Tomcat
Professional
- Messages
- 2,689
- Reaction score
- 929
- Points
- 113
The optimal type of security should look like this. An external hard drive or USB flash drive on which a virtual machine is hidden in an encrypted container. From the virtual machine you access the network, using a VPN for security and a socks5 (or shh-tunnel) for disguise. So, let's take our drive, 20 gig is enough for a start. But over time, you may run out of space. Therefore, I advise you to take, for example, an SSD of at least half a terabyte.
We encrypt the drive with the TrueCrypt we previously downloaded. After that, we transfer our Windows image from which we will work to an encrypted container. We launch the image from the virtual machine. The system language should only be Eng. The antifraud system perfectly targets you in the Ru language, flash, media. This is almost 100% unsuccessful driving. You don’t have to worry about software with Russian language, shops don’t shoot them. We install on the basis (main system) of VPN. And from it you distribute it to the virtual machine. This usually happens automatically, through a virtual adapter that is already connected.
VPN - your freedom and anonymity. NEVER neglect it. It encrypts your traffic. We went to a darknet resource without VPN enabled and voila - all this is displayed by your provider. Next is a request from law enforcement agencies, the provider fires your website visits, and then the soldering iron is in... Well, you get the idea. ALWAYS use a VPN!
Which one should I use? - Paid!
After connecting the VPN, go to Check IP, learn my real IP computer address and my location by IP - WhatLeaks.com and check whether the country of the VPN you bought matches the country displayed on the site. We took the USA and on the USA website, which means everything is OK!
1. Setting up WebRTC
WebRTC technology allows you to determine your real IP bypassing VPN, proxy and socks connections, etc. We strongly recommend that you disable WebRTC based. At the moment this can only be done reliably in Firefox.
WebRTC on a virtual machine:
A) You can also disable it, however, merch with a well-configured AF notices this fact and reduces the % of traffic of your product.
B) Configure a firewall (can be built-in or third-party, for example Commodo) so that all packets (outgoing and incoming) pass only through the proxy connection. This way your WebRTC will be the same as that of the holder (and not disabled at all). This means + to karma and more chances of successful driving.
Protection
We put the antivirus on the basis. Don’t download anything onto the base, don’t open it, don’t install it, don’t give access to your team, in short, be a pushover. If something needs to be installed, opened, checked, read, etc., THEN open a virtual machine (you can create a special virtual machine where you will have a test site for a “nuclear weapon”) and do all this there. All of the above must be done if you do not want to lose your cue balls, valuable files, become a Dedik and many other perversions.
2. Risk factors (flags/triggers/bells)
Let's say that to successfully drive in, you must become a holder. This is the MOST important thing, if suddenly you don’t understand why you can’t drive something in, then immediately think that you are doing it differently, as if the holder himself would do it.
a. IP – must match the country of the material from which you are hitting and preferably the shop should also be from the country with which you have a checkmate.
b. E-mail - firstly, it should NOT be from some @Mail.ru and other free providers, the domain of the e-mail should preferably be from the country from which you have the CC. There are also corporate emails that cannot be obtained in the same way as free emails by simply going through the registration procedure. Typically, corporate mail is issued in various companies (construction, travel agencies, online stores, etc.), a striking example of corporate mail would be directorHOLDERNAME@cocacola.com. If the shop sees that your soap matches the country of the holder with the last name and first name in the nickname, and it’s also corporate... That’s it. We enjoy: you are guaranteed maximum approval points.
P.S. “e-mail for the holder’s country” - this means that at the end after the dot there is an abbreviation indicating belonging to a particular country: .ru, .ua, .pl, .nz, uk and so on.
3. Countries with a high risk of fraudulent transactions: Russia, Ukraine, Moldova, Belarus, Philippines, Indonesia, Hong Kong, Egypt, Lebanon, Macedonia. When entering from these countries, do not be surprised if, for unknown reasons, after successful entry, they refuse to send you a pack and return the money to the card.
4. Distance between the buyer’s IP and the delivery address. I bought it from the states, but the delivery address was Russia? “Oh, so this is a gift to our client’s beloved relatives in Russia! Of course a helmet! We are not barbarians! What if grandma’s birthday is coming soon, and we don’t send her away and ruin the poor woman’s holiday.” - the MacBook store operator will think. All this banter is to make it clear in your head that this is a very important fact when deciding whether to send you a pack or not, EVEN if the drive went through.
5. Check by bin. The bean determines which country you have a card and if the card does not match the IP, then... make sure everything matches).
6. Checking IP for publicity (open ports such as 1080, 8080, etc.)
You can check open ports and whether your IP is being used as a proxy at Whatleaks.com
7. Checking IP in spam lists. Check everything there. There are also paid services that have a much wider list of databases (than free ones), which have access to databases such as Maxmind, which have all the blacklist databases.
8. DNS is a computer distributed system for obtaining information about domains.
Most often used to obtain an IP address from a host name, obtain information about mail routing, serving hosts for protocols in a domain. In simple words, this is an intermediate point between your IP and the store. So it should also preferably coincide with the holder’s country. How to do it? Type into Google: “DNS of Germany\America\Australia” or take it from the Public DNS Server List website, then copy it, and then follow these instructions: Setting up DNS on a Windows computer.
The minimum you can do is install DNS from Google. To drive into some unpopular shop, this will be enough in most cases.
9. Phone. What phone number should I enter in the entry field?
Earlier I said that we must match the holder, but not in this case, or rather, not entirely. If you indicate the holder's phone number, they may call him (not necessarily, of course), but they can. So what should we do? The first thing you can do and the simplest thing is to change the last couple of digits of the phone number (not the first digits, because there is a code in the second third and fourth digits that points to a specific region, which can burn us if we change them incorrectly) . And if they call this number, it will either be inactive, or someone will say: “You are in the wrong place and will disconnect, or (worse) I don’t know what package I’m talking about.” The second thing you can do is to spam the holder’s phone number with calls so that it is always busy. And third, buy a number on Skype and indicate it as the holder’s number. In this case, if your English is OK, you can answer the call yourself, which will raise the trust to the order (just read all the information about the holder that you have just in case and ALWAYS calculate how old the holder is because They often ask how old you are, and you say: “Well, God knows, I’m from 1956, even though I have problems with my memory) or put an answering machine on it. So, if you call, the number will at least be active.
10. Information that can be accessed by a shop, bank, office, etc.
The shop can request your name and phone number from the bank. Banks may request answers to security questions (where you lived before, who you were married to, etc.). This information can be found out by breaking through the BG (back ground - all information related to the holder’s personal life). You can use the services of colleagues who provide this information for a fee, or you can enter the service yourself and find out. They may ask for SSN, DOB, MMN (mother's middle name) - we have an analogy of TIN, date of birth, mother's maiden name. Using AVS (address verification system) they can find out at what address the card is registered. This system applies to the following countries: USA; Mexico; Australia; Brazil; New Zealand; England; Canada. When entering cards from these countries, the billing address must match the information that came with the card, otherwise 99% of entries are unsuccessful.
We encrypt the drive with the TrueCrypt we previously downloaded. After that, we transfer our Windows image from which we will work to an encrypted container. We launch the image from the virtual machine. The system language should only be Eng. The antifraud system perfectly targets you in the Ru language, flash, media. This is almost 100% unsuccessful driving. You don’t have to worry about software with Russian language, shops don’t shoot them. We install on the basis (main system) of VPN. And from it you distribute it to the virtual machine. This usually happens automatically, through a virtual adapter that is already connected.
VPN - your freedom and anonymity. NEVER neglect it. It encrypts your traffic. We went to a darknet resource without VPN enabled and voila - all this is displayed by your provider. Next is a request from law enforcement agencies, the provider fires your website visits, and then the soldering iron is in... Well, you get the idea. ALWAYS use a VPN!
Which one should I use? - Paid!
After connecting the VPN, go to Check IP, learn my real IP computer address and my location by IP - WhatLeaks.com and check whether the country of the VPN you bought matches the country displayed on the site. We took the USA and on the USA website, which means everything is OK!
1. Setting up WebRTC
WebRTC technology allows you to determine your real IP bypassing VPN, proxy and socks connections, etc. We strongly recommend that you disable WebRTC based. At the moment this can only be done reliably in Firefox.
WebRTC on a virtual machine:
A) You can also disable it, however, merch with a well-configured AF notices this fact and reduces the % of traffic of your product.
B) Configure a firewall (can be built-in or third-party, for example Commodo) so that all packets (outgoing and incoming) pass only through the proxy connection. This way your WebRTC will be the same as that of the holder (and not disabled at all). This means + to karma and more chances of successful driving.
Protection
We put the antivirus on the basis. Don’t download anything onto the base, don’t open it, don’t install it, don’t give access to your team, in short, be a pushover. If something needs to be installed, opened, checked, read, etc., THEN open a virtual machine (you can create a special virtual machine where you will have a test site for a “nuclear weapon”) and do all this there. All of the above must be done if you do not want to lose your cue balls, valuable files, become a Dedik and many other perversions.
2. Risk factors (flags/triggers/bells)
Let's say that to successfully drive in, you must become a holder. This is the MOST important thing, if suddenly you don’t understand why you can’t drive something in, then immediately think that you are doing it differently, as if the holder himself would do it.
a. IP – must match the country of the material from which you are hitting and preferably the shop should also be from the country with which you have a checkmate.
b. E-mail - firstly, it should NOT be from some @Mail.ru and other free providers, the domain of the e-mail should preferably be from the country from which you have the CC. There are also corporate emails that cannot be obtained in the same way as free emails by simply going through the registration procedure. Typically, corporate mail is issued in various companies (construction, travel agencies, online stores, etc.), a striking example of corporate mail would be directorHOLDERNAME@cocacola.com. If the shop sees that your soap matches the country of the holder with the last name and first name in the nickname, and it’s also corporate... That’s it. We enjoy: you are guaranteed maximum approval points.
P.S. “e-mail for the holder’s country” - this means that at the end after the dot there is an abbreviation indicating belonging to a particular country: .ru, .ua, .pl, .nz, uk and so on.
3. Countries with a high risk of fraudulent transactions: Russia, Ukraine, Moldova, Belarus, Philippines, Indonesia, Hong Kong, Egypt, Lebanon, Macedonia. When entering from these countries, do not be surprised if, for unknown reasons, after successful entry, they refuse to send you a pack and return the money to the card.
4. Distance between the buyer’s IP and the delivery address. I bought it from the states, but the delivery address was Russia? “Oh, so this is a gift to our client’s beloved relatives in Russia! Of course a helmet! We are not barbarians! What if grandma’s birthday is coming soon, and we don’t send her away and ruin the poor woman’s holiday.” - the MacBook store operator will think. All this banter is to make it clear in your head that this is a very important fact when deciding whether to send you a pack or not, EVEN if the drive went through.
5. Check by bin. The bean determines which country you have a card and if the card does not match the IP, then... make sure everything matches).
6. Checking IP for publicity (open ports such as 1080, 8080, etc.)
You can check open ports and whether your IP is being used as a proxy at Whatleaks.com
7. Checking IP in spam lists. Check everything there. There are also paid services that have a much wider list of databases (than free ones), which have access to databases such as Maxmind, which have all the blacklist databases.
8. DNS is a computer distributed system for obtaining information about domains.
Most often used to obtain an IP address from a host name, obtain information about mail routing, serving hosts for protocols in a domain. In simple words, this is an intermediate point between your IP and the store. So it should also preferably coincide with the holder’s country. How to do it? Type into Google: “DNS of Germany\America\Australia” or take it from the Public DNS Server List website, then copy it, and then follow these instructions: Setting up DNS on a Windows computer.
The minimum you can do is install DNS from Google. To drive into some unpopular shop, this will be enough in most cases.
9. Phone. What phone number should I enter in the entry field?
Earlier I said that we must match the holder, but not in this case, or rather, not entirely. If you indicate the holder's phone number, they may call him (not necessarily, of course), but they can. So what should we do? The first thing you can do and the simplest thing is to change the last couple of digits of the phone number (not the first digits, because there is a code in the second third and fourth digits that points to a specific region, which can burn us if we change them incorrectly) . And if they call this number, it will either be inactive, or someone will say: “You are in the wrong place and will disconnect, or (worse) I don’t know what package I’m talking about.” The second thing you can do is to spam the holder’s phone number with calls so that it is always busy. And third, buy a number on Skype and indicate it as the holder’s number. In this case, if your English is OK, you can answer the call yourself, which will raise the trust to the order (just read all the information about the holder that you have just in case and ALWAYS calculate how old the holder is because They often ask how old you are, and you say: “Well, God knows, I’m from 1956, even though I have problems with my memory) or put an answering machine on it. So, if you call, the number will at least be active.
10. Information that can be accessed by a shop, bank, office, etc.
The shop can request your name and phone number from the bank. Banks may request answers to security questions (where you lived before, who you were married to, etc.). This information can be found out by breaking through the BG (back ground - all information related to the holder’s personal life). You can use the services of colleagues who provide this information for a fee, or you can enter the service yourself and find out. They may ask for SSN, DOB, MMN (mother's middle name) - we have an analogy of TIN, date of birth, mother's maiden name. Using AVS (address verification system) they can find out at what address the card is registered. This system applies to the following countries: USA; Mexico; Australia; Brazil; New Zealand; England; Canada. When entering cards from these countries, the billing address must match the information that came with the card, otherwise 99% of entries are unsuccessful.