Paranoid II-course on anonymity and security (2020)
Paranoid II-a logical continuation of the course on anonymity in the Paranoid network
Instructor: ghost
What the course is about: a set of measures to protect information, privacy, personal data protection, anonymity on the Internet and more ...;
Who this course is for: people who need a high degree of privacy and information protection;
We will provide: access to video and text materials, as well as personal consultations within the course;
What else: practical tasks for each lesson.
The course consists of 10 lessons:
Paranoid 1 - course on anonymity and security on the Internet (2018)
You won't waste a second of extra time. Course without water and extra blah-blah-blah from the word completely. How did we do it ? We cut the course in half from the original size, and removed what is usually viewed on rewind. Then they cut it in half again. There is a sufficient minimum left.
?Download
[PLASTIK] University of Cybersecurity and Anonymity 2.0 (2020)
Security
* Set up a completely anonymous and secure system
* Bypassing surveillance by the provider
* System-level disk encryption
* Creation of cryptographic containers and secure data storage outside the system
* The substitution of unique settings of system and browser to bypass fingerprint
* Encryption and obfuscation of the source
* Entering and withdrawing currency on the darknet
* Cryptocurrency bleaching
* Prevent leakage of real data
* To maintain a session, to bypass the banking checks
* Set up an anonymous virtual machines
* Protection against penetration into the main system
* Intercept traffic in the system and on the server
* Protection against zero-day attacks
* Bundles for secure and anonymous Internet access
* Double VPN and its work in conjunction with tor
* Protection against VPN drops and leaks due to network failures
* Work via a remote windows system
* Software for system configuration and cleaning
* Disable suspicious features in windows
* Bypass leaks via meta-information in files
* DNS leak protection
* Countering calculation through log analysis
* Use of left cards and SIM cards
* Money laundering and cash withdrawal schemes
?Download
[EXELAB] Video course HACKING 2019
It includes not one, but as many as 4 global areas of knowledge: hacking, program hacking, reverse engineering, and programming. There are more than 400 video tutorials in one course and this is a record! This means that by choosing any of the four main topics, you will always get a lot of video tutorials that reveal the essence. In addition, there are as many as 800 specialized tools from hacking to programming - you will definitely find the right one. And a solid surplus of 100 books published over the past three years, of course, dedicated to hacking and programming.
I want to note right away that all my video tutorials call for the ethical use of the acquired knowledge: I do not call for breaking laws, hacking other people's websites and programs, or violating the interests of other people and companies.
?Download
Password: www.sharewood.biz
[Сyberyozh] Course on anonymity and online security (2020)
A list of parts and chapters of the free course on anonymity and online security from CyberYozh security group.
?Download
Paranoid II-a logical continuation of the course on anonymity in the Paranoid network
Instructor: ghost
What the course is about: a set of measures to protect information, privacy, personal data protection, anonymity on the Internet and more ...;
Who this course is for: people who need a high degree of privacy and information protection;
We will provide: access to video and text materials, as well as personal consultations within the course;
What else: practical tasks for each lesson.
The course consists of 10 lessons:
- Configuring the working environment. Improved and redesigned work with virtual machines (perhaps the only analogy with the previous course);
- Fine work with different cryptocurrencies;
- Choosing, renting, managing, and protecting a VPS (70% of the course's work takes place on servers);
- Installing and configuring services on a VPS and working with them;
- Fine-grained work with Tor services;
- Getting the most out of the Raspberry Pi;
- Anonymous routers;
- Creating, configuring, and administering a Tor node;
- Working with PC hardware. Deleting hardware bookmarks;
- Risk minimization and ... author's developments.
Paranoid 1 - course on anonymity and security on the Internet (2018)
You won't waste a second of extra time. Course without water and extra blah-blah-blah from the word completely. How did we do it ? We cut the course in half from the original size, and removed what is usually viewed on rewind. Then they cut it in half again. There is a sufficient minimum left.
?Download
[PLASTIK] University of Cybersecurity and Anonymity 2.0 (2020)
Security
* Set up a completely anonymous and secure system
* Bypassing surveillance by the provider
* System-level disk encryption
* Creation of cryptographic containers and secure data storage outside the system
* The substitution of unique settings of system and browser to bypass fingerprint
* Encryption and obfuscation of the source
* Entering and withdrawing currency on the darknet
* Cryptocurrency bleaching
* Prevent leakage of real data
* To maintain a session, to bypass the banking checks
* Set up an anonymous virtual machines
* Protection against penetration into the main system
* Intercept traffic in the system and on the server
* Protection against zero-day attacks
* Bundles for secure and anonymous Internet access
* Double VPN and its work in conjunction with tor
* Protection against VPN drops and leaks due to network failures
* Work via a remote windows system
* Software for system configuration and cleaning
* Disable suspicious features in windows
* Bypass leaks via meta-information in files
* DNS leak protection
* Countering calculation through log analysis
* Use of left cards and SIM cards
* Money laundering and cash withdrawal schemes
?Download
[EXELAB] Video course HACKING 2019
It includes not one, but as many as 4 global areas of knowledge: hacking, program hacking, reverse engineering, and programming. There are more than 400 video tutorials in one course and this is a record! This means that by choosing any of the four main topics, you will always get a lot of video tutorials that reveal the essence. In addition, there are as many as 800 specialized tools from hacking to programming - you will definitely find the right one. And a solid surplus of 100 books published over the past three years, of course, dedicated to hacking and programming.
I want to note right away that all my video tutorials call for the ethical use of the acquired knowledge: I do not call for breaking laws, hacking other people's websites and programs, or violating the interests of other people and companies.
?Download
Password: www.sharewood.biz
[Сyberyozh] Course on anonymity and online security (2020)
A list of parts and chapters of the free course on anonymity and online security from CyberYozh security group.
?Download