Search results

  1. Hacker

    How to share your secrets and win big

    Straight to the point. In this article, you will learn: What are secret sharing schemes and what are they eaten with What are good threshold schemes? The idea of the Mignotte scheme The idea of the Karnin-Green-Hellman scheme Where are such schemes used? What are secret sharing schemes and...
  2. Hacker

    Methods of conducting negotiations

    All negotiations are essentially bargaining, even if they do not involve money: you offer something of your own, and in return you want to get something else's. We were all great negotiators once, because we were kids. Children are ruthless, not prone to reflection, do not know the word...
  3. Hacker

    Communication for the sake of communication

    Everyone who works on themselves has to face such a stage in life when the old environment begins to become a kind of burden. And then there is an obvious choice that everyone feels, but few people dare to make a decision: give up and go further or hold on and stand still? When you realize that...
  4. Hacker

    Manipulating people with various human feelings

    Techniques for manipulating people There are 2 groups of manipulations: directive techniques are based on fear and power techniques of hidden influence "bypass", distract the consciousness-the controller of incoming information - and affect directly the defenseless subconscious. Below we...
  5. Hacker

    Scam method about dog sales

    Today we will delve into the black-blackness of earnings. We're going to sell dogs. Many people know that now there is an incredible fashion for small dogs. Especially among women. Especially in big cities! So we will earn money on them. I will immediately say that you need a high SE skill, and...
  6. Hacker

    How to stop saying unnecessary things during conflicts

    Disputes, conflicts, misunderstandings… No one is immune from this. The most important thing in such situations is to be able to keep silent in time, so that under the influence of emotions you do not allow yourself offensive remarks, which you will have to regret for a long time later. How not...
  7. Hacker

    Useful information for young scammers

    There is a problem I think all those who cheat on prepayment are familiar with the moment when mammoth merges, refusing to pay: "I'll pay when I see the track number and track the parcel." Yes, this is really a problem, because of which more than half of the warmed mammoths are lost. There is a...
  8. Hacker

    Earnings for social engineers

    Preparation: If you have straight arms, then it will take no more than 1 hour to prepare. 1) Documents. - MOST IMPORTANTLY, the documents must be with the city and residence permit where you will place it( I took the Moscow time and registration closer to the center), here we need-home page...
  9. Hacker

    Что делать при обыске автомобиля

    1. Попросить инспектора предъявить служебное удостоверение, пункт 2.4 ПДД. 2. Зафиксировать его данные. 3. После того как инспектор предложил вам открыть капот, багажник или двери автомобиля, вежливо попросите его составить протокол досмотра (ст. 27.9 КоАП) 4. Пригласить двух понятых. Причем...
  10. Hacker

    Herd feeling or the 5 percent law

    There is such a thing as autosynchronization. This phenomenon was first observed in ancient Egypt. The bottom line is that if 5% of the population performs a certain action at the same time, the rest of the majority starts repeating it. If you scare 5% of the animals in a peacefully grazing...
  11. Hacker

    Time Management: simple ways to manage your time

    The rhythm in which most of us live can hardly be called calm and measured. Lack of time, emergency situations and tight time constraints are challenges that not everyone can cope with. Being constantly in a state of "I don't know what to grab" is hardly appropriate when it comes to personal...
  12. Hacker

    7 tips on how to lie convincingly

    Since childhood, our parents have tried to instill in us the awareness of the fact that a person should always tell the truth. This is also what the proverbial Bible teaches us, which states in black and white in one of the commandments that lying is a great sin. Folk wisdom does not lag behind...
  13. Hacker

    Handbook of Social Engineering

    How to hack a corporate security system? Sometimes all you need to do is make a phone call or write an email. So says Kevin Mitnick, formerly the world's most famous hacker, and now an information security consultant, founder of Mitnick Security Consulting. Kevin Mitnick is a former hacker who...
  14. Hacker

    Anonymity software

    Hello everyone, today I will tell you about 10 programs for anonymity. 1. STZBlaster is a program for changing the name of the PC, host, processor ID, HDD volume, MAC adress and much more. Also in the program, you can additionally change the regional settings. 2. RMOSChange.exe - the program...
  15. Hacker

    Carding in the CIS

    In the mid-1990s, no one had yet heard of credit card fraud, and the rare cases of money lost were the mistakes of shops and banks. Therefore, unafraid online stores willingly accepted non-existent generated credit cards, the algorithm of which was the same as that of real cards. After checking...
  16. Hacker

    How do renderings burn?

    Hello everyone) Today I want to tell you about how rendered documents are fired and how you can determine the quality of such work. Let me remind you, just in case, what rendering is. Rendering is a scan of a document or map drawn in Photoshop using the necessary previously known data. Such a...
  17. Hacker

    Application Guide: How to Bypass XSS Filters

    There are vulnerabilities in almost any web project, and I will teach you how to use this circumstance for your own purposes. Practical, of course. How to Investigate the Site Name Element Any web application works on the principle of character encoding "<"and">". First, you need to figure out...
  18. Hacker

    What is carding for carders

    Today I will answer some of the questions that subscribers of our channel began to ask me: What is carding for me? Why do I need it? How much do I make from this? What are your plans for the future? I will not divide my answers point by point, I will just describe the whole situation with...
  19. Hacker

    What is carding for carders

    Greetings to everyone who decided to read this article. I wrote it for beginners who heard something about carding and decided to surf the Internet in search of answers to their questions. I will try to make you as clear and detailed as possible with the basic points, explain the very first...
  20. Hacker

    The pitfalls of real carding

    Real (carding in real life) has 2 main directions. Actually, the direct cash out of the stolen cards and shopping (making purchases) with the help of these very stolen cards. I'll tell you about the first one first. 1) Pulling dumps (data recorded on the magnetic stripe of the card is called a...
Top