Search results

  1. Hacker

    Заливы БА (нужна консультация)

    БА можно слить следующими способами: 1. Купить криптовалюту на любой криптобирже, например, Paxful 2. Трансфер на реквизиты обнальщика 3. Покупки товаров в интернет-магазинах 4. Вывод на любую платежную систему, инвест-конторы, различные прокладки, поддерживающих БА, но при этом, требуется...
  2. Hacker

    Own VPN server without logging and with the tunnel disabled

    Getting started Take a VPS from msk. host ($ 2 per month) Regress and take a VPS You can choose any OS, but I will configure it on Debian and I advise you to repeat everything after me(DON'T FORGET TO CHANGE THE DOMAIN NAME!) Go to the main page: We connect to the server via...
  3. Hacker

    Deanonymous knowing Instagram account!

    We provide you with a useful package of tools necessary for intelligence based on open data knowing the target's Instagram account. SearchMy (http://searchmy.bio/)— Here you can find the profile you are looking for by searching the site. Instadp (http://instadp.com/) - The service is necessary...
  4. Hacker

    Interview with scammer olx and kufar

    I found here for you one quite interesting interview with a scammer. Let's start with the origins.Where did you start, what led you to the activity? 5 years ago, I moved to one of the EU countries for permanent residence, and I realized that there is not much work there, except for cleaning and...
  5. Hacker

    What a person says and actually does

    Salute, fans of fucking up someone else's account, today we have a very interesting article about what a person does and what he says. DECLARED INTENTIONS Let's start with the definitions. Here are some examples: "It's better for me to be a loser" "I wish you well" "I want everyone to be...
  6. Hacker

    What we leave behind

    When we visit a website, we leave a lot of data about ourselves, starting with our IP address and ending with digital fingerprints, which are formed from all available data about the system, browser, and plugins. These prints are called “fingerprints". They are unique identifiers of 32...
  7. Hacker

    How to pay a bribe correctly

    Let's start with the law: article 291 of the Criminal Code (CC) of the Russian Federation states that handing over a "lamb in a piece of paper" is a criminal offense, for which a penalty is imposed depending on the severity of the crime at the choice of the court. What will happen for this type...
  8. Hacker

    Fun black scheme

    The essence of the scheme is to bypass apartment buildings by apartment and inform residents about the replacement/renewal of access equipment. The scheme will live for an ultra long time. The color is gray. The yield is high. In performance, everything is very simple, just do 1 cycle yourself...
  9. Hacker

    Why develop SE?

    1.) With the help of SE, you can get what you want from a person, of course, if your skill in this matter is much higher. You can divorce any girl for sex, or an oligarch for a Rolls Royce and a house in the Maldives, who will not even guess that you have divorced him. 2.) With the help of SE...
  10. Hacker

    Your WI-FI will tell you where you live, where you work, and where you travel

    Of course, we are not talking about your conversations, but it is quite possible to find out about your place of residence, work, and travel, since mobile devices are able to report their previous connections. You probably didn't know about this. How does this happen ? To connect to existing...
  11. Hacker

    How to share your secrets and win big

    Straight to the point. In this article, you will learn: What are secret sharing schemes and what are they eaten with What are good threshold schemes? The idea of the Mignotte scheme The idea of the Karnin-Green-Hellman scheme Where are such schemes used? What are secret sharing schemes and...
  12. Hacker

    Methods of conducting negotiations

    All negotiations are essentially bargaining, even if they do not involve money: you offer something of your own, and in return you want to get something else's. We were all great negotiators once, because we were kids. Children are ruthless, not prone to reflection, do not know the word...
  13. Hacker

    Communication for the sake of communication

    Everyone who works on themselves has to face such a stage in life when the old environment begins to become a kind of burden. And then there is an obvious choice that everyone feels, but few people dare to make a decision: give up and go further or hold on and stand still? When you realize that...
  14. Hacker

    Manipulating people with various human feelings

    Techniques for manipulating people There are 2 groups of manipulations: directive techniques are based on fear and power techniques of hidden influence "bypass", distract the consciousness-the controller of incoming information - and affect directly the defenseless subconscious. Below we...
  15. Hacker

    Scam method about dog sales

    Today we will delve into the black-blackness of earnings. We're going to sell dogs. Many people know that now there is an incredible fashion for small dogs. Especially among women. Especially in big cities! So we will earn money on them. I will immediately say that you need a high SE skill, and...
  16. Hacker

    How to stop saying unnecessary things during conflicts

    Disputes, conflicts, misunderstandings… No one is immune from this. The most important thing in such situations is to be able to keep silent in time, so that under the influence of emotions you do not allow yourself offensive remarks, which you will have to regret for a long time later. How not...
  17. Hacker

    Useful information for young scammers

    There is a problem I think all those who cheat on prepayment are familiar with the moment when mammoth merges, refusing to pay: "I'll pay when I see the track number and track the parcel." Yes, this is really a problem, because of which more than half of the warmed mammoths are lost. There is a...
  18. Hacker

    Earnings for social engineers

    Preparation: If you have straight arms, then it will take no more than 1 hour to prepare. 1) Documents. - MOST IMPORTANTLY, the documents must be with the city and residence permit where you will place it( I took the Moscow time and registration closer to the center), here we need-home page...
  19. Hacker

    Что делать при обыске автомобиля

    1. Попросить инспектора предъявить служебное удостоверение, пункт 2.4 ПДД. 2. Зафиксировать его данные. 3. После того как инспектор предложил вам открыть капот, багажник или двери автомобиля, вежливо попросите его составить протокол досмотра (ст. 27.9 КоАП) 4. Пригласить двух понятых. Причем...
  20. Hacker

    Herd feeling or the 5 percent law

    There is such a thing as autosynchronization. This phenomenon was first observed in ancient Egypt. The bottom line is that if 5% of the population performs a certain action at the same time, the rest of the majority starts repeating it. If you scare 5% of the animals in a peacefully grazing...
Top