can tell that it is dismounted because the drive letter inside of "TrueCrypt"'s control panel will appear the same as all of the other drive letters, with no information to the right of the drive letter.
 
You should practice Mounting and Dismounting a few times with both passwords to make sure you understand this process.
 
Once you have copied files/folders into the hidden volume, do *NOT* touch the files or folders in the outer volume anymore. Remember that both volumes occupy the same single file, and therefore changing the outer volume can damage the hidden volume. Once you have copied files/folders into the outer volume during the installation process, that is the last time you should do so. From that point forward, use ONLY the hidden volume. The outer volume exists only as a decoy if you need it.
 
 
How to secure your computer and surf fully #anonymous BLACK-HAT STYLE (Part 6)
December 27, 2013 at 1:22am
 
 
 
How to secure your computer and surf fully #anonymous BLACK-HAT STYLE (Part 6)
=== The Ultimate Guide for Anonymous and Secure Internet Usage v1.0.1 ===
 
Next:6. Securing your Disk ===
 
=== 6. Securing your Disk ===
This is an involved step which many people may not be able to do right away. If you cannot do this step immediately, then see section 7. At this point you should understand how to create and use TrueCrypt hidden volumes in order to safeguard any sensitive information. Therefore, you should *NOT* keep any such sensitive information on your hard disk. At this stage, there are two possibilities:1. You have never had any sensitive information on your hard disk. In this case, read this section but you can certainly skip it.2. Up until now, you have stored sensitive information on your hard disk. If so, then you MUST read this section. If you have ever used this computer to access sensitive information, then all of the security and precautions in the world are totally useless and futile because all someone has to do is access what is left of that sensitive information. I cannot stress this enough.You can have the most secure TrueCrypt volumes, use TOR, and be the safest most secure user in the world. If you have not made sure that *ALL* remnants of any sensitive information are UTTERLY REMOVED from your hard disk, then all of that effort is totally pointless. You MUST take these actions to safeguard your hard disk, or otherwise you might as well throw away this guide and follow none of the advice herein.First, I understand that it is troublesome to have to re-format a computer, to back everything up, and reinstall everything. However, if you have ever had sensitive information on your machine, that is what you have to do. Take the following steps:1. Obtain a removable harddrive or usb flash drive large enough to store anything you need to save.2. Set up a truecrypt hidden volume on that harddrive big enough to hold all of that information.3. Set up the truecrypt outer volume as in the previous section. Use the previous section as a guide if you need to. 4. Be sure you the hidden volume will have enough space to store all that you are backing up.5. Copy ALL data you need to back up/save into that hidden volume.
 
*** IMPORTANT, READ THIS ***
 If you have ever used this system to access sensitive information, then you must assume that the sensitive information or remnants of it can be *anywhere* on your hard disk. Therefore, you need to move *EVERYTHING* you intend to save into the hidden truecrypt container. You do not know where sensitive data might be, so you are assuming it can be anywhere. This way you still have ALL of your data and you have lost nothing. A good analogy is toxic waste. You don't know which barrel might contain the toxic waste, so you treat *ALL* the barrels as potentially toxic. This is the surest way you can protect yourself. You might be saying, "I have family photos, music, movies that I would have to move to the hidden volume." That is perfectly fine. Remember that you can access that hidden volume just as if it was a drive letter. In fact, ideally, *ALL* of the content on your computer (assuming you value your privacy) should be  protected anyways. You lose nothing by securing all of that data. 6. Once you have copied everything you intend to copy. dismount your hidden volume, reboot your computer, and re-mount your hidden volume to make sure everything is there.7. Now it is time to re-format your entire hard drive. Re-install your operating system of choice (such as Windows 7), and start with a clean slate. 8. Once you have reinstalled your operating system from scratch, follow sections one through five of this guide to reach this point, and then proceed.
 
 
How to secure your computer and surf fully #anonymous BLACK-HAT STYLE (Part 7)
December 27, 2013 at 1:24am
 
 
 
How to secure your computer and surf fully #anonymous BLACK-HAT STYLE (Part 7)
=== The Ultimate Guide for Anonymous and Secure Internet Usage v1.0.1 ===
 
Next:7. Temporarily Securing Your Disk, Shredding Free Space ===
 
 
=== 7. Temporarily Securing Your Disk, Shredding Free Space ===
 
Like the previous section, this section applies ONLY IF there is some risk that sensitive data has ever been stored or accessed on this computer. If you are 100% sure that sensitive information has never been accessed using this computer, then you can safely skip this and the previous step.
 
If you are not prepared to take the actions in the previous step yet, then you should follow the steps in this section until you can. However, you MUST eventually take the actions in step six above. Do not assume you can find/delete all sensitive content. Lists of filenames, image thumbnails, random
data, and more *ARE* sitting on your hard disk. Someone who knows how to find it, WILL. That will render all of your other precautions totally futile.
 
As soon as you can, follow the instructions in step six.
 
Meanwhile, here is how you can temporarily safeguard yourself until you are able to follow those instructions.
 
1. Go through your hard disk folder by folder, deleting (or moving to a truecrypt hidden volume) any files that you believe are sensitive/risky.
 
2. When you are totally sure that you have deleted all such files, go to the following URL:http://www.fileshredder.org
 
3. Scroll down and look for the button called "Download File Shredder" -- do NOT click any other button, as the page may have ads on it that appear to be download links.
 
4. Save the file.
 
5. Run the file, most likely titled: file_shredder_setup.exe
 
6. "Welcome to the File Shredder Setup Wizard", Click "Next"
 
7. Select "I accept the agreement" and click "Next"
 
8. It will choose where to install it, click "Next"
 
9. Click "Next" again when prompted for the Start Menu folder.
 
10. "Select Additional Tasks", Click "Next" again
 
11. Click "Install"
 
12. Ensuring that "Launch File Shredder" is checked, click "Finish"
 
13. You should now notice that "File Shredder" is running. You should see the program in your task bar. Click on it to bring up the control panel if it is not up already.
 
14. On the left is a link that says "Shred Free Disk Space", click it.
 
15. Choose the drive letter for your hard disk, typically C:, as well as any other drives you wish to shred the free space.
 
16. under "Select Secure Algorithm", select "Secure Erasing Algorithm with 7 passes" and click "Next"
 
17. Click "Start"
 
This will take some time to finish. Once you have finished shredding your free disk space, it will be impossible or nearly impossible for someone to find one of your deleted files and piece it back together to see what it once was. However, this is NOT enough.
 
Keep in mind that there may still be records of the filenames that were deleted, partial data from those files, image thumbnails, and more that may be enough to incriminate you. This is only a temporary step you have taken, and you absolutely must take the actions in step 6 above in order to be truly safe.
 
 
How to secure your computer and surf fully #anonymous BLACK-HAT STYLE (Part 8)
December 27, 2013 at 1:29am
 
 
How to secure your computer and surf fully #anonymous BLACK-HAT STYLE (Part 8)
=== The Ultimate Guide for Anonymous and Secure Internet Usage v1.0.1 ===
 
Next:8. Installing VirtualBox
 
 
=== 8. Installing VirtualBox
 
 
And now we get to the fun part. We are going to create a secure environment for you to browse the internet and communicate in a way that is totally anonymous and untraceable. You will have a setup that is so secure as to be virtually impossible to break.
 
1. First, go to the following URL: http://www.virtualbox.org
 
2. Select "Downloads" in the menu on the left.
 
3. Under "VirtualBox platform packages" is "VirtualBox 4.0.4 for Windows Hosts", next to that is "x86/amd64". Click that.
 
4. Save the file. It should be titled similar to: "VirtualBox-4.0.4-7011-Win.exe
 
5. Run the file.
 
6. "Welcome to the Oracle VM... Setup Wizard", Click "Next"
 
7. click "Next"
 
8. Click "Next"
 
9. "Warning: Network Interfaces", click "Yes" but be aware that your internet connection will be temporarily reset for a few seconds.
 
10. Click "Install"
 
11. A dialog saying "A program needs your permission to continue" may appear, click "Continue".
 
12. One or more dialogs asking if you want to install "device software" may come up, select "Install" each time.
 
13. Optionally check the box "Always trust software from Oracle Corporation."
 
14. "Oracle VM... installation is complete", Click "Finish" ensuring that "Start Oracle VM after installation" is checked.
 
Now we have the software we need in order to set up and run virtual machines. On your task bar to the far right, you should notice VirtualBox running. Click on the "VirtualBox" icon if needed in order to bring the VirtualBox control panel into view.
 
Now it is time to set up a virtual machine. For this, we need to obtain two files. Operating systems, such as windows, are typically installed using a cd or dvd. You put the cd or dvd into your computer, you boot it up, and you follow the instructions in order to install the operating system. Virtual machines
work similarly. Before we can use a virtual machine, we have to install an operating system on it.
 
However, we are *NOT* going to use Windows! We are going to use Linux. Do not be afraid if you have no experience using Linux. I assure you that this will prove to be painless. We actually need two different linux operating systems in order to have a secure system. Before we go through the steps of setting this up, I want to describe to you what we are doing.
 
Remember earlier in the guide I explained that one of the downsides to using Tor Browser from your main computer is that you might accidentally put a link into a non-Tor browser. The problem with your computer right now is that you can access tor sites, or non-tor sites equally well. That means that you have to be extremely careful to ensure that you are using Tor.
 
An analogy would be to say that you are typing on a keyboard with red and green keys. You have to be careful to only hit the green keys. If you accidentally hit a red key, then you could compromise your security and anonymity. That is *not* a good position to be in. The purpose of setting up a virtual machine is to make certain that you cannot accidentally reveal your identity or compromise your security.
 
The computer you are using now has two ways of accessing the internet: TOR, and Non-TOR. The virtualmachine we are setting up however will only be able to access the internet using TOR. No other way period. That means that no matter what you do, no matter how hard you try, you will NOT be able to accidentally access any website except through TOR. This *guarantees* that whatever you do on that virtual machine is going to be through TOR.
 
So how do we achieve this? There are a number of ways to do so. The method presented in this guide is not the only good way, however I do believe that it is both easy to set up and also friendly to users who may not have a great deal of RAM.
 
First, we are going to set up two different virtual machines. One of them will exist for the sole purpose of making sure that the other one does not accidentally connect to the internet except through TOR. This virtual machine requires very little. You will not be using it for anything. It will simply act as a gatekeeper to ensure that the other Virtual Machine is safe.
 
The second virtual machine will be what you use for internet browsing, chatting, etc. This virtual machine will be configured in such a way that it can only use TOR and nothing else. The way we will achieve this is to force this second virtual machine to go through the first virtual machine for all internet connections.
 
Do not worry if this seems complicated. As with the rest of this guide, I am going to walk you through step by step exactly what to do.
 
First, we have to obtain the operating systems we will need. In this case, we are going to use "Damn Small Linux" (yes that is it's real name) for the firewall and we are going to use "Ubuntu" for the main system. The advantage to using "Damn Small Linux" is that we only need 32 MB of ram and no disk sapce to have an effective firewall.
 
Let's set up the firewall first: (Part 9)
 
 
How to secure your computer and surf fully #anonymous BLACK-HAT STYLE (Part 9)
December 27, 2013 at 1:31am
 
 
How to secure your computer and surf fully #anonymous BLACK-HAT STYLE (Part 9)
=== The Ultimate Guide for Anonymous and Secure Internet Usage v1.0.1 ===
 
Next:9. Installing a Firewall ===
 
=== 9. Installing a Firewall ===
 
1. First, go to the following URL: http://www.damnsmalllinux.org (three l's)
2. Scroll down until you see a link that says "Download"
3. Under "Current Full Mirror List", click any that work. Some may not work at any given time. If one doesn't work, simply hit back on your browser and try another one.
4. At the time of this guide, the following url worked:ftp://ftp.is.co.za/linux/distributions/damnsmall/current/
5. Go to the "current" directory if not already in it.
6. Click on the file called: dsl-4.4.10.iso -- If you cannot find this file, choose the file closet to it. A higher version number is fine. The file will probably be about 50 MB
7. The file should take about 5-10 minutes to download based on your connection.
 
(IF THE ABOVE STEPS WORKED FOR YOU, SKIP THIS MINI-SECTION)
 
(If you had trouble with the above steps, read this mini-section)
(With mirrors, it is often the case that a particular mirror site doesn't work. At the time of this writing, several mirrors worked. I am providing detailed instructions for each mirror.)
(Above I have already provided instructions for the mirror)
ftp://ftp.is.co.za
 
MIRROR: http://gd.tuwien.ac.at/opsys/linux/damnsmall
(Go to this URL, and under "Subdirectories" click on "current") if available, select the file called "current.iso" (provided the file is at least 49 MB in size) If not, then choose the closest file to dsl-4.4.10.iso, a higher version # is fine.
 
MIRROR: http://ftp.belnet.be/packages/damnsmalllinux/
(go to "current" directory, obtain either "current.iso" (if 49 MB or higher) or find file closest to "dsl-4.4.10.iso")
 
MIRROR: http://ftp.heanet.ie/mirrors/damnsmalllinux.org/
(go to "current" directory, obtain either "current.iso" (if 49 MB or higher) or find file closest to "dsl-4.4.10.iso")
 
At this point, you should have the file either "current.iso" or "dsl-4.4.10.iso" (or something similar) fully downloaded and saved into your Downloads directory.
 
Now, go ahead and open up VirtualBox again, most likely by clicking it on the task bar.
 
8. Click "New" at the top left, an icon that resembles a many-pointed round star.
9. "Welcome to the New Virtual Machine Wizard", click "Next"
10. "VM Name and OS Type": Under "Name" type in: Firewall
11. For Operating System, choose "Linux"
12. For "Version", choose: "Other Linux"
13. Click "Next"
14. "Memory", select "32 MB" and click Next
15. "Virtual Hard Disk", Uncheck "Boot Hard Disk" and click "Next"
16. If a Warning dialog appears, click "Continue"
17. Click "Finish"
18. Now you will notice "Firewall, Powered Off" visible in your VirtualBox control panel. Make sure it is highlighted (it should be) and then right click it, and select "Settings".
19. Select "Network" in the menu to the left.
20. Click on the "Adapter 2" tab.
21. Check "Enable Network Adapter" and next to where it says "Attached to", select "Internal Network" from the pulldown menu.
22. Click "Ok" at the bottom.
23. Once again, right click "Firewall, Powered Off" and select "Start"
24. Check "Do not show this message again" and click "Ok". This is just letting you know that the "RIGHT CTRL KEY" on your keyboard is the "control" key for this virtual machine.
25. "Welcome to the First Run Wizard", click "Next"
26. "Select Installation Media", under "Media Source" is a pull down menu. To the immediate right of that pull down menu is an icon with a folder. Click that folder icon.
27. Locate "current.iso" or "dsl-4.4.10.iso" (or the similar file name) that you downloaded. When located, click "Open". It is likely in the "Downloads" directory of your home folder.
28. Click "Next"
29. Click "Finish"
 
Now the virtual machine will start to boot up. Simply wait... (This may take up to 5 minutes.)
 
30. One or more new dialogs may come up saying "VirtualBox Information", just click "Do not show this message again" and click "Ok"
 
After a few minutes, the booting will finish and you will be looking at the desktop for your firewall virtual machine. To the right of the window you will see some stats that look something like this:
 
Up: 0 k/s - Down: 0 k/s
Processes: 19
CPU Usage: 10%
RAM Usage: 16.2MB/28.8MB
 
etc.
 
Congratulations! You now have a firewall running. Now we will set up this firewall to protect you so that you can safely use TOR from your main virtual machine.
 
 
How to secure your computer and surf fully #anonymous BLACK-HAT STYLE (Part 10)
December 27, 2013 at 1:33am
 
 
How to secure your computer and surf fully #anonymous BLACK-HAT STYLE (Part 10)
=== The Ultimate Guide for Anonymous and Secure Internet Usage v1.0.1 ===
 
Next:10. Firewall Configuration ===
 
=== 10. Firewall Configuration ===
 
At this stage you should be looking at the desktop for "DSL" (Damn Small Linux).
 
I need to talk about the mouse first. This particular virtual machine as well as your main operating system (windows) both want control of your mouse. Both cannot have control of your mouse at the same time however. Therefore, you have to choose whether the mouse will be used by your virtual machine, or by Windows. When you click into your virtual machine, it has the effect of passing control of the mouse to the virtual machine. That means you cannot move your mouse cursor past the boundaries of that virtual machine. In order to give mouse control back to windows, enabling you to move your mouse cursor anywhere, simply press the right ctrl key on your keyboard. That is to say, you have two ctrl keys. One on the left of your keyboard, and one on the right. Press the ctrl key that is on the right of your keyboard. This will give mouse control back to windows.
 
Practice this a bit. Practice clicking into the window, moving the mouse cursor around, pressing right ctrl, and moving the windows mouse cursor around. Get the feel of it.
 
You should see a window that looks something like a web browser, with some text in it including words such as "Getting Started with DSL". First, close that window.
 
(If your mouse is not working, read this mini-section.)
 
(First, click inside the window that your virtual machine is running in). Now try moving your mouse cursor. If you do not see the mouse cursor moving around, then press (RIGHT CTRL + I). Now move your mouse cursor again. If you notice that you are moving your "main" mouse cursor over the window, but you do not see the "DSL" black mouse cursor moving, then click again into that window. If you do this a few times, you should notice that the mouse begins to work. You may have to press RIGHT CTRL+I a couple of times to get the mouse to work.
 
1. Once the mouse is working inside of your virtual machine, go ahead and close the window entitled "Getting Started with DSL"
 
(If you cannot see the full virtual machine window, for example because your screen resolution is set so that some of the window goes too low, read this mini-section).
 
(First, press RIGHT CTRL+I until you have your main windows white mouse cursor back). Now, click on "Machine" in the menu at the top of the window.
(Select "Switch to Scale Mode")
 
( Click "Switch")
 
(Now you will have converted your firewall window to a smaller size, and you will be able to resize it. You may need to press "right ctrl" to get a windows mouse cursor (which you will need in order to resize this window). Now simply resize it to the size that works for you, and then click into the window to be able to use the black mouse cursor inside the virtual machine. I recommend you maximize this window to make sure you can read everything clearly.
 
2. Right click anywhere on the desktop, go to System (a red folder), go to Daemons, ssh, and start.
 
3. Right click again anywhere on the desktop, go to XShells -> Root Access -> Transparent
 
4. Now you have a window that you can type in. Type exactly as shown below into this window, and hit enter:
 
passwd
 
Once you type this and hit enter, it will ask you for a password. This is a password for full access to the firewall. Make it at least 8 characters in size.
 
*** IMPORTANT: Do not forget your firewall password. You will need it later in the guide. ***
 
When you have successfully changed your password, it will say "Password changed."
 
5. Now type exactly as shown below, into the same window:
 
ifconfig eth1 10.0.3.1
 
6. It will not say anything after you hit enter, it will just return you back to the prompt.
 
Now our firewall server is ready. We want to save this state so that we can get back to it easy in the future.
Press RIGHT CTRL+S
 
7. Now you will be looking at a window that says "Take Snapshot of Virtual Machine". Just click "Ok"
 
8. Now, let's test this out to confirm it works as we expect. Go ahead and close the virtual machine by clicking the "X" in the top right corner. A menu will come up. Select "Power off the machine" and click ok. Do NOT check the box called "Restore current snapshot".
 
And now you should be once again at the VirtualBox manager. You will see "Firewall (Shapshot 1), Powered Off"
 
9. Make sure that "Firewall (Snapshot 1), Powered Off" is selected. At the top right of your VirtualBox Manager is a button that says: "Snapshots (1)". Click it.
 
10. Click on "Snapshot 1", the top-most selection. This will highlight it.
 
11. Now right click it, and click on "Restore Snapshot"
 
12. A dialog box will come up asking if you are sure, click "Restore"
 
13. Now click the "Start" button at the top with the large green arrow.
 
14. Any dialog boxes that come up with a check box saying "Do not show this information again", simply check the check-box, and click ok. Do not worry about any of those.
 
Remember, if you do not have immediate control of the mouse inside the virtual machine, simply press RCTRL+I (press right ctrl and "I" at the same time) and click into it until you have mouse control.
 
Now your firewall is good to go. Any time you need it, just go to the VirtualBox Manager and follow steps 9 through 14 above. You do not have to go through the whole setup process again at any time in the future. Your firewall is ready.
 
 
How to secure your computer and surf fully #anonymous BLACK-HAT STYLE (Part 11)
December 27, 2013 at 1:35am
 
 
How to secure your computer and surf fully #anonymous BLACK-HAT STYLE (Part 11)
=== The Ultimate Guide for Anonymous and Secure Internet Usage v1.0.1 ===
 
Next:11. Installing Ubuntu ===
 
=== 11. Installing Ubuntu ===
 
Now we are going to set up the main machine that you will be using TOR with.
 
1. First, go to this URL: http://www.ubuntu.com
 
2. Click on the link "Download Ubuntu"
 
3. Click "Start Download" (This download should take 10-15 minutes)
 
4. The filename is going to be similar to: ubuntu-10.10-desktop-i386.iso
 
Now we wait...
 
While you are waiting for the file to download, go ahead and make sure that your "hidden volume" is mounted in TrueCrypt to a particular drive letter. For example, O: You will need that for the next step.
 
5. Return to your "VirtualBox Manager". It doesn't matter if the firewall is running or not.
 
6. Click "New" (the blue round star-icon in the top left) again.
 
7. "Welcome to the New VirtualMachine Wizard", click "Next"
 
8. "VM Name and OS Type", under "Name", type "Primary"
 
9. Next to "Operating System", select "Linux"
 
10. Next to "Version", select "Ubuntu" and Click "Next"
 
11. "Memory", by default it selects 512 MB. This is fine. 256 MB is the MINIMUM. The more memory you allocate, the better the virtual machine will function. Click "Next"
 
12. "Virtual Hard Disk", Make sure "Boot Hard Disk" is checked. Make sure "Create new hard disk" is selected. Click "Next"
 
13. "Welcome to the Create New Virtual Disk Wizard", click "Next"
 
14. "Hard Disk Storage Type", select "Fixed-size storage" and click "Next"
 
15. "Virtual Disk Location and Size", to the right of the text box containing "Primary" is a folder icon. Click the folder icon.
 
16. Now we have to select a file for the new hard disk image file. On the bottom of this dialog it says "Browse Folders", click on that.
 
17. Now click on "Computer" in the menu to the left.
 
18. Scroll to where you see the drive letter you mounted, and double click on it. Ex: Local Disk (O:)
 
19. Now click "Save"
 
20. By default 8.00 GB are selected. That is fine. If you have enough space on your hidden volume, increase this to 10 GB. Otherwise, 8 is fine.
 
21. Under "Location", it should say O:Primary.vdi where O: is replaced by whatever drive letter you mounted your TrueCrypt hidden volume to.
 
22. Click "Next", then click "Finish"
 
Now we wait for VirtualBox to create the hard drive we asked for. This may take a few minutes.
 
Keep in mind this entire virtual machine as well as any of its contents are going to reside within the hidden truecrypt container. This ensures extra security.
 
23. When this is done, you will see a "Summary" window. Click "Finish".
 
24. Now, right click on "Primary, Powered Off" in your "VirtualBox Manager", and click "Start"
 
25. Again we are at the "First Run Wizard", click "Next"
 
26. "Select Installation Media", under "Media Source" is a pull down menu. Click the "folder icon" to the immediate right of that pulldown menu.
 
27. Locate "ubuntu-10.10-desktop-i386" (or the similarly named file) from your Downloads directory, or wherever you saved it. Click on it, and click "Open"
 
28. Click "Next"
 
29. Click "Finish"
 
Now simply wait. Your Ubuntu virtual machine will be loading up. This may take a few minutes. Don't worry if you see all kinds of strange messages/text. It is normal.
 
After a few minutes, you should start to see the Ubuntu desktop load. Unlike your firewall, you will notice that you do not have to click the mouse inside the window. It automatically happens. This is going to be much easier than the "Firewall" step.
 
Once everything has loaded, you will be looking at a window that says "Install" with a button that says "Install Ubuntu". If you cannot see everything, press RCTRL+F (to go full screen). You can return to windowed mode by RCTRL+F again. Any dialogs can be closed, and you can check the box that says "Do not show me this again."
 
30. Click "Install Ubuntu"
 
31. Check "Download updates while installing"
 
32. Check "Install this third-party software". Click "Forward"
 
33. Ensure "Erase and use entire disk" is selected, and click "Forward". Remember, this is NOT talking about your hard disk. It is talking about the 8-10 gigabyte virtual disk.
 
34. Click "Install Now"
 
35. Now you will be guided through a series of installation related screens. The first screen asks you to select your timezone/time. Select your choice and click "Forward"
 
36. Now keyboard layout, again select your choice and click Forward. If you are unsure, leave it as is or click "Figure out keyboard layout"
 
37. "Who are you?" For "Your name" type in: mainuser
 
38. When you type in "mainuser" the other boxes will fill in automatically. Now click in the text box next to "Choose a password".
 
39. Do NOT use the same password as the firewall. Come up with a different password.
 
40. Ensure that "Require my password to log in" as well as "Encrypt my home folder" are selected and checked and proceed.
 
Now simply wait until the installation is finished. The installation may take a while, and it may appear to stall at some points. As long as the ubuntu mouse cursor shows an animation that is turning around in circles, the installation *is* working. Simply wait until it is done. If after an hour or two the progress bar hasn't moved at all, then go ahead and re-start the installation starting from step 24 (after closing the window and powering down the virtual machine).
 
Depending on your computer, it could take 2-4 hours. Most likely, it will take about an hour. Once finished, you will see a dialog that says "Installation Complete" with a button that says "Reboot Now". Do NOT press the "Reboot Now" button. Close the 'X' on this window, and Power Down.
 
41. Now, right click "Primary" and go to "Settings".
 
42. Click on "Storage" in the left menu. Then click on the "ubuntu-10.10... .iso" under where it says "IDE Controller"
 
43. To the right it says "Attributes" under that it says "CD/DVD Drive : ..." to the immediate right of that is a cd icon. Click it.
 
44. Select "Remove disk from virtual drive."
 
45. Click "Ok"
 
46. Now, making sure that "Primary" is highlighted, click the "Start" button at the top with the large green arrow.
 
Now we wait for your newly installed Ubuntu machine to boot up.
 
47. After a few minutes, you will see a dialog appear that says "mainuser-VirtualBox". Go ahead and click on "mainuser" which has the "person icon" to the left of it.
 
48. Now it will prompt you for your password. Enter the password you used in the installation process.
 
49. After a minute or so, you should hear a nice login sound, and you should be fully logged into your virtualmachine.
 
50. Keep waiting, and a dialog will appear that says "Information avialable" and "Record your encryption passphrase" Click on: "Run this action now"
 
51. Type in the same password you used to log in. After that window closes, click "Close" in the dialog box.
 
Congratulations! You have now set up a virtual machine as well as a firewall to protect it. Now we need to finish configuring the primary virtual machine.
 
 
How to secure your computer and surf fully #anonymous BLACK-HAT STYLE (Part 12)
December 27, 2013 at 1:37am
 
 
How to secure your computer and surf fully #anonymous BLACK-HAT STYLE (Part 12)
=== The Ultimate Guide for Anonymous and Secure Internet Usage v1.0.1 ===
 
Next:12. Ubuntu Initial Setup ===
 
=== 12. Ubuntu Initial Setup ===
 
Ok, now that we have installed Ubuntu, we need to set it up so that we can use it fully. This also means making sure we can see flash on websites such as youtube.
 
1. First, we have to install any updates that are pending. At the bottom of your screen, you should notice where it says "Update Manager". Click on that.
 
2. Now, click on "Install Updates". If you did not see "Update Manager", then skip these two steps.
 
3. Any time an administrative task is required, you will need to type in your password. This is the same password you used to log in.
 
Now we wait, this is going to download any necessary security updates to make certain we are using the most current/secure setup possible. This may require downloading hundreds of megabytes. Just go ahead and let it do that, and when everything is downloaded and updated, proceed to the next step. While you wait, Ubuntu may go into screensaver mode. If so, just move the mouse and it will ask you for your password. That will leave screensaver mode.
 
If the updates are more than a hundred megabytes, it will take quite a while. It may take up to 2-3 hours depending on your computer and internet connection. Nonetheless, this step is critical. Do not skip the updates. Besides ensuring that your setup will be secure, the updates also ensure that all of the applications are up to date and thus most likely to function correctly. Just go ahead and watch a movie for a couple hours, and then return and check on it.
 
After all of the updates have been downloaded and installed, the "Update Manager" window will now say "Your system is up-to-date" at the top. Further, it will say: "The computer needs to restart to finish installing updates.". Go ahead and press the 'X' in the top right corner of the window, and choose 'Send the shutdown signal". If prompted, click "Shut Down". Once it has fully shut down, the window will disappear and you will be back at the VirtualBox manager. Go ahead and right click on "Primary" and click "Start". This will restart the virtual machine.
 
If a virtual machine fails to shutdown after 10 minutes or so, then go ahead and close the window again by pressing the 'X' but this time choose "Power down". If it still will not shut down, then VirtualBox may have crashed. If so, just follow these instructions:
 
( Follow the steps in this mini-section if a virtual machine fails to shutdown, or you need to completely close/restart VirtualBox).
 
( First, press "Ctrl+Alt+Delete", and then click "Task Manager"). Next, locate the process that is running that starts with "VirtualBox". Right click that process, and click "End Process Tree"
(This should force the window to close).
 
(Now, restart VirtualBox by going to your start menu, All Programs, Oracle VM VirtualBox VirtualBOx).
 
Now you will have the VirtualBox manager up again. To restart the Ubuntu machine, simply right click on "Primary" and click "Start".
 
Once your Primary vm has rebooted, you will be again at the login screen. Here as before, click on "mainuser" and then enter in your password. Now your primary machine is fully up to date. Remember, be patient. It may take a few minutes before your virtual machine has fully booted. First you will see the background image and a mouse cursor that can move around, next you should hear the login sound play, and finally you will see the menu at the top and bottom of your virtual machine window. Depending on the speed of your computer, this may take 10 minutes or more. Just be patient. Don't worry if your virtual machine appears to be running too slow, we will speed it up.
 
Now your Virtual Machine is set up and ready for use.
 
 
How to secure your computer and surf fully #anonymous BLACK-HAT STYLE (Part 13)
December 27, 2013 at 1:39am
 
 
How to secure your computer and surf fully #anonymous BLACK-HAT STYLE (Part 13)
=== The Ultimate Guide for Anonymous and Secure Internet Usage v1.0.1 ===
 
Next:13. Installing Guest Additions ===
 
=== 13. Installing Guest Additions ===
 
In order to ensure that the Virtual Machine runs smoothly as possible, we are going to install some additional software to the virtual machine.
 
1. Go to the "Devices" menu at the top of your virtual machine main window (Machine, Devices, Help), and go to "Install Guest Additions"
 
2. Go to the "Places" menu at the top of your virtual machine (Applications, Places, System), and click on "VBOXADDITIONS_4.0.4_70112" (the number may be different).
 
3. At the top this new window will be the text "The media has been determined as "UNIX software". Click on "Open Autorun Prompt"
 
4. A new dialog may appear saying "This medium contains software intended to be automatically started. Would you like to run it?" Click "Run"
 
5. Enter your administrative password (the one you use to log into Ubuntu) and click "Ok"
 
6. Now the VirtualBox Guest Additions installer will begin. This may take some time, so just relax and wait. Depending on your computer, this may take 30 minutes or more.
 
7. When this is finished, you will see the text "Press Return to close this window." Go ahead and do so.
 
8. Once that window has closed, go ahead and press the 'X' to close the entire virtual machine window. Select "Send the shutdown signal" and click "Ok".
 
9. A dialog box will appear. Click on "Shut Down", the top most option.
 
At this stage it is a good idea to further optimise our virtual machine. When you initially installed it, you most likely selected either 256 MB or 512 MB of RAM. If you have enough RAM to spare, then I highly recommend you increase that to at least 1 GB. Here is how to do so:
 
1. First, right click on "Primary, Powered off" and go to Settings.
 
2. Select "System" from the menu on the left.
 
3. Increase the "Base Memory" to either 1024 MB (1 GB), or some higher value you are comfortable with.
 
It is also a good idea to increase the video memory available to the virtual machine.
 
4. Select "Display" from the menu on the left, still inside of "Settings"
 
5. Increase the "Video Memory" slider to the right as far as you are comfortable with. For example, 128 MB.
 
6. Check the box "Enable 3D Acceleration".
 
7. Now click "Ok" at the bottom.
 
Go ahead and start up Ubuntu again by right clicking "Primary, Powered off" and clicking "Start"
 
When Ubuntu loads up, go ahead and log in as before using your password. Now wait until Ubuntu is fully booted and the "Applications Places System" menu is visible.
 
You will probably notice that your virtual machine loads up and runs faster than before.
 
How well your virtual machine runs depends on how good your computer is. Primarily, RAM and processor speed are the most significant factors. If your computer is modern enough, you should be able to use websites with flash and even watch videos, such as on YouTube, with no problem. If your computer is not as modern, you will still be able to browse websites but may not be able to watch videos. You should still be able to use most flash based websites however.
 
*** IMPORTANT: DO NOT browse sensitive content YET. At this stage, your virtual machine is not yet configured to use TOR. ***
 
 
How to secure your computer and surf fully #anonymous BLACK-HAT STYLE (Part 14)
December 27, 2013 at 1:42am
 
 
How to secure your computer and surf fully #anonymous BLACK-HAT STYLE (Part 14)
=== The Ultimate Guide for Anonymous and Secure Internet Usage v1.0.1 ===
 
Next:14. Installing IRC (Optional) ===
 
 
=== 14. Installing IRC (Optional) ===
 
*** This section is entirely optional. If you are not interested in installing IRC, skip this section. ***
 
To install IRC on your new virtual machine, follow these steps:
 
1. Go to the "Applications" menu, and go to "Ubuntu Software Center"
 
2. Type "kvirc" in the search box field in the top right.
 
3. When the results return, select the one called: "KDE-based next generation IRC client" or "KV Irc".
 
4. Click "Install"
 
5. Enter your password when prompted.
 
6. While it installs, you will notice a progress bar. This may take a few minutes depending on the speed of your internet connection.
 
7. Once it is finished installing, the progress bar will go away. Go ahead and close the "Ubuntu Software Center".
 
You are probably used to the close/ min/ max buttons being on the top right, as is the case in Windows. You will find them in the top left instead. If you don't like this, don't worry. You can change it later.
 
Now, let's go ahead and set up KVIrc.
 
Remember, you are NOT truly anonymous yet.
 
8. Click on "Applications" in the top menu.
 
9. Go to "Internet"
 
10. Click on "KVIrc"
 
11. "KVIrc Setup" will appear. Go ahead and click "Next" to begin.
 
12. "Store Configuration in Folder", click "Next"
 
13. "Please choose a Nickname". You can leave this exactly as is, or you can choose a Nick name then click "Next".
 
*** IMPORTANT READ THIS ***
 
Do NOT pick a nick name you have ever used before, or a nick name that can help someone determine who you are. Also, do NOT fill in any other details such as location, age, real name, etc. Leave everything else as is.
 
You are NOT Anonymous yet.
 
14. Now you are asked to pick a theme, select "No theme" then click "Next"
 
15. Now click "Finish" to leave the KVIrc Setup
 
16. A new window will appear having a list of servers, click "Close"
 
Now let's connect to the "Freenode" IRC network. By now, you may have many questions about how to use Ubuntu. The #Ubuntu chatroom on Freenode is a great place to start, and where you can ask questions related to how to use Ubuntu and VirtualBox. Please remember, you are NOT anonymous yet and anything you say can be matched to your IP address. Keep the conversation related to technical help, or just learning Ubuntu.
 
Do NOT discuss TOR.
Do NOT discuss ANY sensitive material.
 
Remember, this chatroom consists mostly of people who have set up Ubuntu for other reasons. Therefore, they will be able to help you configure it, and answer many questions about how Ubuntu works.
 
17. At the bottom right of KVIrc is a long text input box. Click inside that box.
 
18. Type, exactly as shown below, including the "/" character:
 
/server irc.freenode.net 6667
 
19. This will connect you to the Freenode IRC network. After a few minutes, you will be connected and a dialog box will appear.
 
20. Uncheck the box that says "Show this window after connecting", and then click "Close"
 
21. Now, in the same text box as you typed the /server command, type the following exactly as shown below, including the "/" and "#" characters:
 
/join #Ubuntu
 
22. Now you are in the #Ubuntu chatroom. Feel free to discuss the Ubuntu operating system and ask questions related to how to use Ubuntu. Remember:
 
*** Do NOT discuss TOR or sensitive material. You are NOT anonymous. ***
 
This is a good opportunity for you to learn how to set up Ubuntu to be the way you want as far as colors, layout, theme and so forth. When you have finished, simply close the "KVIrc" window.
 
 
How to secure your computer and surf fully #anonymous BLACK-HAT STYLE (Part 15)
December 27, 2013 at 1:44am
 
 
How to secure your computer and surf fully #anonymous BLACK-HAT STYLE (Part 15)
=== The Ultimate Guide for Anonymous and Secure Internet Usage v1.0.1 ===
 
Next:15. Installing Torchat (optional) ===
 
=== 15. Installing Torchat (optional) ===
 
*** This section is entirely optional. If you are not interested in installing Torchat, skip this section. ***
 
Torchat is a program you can use to communicate securely and anonymously with other Torchat users. It is only useful if you already know someone who is using it. If you do not know someone using Torchat, then it is best to skip this section and come back to it in the future when you want to install Torchat.
 
These instructions work for Ubuntu 10.10.
 
First, installing Torchat is a bit tricky because Ubuntu does not include Tor by default in its repositories. Tor is a requirement for torchat, and therefore we have to first install Tor on Ubuntu. Doing so is not too difficult.
 
1. First, go to "Applications" -> "Accessories" -> "Terminal". You will see a new window appear with a prompt that looks like this:
 
mainuser@mainuser-VirtualBox:~$
 
2. Now, type exactly as shown below, and hit enter:
 
sudo bash
 
3. After entering your password, you will be at a new prompt which looks like this:
 
root@mainuser-VirtualBox:~#
 
4. Now, either type or copy-paste the below text into this window and then hit enter:
 
echo "deb http://deb.torproject.org/torproject.org experimental-lucid main" | sudo tee -a /etc/apt/sources.list
sudo apt-key adv --keyserver keyserver.ubuntu.com --recv-keys 886DDD89
 
5. After you do this, you should see the following at the bottom of your window:
 
gpg: Total number processed: 1
gpg: imported: 1 (RSA: 1)
 
6. Now, we should be able to install tor. In this same window, type the following commands, one at a time:
 
apt-get update
apt-get install vidalia privoxy tor
 
7. (press Y and enter when prompted)
 
Now we need to obtain the Torchat installation file, follow these steps:
 
8. In firefox on Ubuntu, go to the following URL: http://code.google.com/p/torchat
 
9. On the left under where it says "Downloads"
 
10. One of the files listed will end in .deb, for example torchat-0.9.9.deb. Click on that file name.
 
11. On the next page, again click on the file name. This should begin the file download.
 
12. By default, Ubuntu wants to open this file using the "Ubuntu Software Center". This is correct.
 
Now wait until the file finishes downloading, and then the "Ubuntu Software Center" will appear. Follow these steps:
 
1. Press "Install"
 
2. Type in your password when prompted.
 
After a short wait, Torchat will be installed.
 
To start Torchat, go to "Applications" -> "Internet" -> "Torchat Instant Messenger"
 
 
How to secure your computer and surf fully #anonymous BLACK-HAT STYLE (Part 16)
December 27, 2013 at 1:51am
 
 
How to secure your computer and surf fully #anonymous BLACK-HAT STYLE (Part 16)
=== The Ultimate Guide for Anonymous and Secure Internet Usage v1.0.1 ===
 
Next:16. Creating TOR-Only Internet Environment ===
 
 
=== 16. Creating TOR-Only Internet Environment ===
 
Up until now, we have been using our Virtual Machine to access the internet directly. This was necessary so that we could install updates, software, and
get a feel for how to use Ubuntu.
 
Now it is time to force Ubuntu to connect to the internet using TOR Only. At the end of this phase, your Ubuntu virtual machine will be usable as a secure and anonymous TOR based browsing environment. It will be *impossible* for you to access the internet except through TOR, and therefore you can rest assured that anything at all you do online through the Ubuntu virtual machine will be through TOR.
 
First, we need to shut down any running virtual machines. If "Primary" is running, click the 'X' in the top right to close it. Select "Send shutdown signal"
and then select "Shut Down" when prompted. If "Firewall" is running, go ahead and close it in the same way, but choose "Power off".
 
After a minute or so, you should be back to your VirtualBox Manager, with neither virtual machine running.
 
1. Right click on "Primary, Powered Off" and go to "Settings"
 
2. Select "Network" from the menu on the left.
 
3. Next to "Attached to" is a pull down menu. Right now it is set to "NAT". Choose "Internal Network" and click "Ok"
 
4. Click "Firewall" to highlight it, and then click on "Snapshots (1)" in the top right.
 
5. Right click on "Snapshot 1" and then select "Restore Snapshot". Select "Restore" if prompted.
 
6. Right click "Firewall" and click "Start"
 
Now your Firewall will be resumed exactly where it had been previously set up. The last command entered should still be visible.
 
Before you proceed, make sure that TOR is running on your main Windows computer. If it is, you will see an "Onion" icon visible in your task bar. Click on that icon and you should see the "Vidalia Control Panel". Make sure that it says "Connected to the TOR Network". If so, you are ready to proceed. If not then please see section 2 : "Using and Testing Tor Browser for the first time" to re-start TOR. Once TOR is running, proceed.
 
Let's restart Ubuntu:
 
7. Right click "Primary" and click Start. Log in as normal.
 
8. After fully logged in, open "Firefox" by clicking the orange "Firefox" logo at the top, next to "System".
 
9. Try to go to any website, such as http://www.google.com. Try at least 3-5 different websites. You should not be able to connect to any of them.
 
Note: If you attempt to go to websites you have already been to using Ubuntu, they may appear to load because they are cached.
 
10. In Firefox on Ubuntu, go to "Edit" and "Preferences"
 
11. Click on the "Advanced" icon
 
12. Click on the "Network" tab
 
13. Under "Connection" it says "Configure how Firefox connects to the internet". To the right of that is a "Settings" button. Click that button.
 
14. Select "Manual proxy configuration"
 
15. Next to both "HTTP Proxy" and "SSL Proxy" type in: 127.0.0.1
 
16. Set the port to 8118 for both "HTTP Proxy" and "SSL Proxy"
 
17. Next to "SOCKS Host" type: 127.0.0.1
 
18. Set the port for "SOCKS Host" to 9050
 
19. Make sure that "SOCKS v5" is selected at the bottom.
 
20. Click "Ok" and then "Close"
 
Now we have instructed Firefox to use TOR. However, Firefox cannot use TOR yet. Right now, Ubuntu is completely unable to connect to the Internet. We
are going to change that.
 
21. Go to "Applications" -> "Accessories" -> "Terminal"
 
22. Type in: sudo bash (and hit enter)
 
23. Type in your password if prompted.
 
24. Type in the following commands exactly as shown below (or copy paste them):
 
ifconfig eth0 10.0.3.2
/etc/init.d/polipo stop
/etc/init.d/tor stop
/etc/init.d/privoxy stop
 
(Note: the last three commands, those beginning with /etc/ are only necessary if you installed Torchat)
 
Now you have told your Ubuntu machine to join the same network that your Firewall is on. Now we can establish a tunnel for TOR data to flow from our Ubuntu machine, through the Firewall, into your Windows guest machine. We need to establish two such tunnels.
 
The first tunnel for port 9050 data, and the second tunnel for port 8118 data. When these two tunnels are set up, it will be possible for you to use your Ubuntu machine to access any website using TOR. Further, it is still completely impossible for your Ubuntu machine to access the Internet in any other way.
 
25. Your terminal window should still be open. Type in the following command exactly as shown (or copy paste it):
 
ssh -N -L 9050:10.0.2.2:9050 root@10.0.3.1
 
26. Type "yes" if prompted. When prompted for the password, give your Firewall password. Not your Ubuntu password.
 
After you hit enter, you will see the cursor go to a blank line and nothing else happens. This simply means the connection you requested is active. If the connection were to stop for any reason, you would return to a command prompt. If you want to terminate the connection yourself, simply hit CTRL+C. You can type in the same ssh command again if you need to re-open the tunnel.
 
27. Now we are going to open the second tunnel. In your terminal window, go to "File" and "Open Tab". This will open up a tab for a second terminal without affecting the first.
 
28. Now, type exactly as shown below to open the second tunnel:
 
ssh -N -L 8118:10.0.2.2:8118 root@10.0.3.1
 
29. Return to Firefox. Go to the "File" menu and uncheck "Work Offline" if it is checked.
 
30. Go to the URL: http://check.torproject.org
 
If you see the text: "Congratulations. Your browser is configured to use Tor" then you are all set! Your Ubuntu virtual machine is now NOT connected to the
internet in any way. However, you can browse any website using TOR, even Youtube. You do not have to be afraid of javascript or Flash. Any files you save
onto your virtual machine will automatically be saved in the encrypted truecrypt volume you set up earlier. In fact, everything the virtual machine does will be contained within that truecrypt volume.
 
Further, even if someone somehow managed to remotely gain full root access to your Ubuntu machine (absurdly unlikely to happen), they would still not be able to see *anything* about who you are, or what your real IP address is, or even that you are using a Virtual Machine. To them, it would appear that the Ubuntu machine is your main computer. They would be totally unable to compromise your identity based on this alone.
 
However, keep the following in mind. If someone were to gain access to your Ubuntu machine, they WOULD be able to see anything you have used it for or any files you have saved. Therefore, I recommend for the sake of absolute security, do not store anything on your Ubuntu virtual machine that identifies you. This is just a precaution. It is virtually impossible that someone would manage to remotely gain access to your Ubuntu machine.
 
 
How to secure your computer and surf fully #anonymous BLACK-HAT STYLE (Part 17)
December 27, 2013 at 1:54am
 
 
How to secure your computer and surf fully #anonymous BLACK-HAT STYLE (Part 17)
=== The Ultimate Guide for Anonymous and Secure Internet Usage v1.0.1 ===
 
Next:17. General Daily Usage ===
 
=== 17. General Daily Usage ===
 
Much of this guide has involved detailed one-time setup processes. From now on, all you have to do when you want to use TOR from your Ubuntu virtual machine is to follow these steps. Every step listed is a step you have already done, so feel free to re-visit earlier sections if you need help.
 
1. Start TrueCrypt, and mount your hidden volume which contains your virtual machine.
 
2. Start VirtualBox
 
3. Start TorBrowser Bundle.
 
4. Click "Firewall" to highlight it, and then click on "Snapshots (1)" in the top right.
 
5. Right click on "Snapshot 1" and then select "Restore Snapshot". Select "Restore" if prompted.
 
6. Right click "Firewall" and click "Start"
 
7. Right click "Primary" and click Start. Log in as normal.
 
8. Go to "Applications" -> "Accessories" -> "Terminal"
 
9. Type in: sudo bash (and hit enter)
 
10. Type in your password if prompted.
 
11. Type in the following commands exactly as shown below (or copy paste them):
 
ifconfig eth0 10.0.3.2
/etc/init.d/polipo stop
/etc/init.d/tor stop
/etc/init.d/privoxy stop
 
(Note: the last three commands, those beginning with /etc/ are only necessary if you installed Torchat)
 
12. Your terminal window should still be open. Type in the following command exactly as shown (or copy paste it):
 
ssh -N -L 9050:10.0.2.2:9050 root@10.0.3.1
 
13. Type "yes" if prompted. When prompted for the password, give your Firewall password. Not your Ubuntu password.
 
14. In your terminal window, go to "File" and "Open Tab".
 
15. Now, type exactly as shown below to open the second tunnel:
 
ssh -N -L 8118:10.0.2.2:8118 root@10.0.3.1
 
16. Return to Firefox. Go to the "File" menu and uncheck "Work Offline" if it is checked.
 
17. Go to the URL: http://check.torproject.org
 
If you see the text: "Congratulations. Your browser is configured to use Tor" then you are all set!
 
Enjoy!
 
Phew, now i have it complete ! I admit its quite extensive, not to say enourmous, but its the best how-to on anonymity and other safety procedures i have found so far. It secures your sys black-hat style^^ :
 
http://en.wikipedia.org/wiki/Black_Hat_Briefings
(for those of you who dont know black hat ^^)
 
You dont have to do all steps at once. You can do a little of it every time you have an hour or two to spare. I think for the whole procedure you will need roughly 8-12 hours. I think its written in a way everybody should be able to follow. If there are still steps unclear just ask, i will see if i can help you. btw this is written for noobs, but the tips here are interesting for allmost everybody.
 
P.S.: Once you have installed TOR you can get access to TOR hidden services and other interesting deep-web pages. If you want some links for your first steps into this hidden part of the internet just ask me. If there is a lot of requests i will write an extra thread with the most important websites in the deepweb. One thing before you get started : most deepweb pages arent online 24/7. So if you cant reach a certain website be patient and try again and again till you get access. Another thing : you will find websites that are pretty shocking and disturbing. In 99.5% you will see beforehand what you find on those sites, so if you dont want to see certain things dont klick on the links.
 
Now that you have a really secure system, you should know what to do when the shit hits the fan and you are arrested or your home gets searched. SYour system, is secured in a way they cant break, so the only thing that can incriminate you now is your testimony.
These 2 youtube videos are 2 lectures on behaviour towards the police in such situations. Part one is done by a criminal defense attorney, part 2 by a very experienced police officer. They both tell you about the tricks the police uses and how you should react :
 
http://www.youtube.com/watch?v=6wXkI4t7nuc
 
http://www.youtube.com/watch?v=08fZQWjDVKE
 
;tl,dw : say nothing and ask for a lawyer, ALLWAYS ! You cannot improve your situation with anything you say (this is counterintuitive, but the attorney here has in his whole carrer NEVER heared of single case where a suspect could help his case by talking to the police, but he could name many cases where they made matters way worse) but you can make it a lot worse, so shut the hell up and wait for your lawyer.
 
Even him being a defense lawyer wouldnt talk to the police under any circumstances. You can tell your story before court AND NEVER, UNDER NO CIRCUMSTANCES, BEFORE THAT ! Even the cop in lecture 2 says NEVER TALK TO THE POLICE !!!!!
 
 
☢☠☢
 
Share
 
#Anonymous - Here you have all what you need
 
 
       db                                                                                                                          
      d88b                                                                                                                        
     d8'`8b                                                                                                                        
    d8'  `8b      8b,dPPYba,    ,adPPYba,   8b,dPPYba,   8b       d8  88,dPYba,,adPYba,    ,adPPYba,   88       88  ,adPPYba,      
   d8YaaaaY8b     88P'   `"8a  a8"     "8a  88P'   `"8a  `8b     d8'  88P'   "88"    "8a  a8"     "8a  88       88  I8[    ""      
  d8""""""""8b    88       88  8 ERROR  d8  88       88   `8b   d8'   88      88      88  8b  404  d8  88       88   `"Y8ba,      
 d8'        `8b   88       88  "8a,   ,a8"  88       88    `8b,d8'    88      88      88  "8a,   ,a8"  "8a,   ,a88  aa    ]8I      
d8'          `8b  88       88   `"YbbdP"'   88       88      Y88'     88      88      88   `"YbbdP"'    `"YbbdP'Y8  `"YbbdP"'      
                                                             d8'                                                                  
                                                            d8'          
 
 
***************************************=H4CKT1VIST4S UN1D02 S1ST3M4S T3MBL4R=***************************************
 
EL C0N0C1M13NT0 E5 L1BR3:
 
Este Pad es una lista de enlaces que están almacenados en "MEGA", hay programas, manuales, tutoriales, de informática, hacking, etc...
Here you have 2 many Tutorials to learn How to Hack, Penetracion Testing, Internet Security and to munch more
 
 
 
AnonChrome-1.0-.rar 51.9 MB            
https://mega.co.nz/#!uxAxHZSA!QJds-RoBzXaQLXf8XpWUazdQEso6Mgy_7_68uHaB46o              
             
Acelerar las Descargas de MEGA - MegaTutosPC.rar 8.9 MB          
https://mega.co.nz/#!z1wEnDpJ!Qa6W5KbsGUzwv-25XEYctpyFdY8Sy87ETbQ-ZVPMDK0
 
Haking Tutorials      
https://mega.co.nz/#F!ERZhlYzQ!U99zjpyUm8jFUQHKHUZY9g    
 
PRIMERA SESIÓN:            
https://mega.co.nz/#F!T0ZhXI6I!hFZH99bOkB4SG3__Kg9KuQ
 
SEGUNDA SESIÓN:        
https://mega.co.nz/#F!j9RDnQaI!ncxIDxKrWIWVn_doT_MoWw  
 
TERCERA SESIÓN:
https://mega.co.nz/#F!Kw4hlYQI!bWyVEGGJwC7hdSv9xnPXRA
 
Binari0s:          
https://mega.co.nz/#F!C4ZDTbCA!3uwBcbihCjxilDg6_PMiRg
 
Blog.jheysonmatta.com - Cursos Multimedia:        
https://mega.co.nz/#F!yx5FBbgS!rJY9hSJ_EMoNGmccXevNRA
 
CBT Nuggets - BackTrack and Kali Linux - Humus:          
https://mega.co.nz/#F!qspA1LSK!m4cwZm_DuSXVPytOQHTfxQ
 
CBT Nuggets Microsoft Windows Server 2012 R2 70-410    
https://mega.co.nz/#F!WoZUGA5K!2rnG8U3p0tTzhAjKQZt0gA
 
COREL X7:          
https://mega.co.nz/#F!GxBHEDhY!CkBn7vXA2_AfG14PADzHqQ
 
Pack de Vulnerabilidades:          
https://mega.co.nz/#F!e9IFXBwb!-s3muAOwNcCgRjPEETBMFQ
 
Curso de Explotación de Software:          
https://mega.co.nz/#F!G9h3ATAQ!9jmI6lcDGEDshpmKgrBmYg    
 
Dinero electronico        
https://mega.co.nz/#F!zhZSgaqS!luGmsv_Fekb2fknCHO3LjA
 
Guias:          
https://mega.co.nz/#F!7hRHgLKa!8PaWGnDNeCKJXAo6C3Y7GQ      
 
HACKETICOAVANZADO:  Recomendado...  
https://mega.co.nz/#F!bxAlBJQT!D0cfoXVNoObTupn0X-EbyQ    
 
Hirens Ultimate DVD:      
https://mega.co.nz/#F!X9glmCDK!qUsVAYh6KErwDpQVxzY3ew    
 
NAVEGADORES:            
https://mega.co.nz/#F!z4A1zTTZ!pTc1wNjy5ahKgG5XyOldGw  
 
Programas: Bueno              
https://mega.co.nz/#F!Gs5ETbQS!ndCAb0Q0vPN2xO5TYmKc7g    
 
RecNet: Curso Cisco ICND1 100-10 Español Mega - [blog. jheysonmatta. com]              
https://mega.co.nz/#F!r9Ak0Zaa!yQ9GRGc61aCBTlDqxmQfMg    
 
Softpack 2015 (TEU de Programas)                        
https://mega.co.nz/#F!qkBAxKzS!HdhMzfDoOXLVRhf6pilZ1Q    
 
©593EcuTutos®2014.rar 395 KB                
https://mega.co.nz/#!69JXSTKZ!VBSp7wxBo5Fi1qyUlRgLHfzWs1i61vPUCPLwuyQrh74    
 
Acunetix.Web.Vulnerability.Scanner.Consultant.Edition.v9.0.2014.02.06.zip 46.6 MB                      
https://mega.co.nz/#!25gAVBrS!NhhRWXji_H5rcCJ6cvWzgKx32s1TaAWFsTZwPGYwFNg      
 
Anonymous-OS_0.1.rar 14 KB                        
https://mega.co.nz/#!OtYiwKgI!6pfQFClS2LALuBBws3KaK3I-EkwtlAOfmSxWpeqAujA    
   
avast.exe 112.0 MB                
https://mega.co.nz/#!fhIAnaqa!-pvVXXZLlhW71rIY_4Loe6MhiWnza3ftXKwvA8mWXDA    
 
COMANDOSLINUX.zip 5.7 MB                
https://mega.co.nz/#!jxBD2CIK!RcqqVduQip01CW1P8iQkmirvZwgnwY80w24xcvLBrow  
 
DDOS ATAK.rar 55.3 MB              
https://mega.co.nz/#!noJHDDiK!bbJyNAz2fr9lJulBmud-sxZiAOQtNSHJYxbUn9Hki_k    
 
Desarrollo de apps para Android con Material Design.rar 218.8 MB                
https://mega.co.nz/#!jxhkBDzI!CKNBUTGdHn0pH1_AnowQ8n6outvYMz736vbSTpIUTbI    
 
El-Maldito-libro-de-los-condenados.rar 1.1 MB                
https://mega.co.nz/#!vhQHlKwL!NE1laSg8Sa2WHa3ocCjje--ATosHrxEloGebspEzVlI
 
f.lux Full [OscarTutoriales PC].exe 583 KB        
https://mega.co.nz/#!HwR13ZrZ!DJpjIDhPHVUuV4FRLMMDMmxL0xPKvUuM5fHO74Ud420
 
FlashBoot portable.rar 17.9 MB        
https://mega.co.nz/#!L9BW0IDS!4_gZZhqlew7IHIO81587JJjdzukxppdDmu58Z4RIZic
 
Hacking The Art of Exploitation.pdf 4.4 MB              
https://mega.co.nz/#!P5QFCLBC!T0ieroetubmQTgQ6XU7BrusDEkaR3JjbUEiDzqI8-1w
 
Havij 1.17 Pro Cracked by mm1991 [ AoRE Team ].rar 7.3 MB                  
https://mega.co.nz/#!us5DBJxD!vQib0R0GrtN9B4kRC5VNVSZjCHGzA9Fosha2nZxcGj0
 
Herramientas para Hackear.rar 2.7 MB                  
https://mega.co.nz/#!rg4QWbzY!LsB31T0VwjhXEkHlAaOujsOafceErKmnULkabSplnpM
 
Lista de Programas del TEU Programas 2015.txt 1 KB                      
https://mega.co.nz/#!uo4kkbCQ!Lho5WvRMr_sBuF3CpMGD4hvOJNFC9WqpL7BtLN9jYZE      
 
Logeo.rar 7.5 MB          
https://mega.co.nz/#!bpBgmChY!BPP6oe2EYygBxz8Y3eyurPN51IFtr_L9URFVW88r_IE
 
Loquendo.rar 181.4 MB                        
https://mega.co.nz/#!v9QUlSqI!73EIzcEBycOnuSY0Hsm0brbKde5KOU-obITSsf7hFS4
 
Malwarebytes Full By KmiloGamilo.rar 16.7 MB                  
https://mega.co.nz/#!2hJhSaLC!aTENO0zOpEiPm0Hn4agBeTHo8VoY9TKBLrEMrXMBxSc
 
Malwarebytes_Anti-Malware_Premium_2.1.6.1022_+_Ativador.rar 20.5 MB                    
https://mega.co.nz/#!alYj2TzD!ANy5YAAvQ7_7b0V7fBBClgBxlOAAwEoX-7P5j3y6IDM
       
Seriales Malwarebytes 2014.txt 348 B                
https://mega.co.nz/#!6h5yWAjK!f00Xu5I2ReTI-s8R1tsqCOkriXR7d_YSWOP-c-qOhW4
       
ManualesH.rar 331.3 MB                
https://mega.co.nz/#!bo4mmAKa!k6DocQhY_zqDGRDSMAHowtZIGNl2-qM4S15LvLpcP8s
 
Nuevas Extensiones.rar 2.3 MB                
https://mega.co.nz/#!D0BBwBqS!1809xoFwU0H69cpC2JxAfhGhl7o40MgA8qIQYWudClo
 
pack_defacing.rar 38.7 MB              
https://mega.co.nz/#!ukwWTT5B!SPhAeM0pGjIDQJ7YYHzve0oMwPbcwgkWrmE9eDLwNDI  
 
Pentesting con Kali Linux.pdf 123.8 MB                        
https://mega.co.nz/#!C5hjHYZQ!pOfBAIXMLRIxaQGnfNbqxFJny1OTjxNmai3QnV8QmEs
 
Pmagic_2013_08_01.iso 336.0 MB                
https://mega.co.nz/#!r0JmRCiS!4htdwsB0o9tNXMot94qCW9iwZp0e2q4BZ9Uhp3xEnXM
 
Seguridad PC desde Cero.pdf 17.0 MB    
https://mega.co.nz/#!T9xGnYKY!Sjs78asGvvyDsgL-Y2AQ2h-2lpcwzPjcmVeOugES9mI  
 
Serial de Avast.txt 193 B                      
https://mega.co.nz/#!3pI0hbZQ!vWTzqT1WeflARJqmdk-g9SWj3G_u50HxBi3Op5bqfvs
         
u1405.exe 2.0 MB                    
https://mega.co.nz/#!y8wmRbCY!JUwJ65CJTACSLP5r_W2ff7-4px6h6fvsdbqxbQPyXCc
 
Usuario NOD32 Y 64 original.zip 142.9 MB                
https://mega.co.nz/#!ehRWzZqL!OlH3y12VndM0JSdoR8Lj35KxRD6z49tK6UKn2bNuiDQ
 
uTorrent.rar 1.9 MB                    
https://mega.co.nz/#!jpIWibIZ!qKZZyaiDNIRJk0Z5rerK_O8BuaMYCBSofMjv-JkQnZw
     
Virtual mac.rar 5.13 GB                        
https://mega.co.nz/#!O8w0yL5L!-cpDm9P3tIWwPeDp8t27M_vOMWiVm84NR0XJl22jYIY  
     
Wordpress De la A a la Z.rar 3.75 GB                    
https://mega.co.nz/#!elZUgB5D!Z45ZSwqFIj5jyG2v7cy07FBbbA4xw3ExGaqRdbN3R0I
 
WVS 9.5.rar 42.6 MB                    
https://mega.co.nz/#!b8w1zR4Z!HYvATD14OM2rIwOeQ2bzhaSd8fxS2C6TT2VAGJadqJQ
 
xampp-win32-1.7.3.exe 51.2 MB                    
https://mega.co.nz/#!28pGVQqK!SVhmYFePyUuTHLKYl4sb5hq67Tg0oLzdqEzoSMq-dVc
 
ANONWIKO: Muchos Archivos...                    
https://mega.co.nz/#F!oA0hWQzQ!K0UPvGutjup1tHGcEivYcw  
               
Es_Office_Professional_Plus_2010_x86_x64.rar 1.29 GB                      
https://mega.co.nz/#!jsoXhCSJ!lxbKEfpPY6sm5P9k4dhKoR7iNCXze0EyN-ZFmzuf_Mw    
 
Es_Office_Professional_Plus_2013_x86_x64.rar 1.28 GB                        
https://mega.co.nz/#!P9h1AYia!_iO1zKlJuIUU2eEDp9-8A760dgmiu_5kc4LWAUh9FBo
 
Es_Office_Standard_2007_x86.rar 299.9 MB          
https://mega.co.nz/#!LlpRUR5Z!Mu4t60sLquIXExvweFZK6mRAU8ZM2lVBnCQD5AdiSLE
 
Es_Win_2003_SP1_Enterprise_x86.rar 524.8 MB                  
https://mega.co.nz/#!ftRh1JIb!CvlAbWlhlCNY2PIkpm2xijImbj3TY0PZTGSeESt1i6E
 
Es_Win_2003_SP1_Standar_x86.rar 523.6 MB                  
https://mega.co.nz/#!KoI1kQoI!GDVd38nm1LejDVkIHQIR5dJZAWnM7Q_-68nwWvRpBAQ
 
Es_Win_2008_SP2_Full_Versions_x86.rar 1.73 GB                          
https://mega.co.nz/#!HlZ2yA4Q!LDx1C3xFtYlPb3gmj4stTu0gp1RP2O1PjpVZzsJIUec  
 
Es_Win_81_Enterprise_x86.rar 2.63 GB              
https://mega.co.nz/#!r8J3gKSR!Uq8oY-Fdn9vcqblRNL5b_aBkGjzJJjlYEJo_u_GRR3s
                       
Video anonymous remasterisado full hd by AnonZmAs.mp4 451.9 MB              
https://mega.co.nz/#!i4YEzSZK!hz1PCWCW0TrcpRXPfHW9mMwvzGjXT36-7tlpka9x4fY
 
               
LINUX DISTROS          
https://mega.co.nz/#F!oJIyFKzQ!Hb_Ex0nJI3Xdnf9GLPAHew              
             
beini-1.2.2  Tutoswindow8ga.rar 47.1 MB                  
https://mega.co.nz/#!GlRGWCAQ!APGmfQDkZ6l1OGOh92kOHHR0vqNSzgvEbJy7vZ8mVEU    
             
Wifislax-4.10-final.iso 794.9 MB                        
https://mega.co.nz/#!W4QxwAYL!K4BGZLtqBi7c2Lzcn4OXlPCKO5H5RkSThTAAtkne05Q                
                             
Kali-linux-1.1.0a-i386.iso 2.96 GB                      
https://mega.co.nz/#!SlgHFDya!PHtP-gbB5BU7s1bDMn_Ey2mi4JceW5KTKGEaJzgMz3M              
                               
LINUX DISTROS (Distribution category: Sucurity)                
https://www.facebook.com/notes/juan-de-lemos/linux-distros/10203575502539791                
         
Linux Mount Points          
https://www.facebook.com/notes/juan-de-lemos/linux-mount-points/10203585656953645  
 
Linux - Manually Partitioning Your Drive                                    
https://www.facebook.com/notes/juan-de-lemos/linux-manually-partitioning-your-drive/10203585667793916    
 
         
SECURE YOUR SELF  
 
https://www.facebook.com/notes/juan-de-lemos/how-to-secure-your-computer-and-surf-fully-anonymous-black-hat-style-part-1/10200711469420753            
 
https://www.facebook.com/notes/juan-de-lemos/how-to-secure-your-computer-and-surf-fully-anonymous-black-hat-style-part-2/10200711473500855            
 
https://www.facebook.com/notes/juan-de-lemos/how-to-secure-your-computer-and-surf-fully-anonymous-black-hat-style-part-3/10200711519021993            
 
https://www.facebook.com/notes/juan-de-lemos/how-to-secure-your-computer-and-surf-fully-anonymous-black-hat-style-part-4/10200711554062869                  
 
https://www.facebook.com/notes/juan-de-lemos/how-to-secure-your-computer-and-surf-fully-anonymous-black-hat-style-part-5/10200712025874664                  
 
https://www.facebook.com/notes/juan-de-lemos/how-to-secure-your-computer-and-surf-fully-anonymous-black-hat-style-part-6/10200712028154721                  
 
https://www.facebook.com/notes/juan-de-lemos/how-to-secure-your-computer-and-surf-fully-anonymous-black-hat-style-part-7/10200712032834838                  
 
https://www.facebook.com/notes/juan-de-lemos/how-to-secure-your-computer-and-surf-fully-anonymous-black-hat-style-part-8/10200712038394977                  
 
https://www.facebook.com/notes/juan-de-lemos/how-to-secure-your-computer-and-surf-fully-anonymous-black-hat-style-part-9/10200712054355376                  
 
https://www.facebook.com/notes/juan-de-lemos/how-to-secure-your-computer-and-surf-fully-anonymous-black-hat-style-part-10/10200712066115670                  
 
https://www.facebook.com/notes/juan-de-lemos/how-to-secure-your-computer-and-surf-fully-anonymous-black-hat-style-part-11/10200712069835763                  
 
https://www.facebook.com/notes/juan-de-lemos/how-to-secure-your-computer-and-surf-fully-anonymous-black-hat-style-part-12/10200712075075894                  
 
https://www.facebook.com/notes/juan-de-lemos/how-to-secure-your-computer-and-surf-fully-anonymous-black-hat-style-part-13/10200712081076044                  
 
https://www.facebook.com/notes/juan-de-lemos/how-to-secure-your-computer-and-surf-fully-anonymous-black-hat-style-part-14/10200712085396152                        
 
https://www.facebook.com/notes/juan-de-lemos/how-to-secure-your-computer-and-surf-fully-anonymous-black-hat-style-part-15/10200712091316300                  
 
https://www.facebook.com/notes/juan-de-lemos/how-to-secure-your-computer-and-surf-fully-anonymous-black-hat-style-part-16/10200712104236623                  
 
https://www.facebook.com/notes/juan-de-lemos/how-to-secure-your-computer-and-surf-fully-anonymous-black-hat-style-part-17/10200712108236723                  
 
 
 
--------------------------------------------------------------------------------------
 
Somos Uno, Somos Todos...
Somos Anonymous, Somos legión, No perdonamos, No olvidamos, Gobierno del mundo, esperadnos!!!...
 
#H4CKT1VIST4S UN1D02 S1ST3M4S T3MBL4R
 
 
Viewed 1116 times, submitted by unknown.