Search results

  1. H

    About Encoding

    Are you kidding me? CCV is an additional code for a CC to make purchases online. You can't encode shit. You need DUMPS! Not CCV. But then what's the use of DUMPS if you don't know the PIN code?
  2. H

    Кто какой антивирь юзает?

    Я лично использую виндовс 7 и убунту. На виндовсе без антивира сидеть нельза. Мда. при хороших криптах антивир трояна не заметит но есть полно людей которие пробуют хакать при старих троянах и вирусах. так вот без зашити и можете заразить компа через коковата школьника. Я много читал про...
  3. H

    newbie.

    Find some drops, and ship items to them, have them reship them to you, and then sell it or keep it. Or make the drop holder pay you LR in % back. Another way is to do the similar thing with gift certificates. :)
  4. H

    newbie.

    Online Carding. :)
  5. H

    Fastest Socks5 proxy provider

    Try http://5socks.net/en_index.htm , they have been operational since 2006 according to my research (since 2004 so they claim). But nevertheless the domain expires in 2018, so they have paid well ahead, and the website looks reputable.
  6. H

    Fastest Socks5 proxy provider

    I would suggest giving http://thesafety.us/en/ a try, but they recently closed registration of new Socks accounts for unknown reasons. How about using RDP, dedicated servers?
  7. H

    TOR Exitnodes

    Thanks, I will adding new information as we go. Remember this is not the complete list, there are many more exit nodes which block carder pro. You just have to find them yourself, and add the fingerprints yourself. Now another trick is to block countries. This is done in the following way...
  8. H

    WIFI, Backtrack and MAC Spoofing

    WiFi, Backtrack (And Mac Spoofing) MAC Spoofing What software you use for this depends on what OS you are using. Ubuntu Sudo apt-get install macchanger Now when you want to change your Mac address, do it in the following format: macchanger [options] device You can get a full list of...
  9. H

    Different Levels

    Review of Cards Issuers (Visa/MasterCard/American Express) ________________________________________ Visa Cards Visa Virtual - a virtual card exclusively for use on the Internet. It was created in order to increase consumer confidence in electronic commerce and enable them to distinguish...
  10. H

    Есть оптовые скупщики сканов xbox live 4200 points? Осталось таких 15 штук.

    Транслитом нельза писать. бистро измени пака мод или админ тебя за ето не забанят. Если нада исползуй етот сайт: translit.ru
  11. H

    Поиск Софта

    Я тебе нашол мой сстоолс 7.0 и скинул. он чист. сам з ним работаю. у меня даже ав ад-авар даже не палит. http://www.2shared.com/file/WFIMG8_h/CCTools_70.html Удачи. :)
  12. H

    Поиск Софта

    Зачем тебе портабл. просто будет медленей. лутше возми нормалную и всун вару в закриптований контенер. а на основной ос заинстелуй убунту чтоб не було подозрительно и всё. :cool:
  13. H

    My persenal knowledge [BINS]

    Successful in doing what? any exceptional transfers or?
  14. H

    Софт на MSR.

    TheJerm 1.78 справляетьса с етим делом нормально. не вижу смисла чтото нового изабретать.
  15. H

    Need USA drops for Tax returns.

    If you are going to use ICQ, then at least download OTR 3.2 to encrypt your IMs. Here is the download link: http://www.cypherpunks.ca/otr/ It would be useful for you to read my "Ultimate Security Guide" found in Anonymity and Security articles, or just search for it. Good Luck :)
  16. H

    Need USA drops for Tax returns.

    Pidgin is a good program for IM chats. Jabber (XMPP) is much safer than ICQ, as ICQ store logs like forever, and is centralized. Jabber on the other hand is decentralized, and many servers probably don't store logs, or at least aren't for lookout of illegal logs to report. Jabber is a bit more...
  17. H

    TOR Exitnodes

    Greetings dear carders, I believe that point of access and method to the internet is very important when you are in hacking/carding business. VPN is good, but its operators know who you are, since they can observe everything. TOR works by routing it through 3 IP Nodes, only the last one...
  18. H

    Аааааааааааааааааааааааааааааааа!

    Лол. задалбали уже неадекватние люди.
Top