security

  1. Carding

    Attack on the Paraguayan Police: stavka – the future of the country's security

    Data leaks can affect national security and international relations. More than 500,000 internal documents and images, as well as 175 GB of SQL databases, were stolen from the system of the National Police of Paraguay (Policía Nacional del Paraguay). Among the leaked data are documents from...
  2. Carding

    How ASUS disappointed its fans: three unacceptable mistakes in router security

    Update your firmware or your data is in trouble. Three critical remote code execution vulnerabilities were found in popular ASUS router models: RT-AX55, RT-AX56U_V2, and RT-AC86U. The defects will allow potential attackers to gain full control over devices if the user does not install the...
  3. Hacker

    Total FAQ on Network Security and Anonymity

    1. Complete anonymity does not exist in nature at all! "Complete anonymity" is not required, it is enough to confuse the chain in such a way that its unraveling is unprofitable and the effort spent does not pay off with the result. To reach this level, you do not need any special knowledge and...
  4. CarderPlanet

    Security and Privacy Apps for your Android!

    Good day! Today we have selected apps for you that will greatly enhance your security and privacy when using Android devices. In addition to protecting your personal data, applications will allow you to replace some of the Google services that most aggressively collect user information. Let's...
  5. B

    HOW TO DETECT SSH HONEYPOTS ?

    What are SSH honeypots? Honeypots are decoy servers or systems set up to gather information regarding an attacker or intruder into a system. They are designed to look vulnerable to attack, but once an intruder gains access to the system all of their actions are controlled and monitored. SSH...
  6. Lord777

    5 simple rules for telegram account security

    Although Telegram is a well-protected messenger - there was not a single leak or suspicion of cooperation with special services - there is always a human factor. To accurately protect yourself from account hijacking or theft of valuable data, follow these tips: 1. Urgently enable two-factor...
  7. B

    How to delete RDP logs?

    I need help regarding deleting RDP logs after using RDP. How can i manually delete RDP logs from my PC & is there any way to delete them automatically? And,for how many days a RDP can last?
  8. B

    Incognito window

    What is advisable? Incognito window or normal Window for Browser like Firefox. I use CCleaner after closing the browser.
  9. CreedX

    The best security apps for Android!

    F-Droid - analog to Play Market, but with free and open source apps. Private Location - a simple app to set up your location anywhere in the world and increase the overall privacy of your phone's location. KeePassDroid -the best program for securely storing passwords and sensitive data in...
  10. Teacher

    Online security and privacy

    Today's material is devoted to the most common channels for transmitting information on a home or partly corporate laptop, as well as the struggle for personal safety and anonymity. Content 1. How to protect your browser from data leaks. 2. Temporary mailboxes 3. How to get a virtual number for...
  11. Carding

    Carders defensive stance to enforce justice

    How carders build their line of defense when facing justice: Correct legend and testimony. It can happen to anyone. I accidentally lost my IP, made a call from a flashed SIM card, recognized my neighbor - no matter how, but I got burned. They came to you, and guys in uniform came to you. In...
  12. Carder

    Offline anonymity and security. How not to get into a mess?

    Good time of day. Last time I wrote about how you can be tracked using your own mobile phone, but this article will be a Supplement and will be devoted to aspects of psychological security and anonymization, which is inherently associated with offline, and also rather focused on beginners and...
  13. Carder

    Free courses on anonymity and security

    Paranoid II-course on anonymity and security (2020) Paranoid II-a logical continuation of the course on anonymity in the Paranoid network Instructor: ghost What the course is about: a set of measures to protect information, privacy, personal data protection, anonymity on the Internet and more...
  14. Carding 4 Carders

    Security and anonymity for Android

    With each everything on the network, more and more potential threats arise that can harm the security of our confidential data, therefore, today we decided to share with you a list of vital applications for your phone that will protect it from external intrusion and surveillance. Services: 1...
  15. Carder

    HOW TO BYPASS PAYPAL SECURITY VERIFICATION

    - Get the paypal login ready and connect state/country IP - Then open normal window on chrome and a private window (or use your phone for more stable) - Go to paypal.com & login on both browser at same time - Now, if you clicked it same time on both window… 1 Will Ask for security challenge and...
  16. Friend

    Bypass Paypal error message

    "Sorry but your payment could not be processed at this time. Please return to merchant.." Получаете ошибки о невозможности проведения платежа и не знаете, что делать? Всего пара простых действий, и все заработает! Шаг 1 С помощью CCleaner очистите кеш и удалите все cookie. Запустите очистку...
  17. Carder

    Cloud Computing Security: Foundations and Challenges 2020-12-28

    Hacking and Penetration Testing Book
  18. Carding

    About security for carders in carding

    At the expense of security, everything is simple, the main thing is not to touch the CIS logs in any case, working in the USA, Germany, France, etc., there should be no problems. If someone had them, we would know about it, the carding community is not that big. Here is an excerpt from one of my...
  19. Carding

    Lecture: Security and configuration of a virtual machine

    Lecturer: Payne (19:15:46) Payne: Greetings. Topic of the lecture: "Security and configuration of the virtual machine." (19:16:13) Payne: The lecture includes the following parts: 1. General characteristics of privacy and security. 2. Structural adjustment of a virtual machine: programs...
  20. Carding

    Lecture: Introduction to Security

    Lecturer: crowe [19:20:34] <crowe> I apologize for the delay! Today we will conduct a lecture in the rhythm that is familiar to you. Then I answer your questions. [19:20:56] <crowe> [19:21:01] <crowe> Introduction to security [19:21:16] <crowe> I will try to explain in simple language...
Top