The foundation of carding

Mutt

Professional
Messages
1,457
Reaction score
1,268
Points
113
Chapter 1. Why Carding?
First, you need to figure out why we need carding to make money? Why not just learn to be an accountant, for example, or a lawyer, and then sit in the office and receive your $ 1,000 a month and not bother. Someone thinks that you can easily make a lot of money in carding. If you, my dear reader, decided to engage in carding for this reason, then I hasten to disappoint you. This does not happen. Carding has long ceased to be an easy job. Yes, in the 90s there was such a topic, the bourgeoisie sent any goods to anywhere in the world using the generated map tracks. But those days are long gone. Now, carding is a world with strict rules. There is always a confrontation between shops, banks, cardholders and carders proper.
Think forty times before you, the reader, decide to do carding. Those who really plow from dawn to dawn and have been in the subject for a long time have big earnings here. No freebies. People make money with their will and perseverance. There is also an unpleasant side to carding in the form of problems with the law. Whether you steal a lot or a little, you are a thief. And a thief, as you know, must go to jail. If you are not afraid and confident in yourself, then welcome to carding.

Chapter 2. Laws and responsibility.
On the difficult path of a carder, you should familiarize yourself with the laws of the country in which you live. In this chapter, we will talk about the laws some countres.

Illegal access to computer information
1. Unlawful access to legally protected computer information, that is, information on a machine medium, in an electronic computer (computer), computer system or their network, if this act entailed the destruction, blocking, modification or copying of information, disruption of the computer, system Computers or their networks, - shall be punishable by a fine in the amount of two hundred to five hundred times the minimum monthly wage, or in the amount of the wage or salary, or any other income of the convicted person for a period of two to five months, or correctional labor for a term of six months to one year, or imprisonment for up to two years.

2. The same act, committed by a group of persons by prior conspiracy, or by an organized group or by a person using his official position, as well as having access to a computer, computer system or their network, - shall be punishable by a fine in the amount of five hundred to eight hundred times the minimum wage, or in the amount of the wage or other income of the convicted person for a period of five to months, or correctional labor for a term of one to two years, or arrest for a term of three to six months, or imprisonment for a term of up to five years.

This is the most common article for hackers. If you decide to start hacking stores and getting credit cards from there, then this information is just for you. Note, if you are alone - they give up to two years. If there are two or more of you, then there are already up to five.

Creation, use and distribution of malicious programs for computers
1. Creation of computer programs or making changes to existing programs, knowingly leading to unauthorized destruction, blocking, modification or copying of information, disruption of the operation of a computer, computer system or their network, as well as the use or distribution of such programs or machine media with such programs - shall be punishable by deprivation of liberty for a term of up to three years with a fine in the amount of two hundred to five hundred times the minimum monthly wage, or in the amount of the wage or salary , or any other income of the convicted person for a period of two to five months.

2. The same acts, which through negligence have entailed grave consequences, shall be punishable by imprisonment for a term of three to seven years.
If you are a coder and write Trojans to download and zombie computers of the bourgeoisie, then this article of the law is for you. If you load someone else's tro, then this is also for you. They give up to three years plus a fine, and if with grave, they can give up to seven.

Violation of the rules for the operation of computers, computer systems or their networks
1.Violation of the rules for operating a computer, computer system or their network by a person who has access to a computer, computer system or their network, resulting in the destruction, blocking or modification of computer information protected by law, if this act has caused significant harm, is punishable by deprivation of the right to hold certain positions or engage in certain activities for up to five years, or compulsory work for a period of one hundred and eighty to two hundred and forty hours, or restraint of liberty for up to two years.

2. The same act, which through negligence has entailed grave consequences, - shall be punishable by imprisonment for a term of up to four years.
If you have done something in a chain of stores or a bank and this disrupted their normal operation, for example, a deface or DDoS attack, then this article will shine for you. With serious consequences, they are given up to four years.

Fraud
1. Fraud, that is, theft of someone else's property or the acquisition of the right to someone else's property by deception or abuse of trust, - shall be punishable by a fine in the amount of up to one hundred and twenty thousand $, or in the amount of the wage or salary, or any other income of the convicted person for a period of up to one year, or by compulsory works for a term of up to one hundred and eighty hours, or corrective labor for a term of six months to one year, or arrest for a term from two to four months, or imprisonment for up to two years.

2. Fraud committed by a group of persons by prior conspiracy, as well as causing significant damage to a citizen - shall be punishable by a fine in an amount of up to three hundred thousand $, or in the amount of the wage or salary, or any other income of the convicted person for a period of up to two years, or by compulsory works for a term of one hundred and eighty to two hundred and forty hours, or by corrective labor for a term of one to two years, or by deprivation freedom for up to five years.

3. Fraud committed by a person using his official position, as well as on a large scale, - shall be punishable by a fine in the amount of one hundred thousand to five hundred thousand $, or in the amount of the wage or salary, or any other income of the convicted person for a period from one to three years, or by imprisonment for a term of two to six years, with a fine in an amount of up to ten thousand $ or in the amount of the wage payment or other income of the convicted person for a period of up to one month or without it.

4. Fraud committed by an organized group or on an especially large scale - shall be punishable by imprisonment for a term of five to ten years with a fine in the amount of up to one million $ or in the amount of the wage or other income of the convicted person for a period of up to three years, or without it.

The main article for carders. In different situations, they are given from two to ten years.

Organization of a criminal community (criminal organization) or participation in it (her)
1. Creation of a criminal community (criminal organization) for the purpose of joint commission of one or several grave or especially grave crimes or leadership of such a community (organization) or structural subdivisions included in it (her), as well as coordination of criminal actions, creation of stable ties between various independently active organized groups, the development of plans and the creation of conditions for the commission of crimes by such groups or the division of spheres of criminal influence and criminal proceeds between them, committed by a person using his influence on members of organized groups, as well as participation in a meeting of organizers,leaders (leaders) or other representatives of organized groups for the purpose of committing at least one of these crimes - shall be punishable by imprisonment for a term of twelve to twenty years with a fine of up to one million $ or in the amount of the wage or other income of the convicted person for a period of up to five years or not.

2. Participation in a criminal community (criminal organization) is punished with imprisonment for a term of five to ten years with a fine in the amount of up to five hundred thousand $ or in the amount of the convicted person's salary or other income for a period of up to three years, or without it.

3. The acts provided for in the first or second part of this Article, committed by a person using his official position, is punished with imprisonment for a term of fifteen to twenty years with a fine of up to one million $ or in the amount of the wages or other income of the convicted person for the period up to five years or without it.

4. The acts provided for in the first part of this article, committed by a person occupying the highest position in the criminal hierarchy, is punished with imprisonment for a term of fifteen to twenty years or life imprisonment.

Note. A person who voluntarily ceased participation in a criminal community (criminal organization) or a structural unit included in it (her) or a meeting of organizers, leaders (leaders) or other representatives of organized groups and actively contributed to the disclosure or suppression of these crimes, is released from criminal liability if in his actions do not contain any other corpus delicti.

Production or sale of counterfeit credit or payment cards and other payment documents
1. Manufacturing for the purpose of marketing or selling counterfeit credit or payment cards, as well as other payment documents that are not securities, is punished with imprisonment for a term of two to six years with a fine in the amount of one hundred thousand to three hundred thousand $ or in the amount of salary or other income of the convicted person for a period from one to two years.

2. The same acts committed by an organized group - are punishable by imprisonment for a term of four to seven years with a fine of up to one million $ or in the amount of wages or other income of the convicted person for a period of up to five years or without it.

If you do real carding and make copies of credit cards, it can take up to seven years.
Here are the main articles attributed to our colleagues. As you can see, the list is not small, and the terms are not small. So think again which is better - carding or normal work with a work book, seniority and pension.

Chapter 3. Where to start?
This question worries all beginners, without exception. Where to start in carding? From bays, rollocks, cash out, drops, ringing, drawing documents, clothes, casinos, dating? There are a lot of topics, but not all are suitable for beginners. You can make a good start in a thing and start your first business there. So what is a thing? In short, everything looks like this:
We go to the website of the online store, choose a laptop or a gold chain as thick as a big toe, pay with data from a bourgeois card, and the ordered goods come to our mail. But, as in any business, there are many nuances. One of the biggest problems is anti-fraud protection. This is such a special automatic system that tries to track the person who is driving the card and determine whether it is the carder or the owner. Basically, this system looks at the correspondence of the client's IP address to the country and state where he lives. For example, we drive in the card of John Smith, who lives in the city of Chicago, Illinois, and the IP address shows that this person. Such tricks with an anti-fraud system will not work. She also looks at the local settings of the computer: system language, time zone. It's illogical that the bourgeois is sitting on Windows with a time zone of +5. Therefore, a well-tuned system is needed to successfully drive cards. You also need to pay attention to your safety. Imagine, by some miracle, you have scored 50 thousand worth of things, and then uncles from the police come to you, because you shone your real IP addresses everywhere and even ordered all the parcels to your home address. After reading the second chapter, you don't want to get caught so stupidly. Therefore, you need to provide yourself with maximum coverage of the rear and flanks. because you shone your real IP addresses everywhere and even ordered all the parcels to your home address. After reading the second chapter, you don't want to get caught so stupidly. Therefore, you need to ensure yourself the maximum coverage of the rear and flanks. because you shone your real IP addresses everywhere and even ordered all the parcels to your home address. After reading the second chapter, you don't want to get caught so stupidly. Therefore, you need to provide yourself with maximum coverage of the rear and flanks.

Chapter 4. Security.
Let's start with how to protect your real IP address from being exposed. One of the most successful solutions today is a VPN. VPN is a service that will help you remain anonymous, it will help you hide your real IP address, and will not allow you to listen to traffic. Nowadays a lot of offices provide VPN services. Look for an office with a good reputation and cheaper prices, because you need to spend your start-up capital. Next on the list are socks. In fact, socks are needed not so much for security as for the anti-fraud system to think that we are leaving the state we need.
Now let's talk about how to accept goods ordered in shops. It is out of the question to take over the goods. Therefore, we need a drop - a person who will take upon himself not only the parcel, but also the visit of the cops if they arrive. Drops are adjustable and non-adjustable.

Adjustable drops are those who think that they are doing everything correctly and legally and do not suspect that the goods that come to them are carzen. How can they rub it in is the second thing, but they firmly believe that they work at a real job, or that you brought a brand new plasma for your grandmother, and left for another city on business.

Undivided drops know that your goods are left-handed and that the police can come to them at any time. Making drops for yourself is a rather difficult task, obviously not for beginners. Therefore, with a clear conscience, we will turn to the drop conductor. A drop driver is a person who manages drops and provides us with his drops for a certain fee. Usually this is a percentage of the sale of the product or the second item in the package (two video cameras in the package).

When paying for goods by card, we indicate the address of the drop and the parcel is sent to him, and he already sends us half of the parcel. One way or another, this structure is quite pale because they will take the drop by the balls and he will gladly hand you over to the cops. There is a way out of this situation. Now drop carriers are also buyers in one person. Those. you send him a laptop worth 1 kilo of bucks and he drops $ 500 to your WMZ purse upon receipt. This method is many times more convenient. you do not need to take over the goods, but you can immediately sell them and get laundered money. I think that you should not even remember that you need to look for proven ones who have been in the subject for a long time, tk. there is always the possibility that you will be thrown. Work through a guarantor, so it's calmer.

Now let's talk about how to protect private information on your computer. For example, we have credit card numbers, tracks from shops and other goodies. We need to hide it somewhere far away so that it does not irritate our eyes, and so that if cops suddenly come to us, we can not be especially concerned about the fact that they will find something illegal on our computer.
In order not to store data in clear text, we need to encrypt it. We will encrypt using the TrueCrypt program. So, download the program from the official site (you can also find the crack there). In the wizard, select to encrypt the usb device. Then we choose to create a hidden volume. The hidden volume is needed for better protection. It works like this. We create a encrypted partition disguised as a file. For example, a movie. If, when mounting a partition, enter the password for a regular volume, then a regular volume will open. If you enter the password for the hidden volume, the hidden volume is mounted. The trick is that if the cops find out about the encrypted section, you tell them the section from the usual volume and they will see, for example, porn, not documents.
So the time has come for a detailed acquaintance with the process of driving in and making a bubble. But first, we need to configure the system. So welcome to the next chapter.

Chapter 5. System configuration.
To have a configured system, we need to put it somewhere. The best option for this is a virtual machine. For this situation, WMware is best suited. Download from the official server or from torrents. Then we put the English Windows on it (it is assumed that we will work with USA). After we have downloaded and installed Windows on WMware (I don't give detailed instructions - there are millions of them lying around), we need to configure the programs we need. Programs can be downloaded from the Internet or copied from the main OS (just click copy on the files, and then click paste in the virtual machine). So, we need TrueCrypt to be able to access our storage of important documents. There is a small note here. If your encrypted container is stored on a USB flash drive, then you just need to share access to it over the network and specify the path through the network to the container in the guest OS in TruCript.

IMPORTANT! One container cannot be simultaneously mounted on the guest and host OS. To mount a container in the guest, first unmount it in the main OS! After you set up this program, go to the sock program. Use Proxifier_2.8. To make the programs work through the sox, run proxyfier, click options> proxy settings> add. We enter the sox there. Immediately there is an opportunity to check the sox for survivability, the Check button is intended for this. To hide DNS, click Option> Name Resolution> uncheck Choose the mode automatically> check the box under Remotely> OK. One container cannot be simultaneously mounted on the guest and host OS. To mount a container in the guest, first unmount it in the main OS! After you set up this program, go to the sock program.

To make the programs work through the socls, run proxyfier, click options> proxy settings> add. We enter the sox there. Immediately there is an opportunity to check the socks for survivability, the Check button is intended for this. To hide DNS, I also recommend downloading the CCtools program to change the computer IDs and names. Also download and install a good browser like Opera or Firefox, use programs to delete temporary Internet files, such as cookies, sessions, cache. Privacy Eraser Pro is a program with which you can permanently clean your browser history. In addition to Privacy Eraser, I can advise CCleaner, the program also cleans the history in the browser, deletes unnecessary files, cleans the registry.
The system was set up, ready for driving. Welcome to the next chapter!

Chapter 6. Anatomy of cards.
Now we need to understand the details of what cards are and how to use them.
Usually cards (cardboard, CC, SS) are sold like this:
"Heather Dodder", "10/27/1977", "1232345663", "135 Wyckfield Road", "Savannah", "GA", "31410", "US", "heather912@aol.com", "1 ( 912) 256-1212 "," Visa "," 4185860387795567 "," 307 "," 11 "," 2024 "," PLATINUM (CREDIT) "," PROVIDIAN NATIONAL BANK "
Let's write down what is here and why:
1) Heather Dodder - name of the cardholder (credit card holder)
2) 10/27/1977 - date of birth of the cardholder (DOB - Date Of Birth)
3) "1232345663" - social secure number (SSN)
4) "135 Wyckfield Road" - cardholder address (135 - house number, Wyckfield Road - street name)
5) "Savannah" - the city of residence of the cardholder
6) "GA" - cardholder state
7) "31410" - cardholder index (ZIP code in usa)
8) "US" - the country of the cardholder
9) "heather912@aol.com" - cardholder mail (e-mail)
10) "1 (912) 256-1212" - cardholder's phone number
11) "Visa" - type of credit card
12) "4185860387795567" - credit card number
13) "307" - CVV or CVV2 card code (3-x or 4-digit)
14) "11", "2024" - the expiry date of the credit card (exp date)
15) "PLATINUM (CREDIT)" - type of visa card
16) "PROVIDIAN NATIONAL BANK" - the name of the bank that issued the card
By the way, SSN is not always on the map. Information such as SSN and DOB is searched for separately for a fee.

Types of credit cards:
Visa (VI, starts 4),
MasterCard (MC, starts with 5),
American Express (AMEX, starts with 3).

Additional information sometimes requested by the bank / shop:
MMN (mother's maiden name) - mother's maiden name.
DOB (date of birth) - date of birth.
SSN (social secure number) - individual taxpayer number.
PIN (pin code) - 4-digit pin-code of the card.
DL (driver's license) - driver's license number.
Well, that seems to be all you need to know about credit cards at first. Now we are ready for the first drives, so let's go to the next chapter!

Chapter 7. Test carding.
To begin with, I recommend that you practice "on cats." That is, on the little things, so that then driving on a real site passed without any problems. You can, for example, scard yourself a Counter-Strike. To do this, we go into our virtual machine. You can not buy credit cards for this business, but look for a fresher freebie or ask someone for a loan.
If everything went well with the test drives and you gained at least a little experience in driving, then go ahead to find a real job!

Chapter 8. Real carding.
To start making money on real shops, you need to find these shops. We need shops that send to an address other than billing to the usual CC + CVV. Finding such shops is the most difficult thing. We enter something like "buy asus laptop" into Google and start following the links and looking at shops. Read in the shops, in the description, what you need to order, if it seems to you that the shop should send, then do so, take a credit card, drive it in, and write the address of the owner of some other card to the delivery address. Those. there must be a real person at the address you wrote. With a successful drive, they will collect and send you an order and send a track to the mail. Track is the parcel number, which can be tracked on the website of the postal service where the parcel is now. Register mail on the servers yahoo.com msn.com gmail.com. Forget it. So, if the store has sent the track and the package is gone, congratulations, you have found a wholesome shop. Now go to the drop guide, he gives you the drop address. You again drive the parcel into the name and address of the drop and go! The track that the shop will give you needs to be thrown off the drop guide. Now sit and wait for the first money from the drop guide!
This article has covered the very basics, terms and concepts.
The main idea that I want to convey is that carding is not just driving! As you can see, driving in is just the simplest and last (well, or penultimate) thing in the whole carder scheme. A monkey can also buy cardboard (credit card details) at special forums and stupidly drive numbers into the necessary windows.
The carder's task is to set up the system in the right way, prepare everything you need, provide your cover, security and anonymity, negotiate with drops and / or shipping services, find suitable stores, bypass their security system, finally get the product, sell it (in fact, sell stolen goods), get money and launder it!
As mentioned at the beginning of the article, carding is not at all an easy task. And in order to do it for a long time and productively, you really need to love the process itself and understand everything inside and out. It is no coincidence that all decent carding teachers take a lot of money for training, manuals and the theoretical part.
taken from the vastness of the Internet
 
The general view of ideal security consists of: an external hard disk (or flash drive) on which a virtual machine is stored in an encrypted container. From this virtual machine, you go online using a VPN for security and a sock (or tunnel) for disguise. More details: 1. An external hard drive (on which a virtual machine with Windows OS and all necessary programs is installed) which will be encrypted using TrueCrypt. 2. TrueCrypt is an on-the-fly encryption computer program for 32-bit and 64-bit operating systems of the Microsoft Windows, Linux and Mac OS families. It allows you to create a virtual encrypted logical drive stored as a file. TrueCrypt can also fully encrypt a partition on a hard drive or other storage medium such as a floppy disk or USB flash drive. All stored data on a TrueCrypt volume is fully encrypted, including file and directory names. 3. Virtual Machine: VirtualBox or VMware. Both of these programs are great for our needs (who is more comfortable with which). With these programs, you need to install Windows XP (ENG) or Win7 (ENG) on an external hard drive. A virtual machine executes some machine independent code, or the machine code of a real processor. In addition to the processor, a VM can emulate the operation of both individual hardware components and an entire real computer (including BIOS, RAM, hard disk and other peripheral devices). In the latter case, operating systems can be installed in a VM, like on a real computer (for example, Windows can be run in a virtual machine under Linux or vice versa).

The operating system (usually Windows XP ENG or Win7 ENG) that we install on the virtual machine. 5. VPN (English Virtual Private Network) is a technology that allows one or more network connections (logical network) to be provided over another network (for example, the Internet). VPN Double - a bundle of VPN servers, in which the connection takes place in one country, after which the traffic is transmitted through an encrypted channel to another server and from there goes out into the world. € Protection against any kind of tracking and interception of information. € Protection against hacker attacks on the local network. € Firewall that prevents intruders from scanning your IP address from the Internet. € Internet access without restrictions that exist at the local or state level. € Visiting sites (online gambling, etc. )) if access from your country is denied. € Protection against scanning and interception of traffic in WI-FI networks. € Full access to all VOIP operators, including Skype. € Completely anonymous internet access

€ SOCKS (socks) is a network protocol that allows client-server applications to transparently use services behind firewalls (firewalls). When driving, you should always wear socks on top! Here the question is not only in disguise as a holder, but also in hiding the VPN itself, in the data center of which, theoretically, they can appear to seize data. € SSH Tunnel is a tunnel created over an SSH connection and used to encrypt the tunneled data. Used to secure data transmission on the Internet. The peculiarity is that unencrypted traffic of any protocol is encrypted at one end of the SSH connection and decrypted at the other. Used as an alternative to Socks. The main advantages over Socks:

Virtual box
First of all, download the image of the virtual disk with the OS with which you are going to work in the virtual machine.
How to install an operating system on a virtual machine The first thing to do is create a partition (virtual device). Open VirtualBox and click on "Create". Enter any name you like, in the "Type" and "Version" sections, select those whose image you are going to install.

All the following items: memory size, type of hard disk, number of GB - click "Next" everywhere. The parameters offered by the system are fine. VirtualBox knows what characteristics need to be selected in order to emulate the OS known to it.

Configuration The next step is to configure the virtual OS. You have already allocated space for XP on your computer. Now you need to connect the Windows XP ISO image to the virtual device. Go to "Settings". In the window, select the item "Media", next to "IDE controller - click on" Empty ", next to" Drive: Secondary master "click on the disk icon. And then select" Select an optical disk image ".

The image search window will open. You should find the XP ISO file. Basically, the ISO file is the installation disc for the virtual machine.

When you select a file, do not forget to confirm "OK".

Startup You can assume that you have completely prepared the device and "shoved it into the DVD-ROM" disc. It remains to turn on the machine and start the installation. Click "Run". A separate window of the virtual machine will open, where the installation will take place. Most likely, you have selected 10 GB of hard disk by default, so now the system shows an unallocated area of 10237 MB.

At the bottom of the screen, you see the commands. Press "C" to create a section.

When you create it, click "Install". Now the system offers to format the created partition. Choose NTFS formatting.

Installation started: "The installer is copying files." When the progress is complete, Windows XP will reboot and the installation will continue.

After the installation is complete, it remains to "pull out the disk from the device". Close the virtual XP window and go to "Settings" again. Where you attached the ISO image, you must now remove it. Withdraw. You can delete the ISO file.

Windows XP is ready for the first boot. In order to conveniently interact with the virtual machine, we will give a few tips. There are two modes of VirtualBox mouse - integrated and non-integrated. If you use the second one, then to return the mouse to the main OS, press the right “Ctrl”; You can change the modes in the "Machine" tab, and there "Disable / enable mouse integration" To work, we need to move files between the main machine and the virtual one. To do this, we need to create shared folders. Create a folder on the main machine from which you want to share with the virtual machine. Hover the cursor over the folder icon, right-click on "configure shared folders" Next, click on the add folder icon, specify the path to the folder we created. After the process is complete, the folder will look like an additional disk on the virtual machine, but on the main machine it will remain as a regular folder. If after these steps the folder is not integrated with the virtual machine, in the virtual machine window at the top, select the "Devices" tab in it "Connect the guest OS add-on disk image" And everything will work.

VMware
How to install an operating system on a VMware Workstation virtual machine VMware Workstation is a program for creating virtual computers on your PC. VMware Workstation can be used to test different operating systems and programs, network connections on one computer, without affecting the security of the main PC. This article will show you how to create a Windows XP virtual machine. After launch, a diological window of the VMware Workstation program appears:

To create a new virtual machine, press the "New Virtual Machine" button or just the Ctrl + N keyboard buttons.

Select a disk or .iso file (image) with the operating system. In my example, I will use a Windows XP disk. Click Next.

VMware Workstation will ask for an activation key (if you are installing Windows). After entering the key, select the name and folder where the operating system will be installed.

We indicate the size of the hard disk of our virtual machine and click Next. The recommended hard disk size for Windows XP is 40 Gb, but 8Gb is enough for testing.

The last check before creating the virtual machine. Using the Customize Hardware ... button, you can change the current settings, for example, increase the amount of RAM for the virtual machine. Click Finish, the installation of the operating system on VMware Workstation begins.

Then the operating system is installed on VMware Workstation as usual.

Working with Dedicated Server
A dedicated server (also a RDP) is a type of hosting in which a client is provided with a separate physical machine. Typically used to run applications that cannot coexist on the same server with other projects or have increased resource requirements.

How to connect to Dedicated Server? You can connect to Dedicated Server using the built-in Windows utility: Remote Desktop Connection. Start => Programs => Accessories => Communication => Remote Desktop Connection.

What do you need to pay attention to when choosing a Dedicated Server? Internet connection speed, Memory (RAM), Stone (processor), OS. Here are examples: Win2003 Ram 1gb CPU 3 Pentium4 America Downstream speed 4.57 Mbit / s Upstream speed 1.49 Mbit / s

What is Dedicated for? Dedik is suitable for any action for which you need to change your geolocation. (Any carding themes in which you need to geolocate to the cardholder) Also used for brute, spam, flood, ddos and much more. In general, for all those operations that require a long time on the computer and its load.

Where can I get a Dedicated Server? There are two ways:

This is, of course, a purchase. (You can find sellers in the useful contacts of the forum) 2) Get it off yourself.

Rules for working with Dedicated Server!

Run the command line (Start> Run> cmd.exe) and write the following in it:
Code:
net user Username password / add
net localgroup Administrators UserName / add
net localgroup "Remote Desktop Users" Username / add
net accounts / maxpwage: unlimited Now let's break down each command:
net user Username password / add - Adds a new user with the specified username and password
net localgroup Administrators UserName / add - Adds the desired user to the Administrators group
net localgroup "Remote Desktop Users" UserName / add - Adds the desired user to the group of remote users
net accounts / maxpwage: unlimited - avoids password expiration (14 days)

For example, if you want to create an account named user and password password, then the commands will look like this:
Code:
net user user password / add
net localgroup Administrators user / add
net localgroup "Remote Desktop Users" user / add
net accounts / maxpwage: unlimited Ok,
the account has been created. Now we need to hide it from the vinlog so that your account does not shine among other users.

To do this, go to the register (Start> Run> regedit.exe) go to HKEY_LOCAL_MACHINEHKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWinlogonSpecialAcc. First, we need to create our own account, because if we do all our dirty deeds under the admin account, then our Dedicated Dedicated as soon as the admin comes and sees what is happening in his account.

We will create the account through the command line, as it is faster and more convenient. So, let's start creating an account:
ountsUserList and create a new DWORD parameter there (right-click, new parameter DWORD) We call this parameter the name of your account, and assign it a numerical value of 0.

Next, go to C: \ Documents and Settings and hide the folder with your account there with all the subdirectories and files. (Right-click> properties> check the "hidden" box and click apply)

And yet, create yourself a folder in C: \ WINDOWS \ system32 or deeper, and also make it hidden with all the files, folders and subdirectories. You will need it in order to store all the files you need there.

That's it, now you have a hidden account on the Dedicated server and a folder where you will shove all your stuff. You can safely disconnect from the Dedicated Server and log in under your account.

Note: You shouldn't install anything on the Dedicated Server, pour everything in the already installed form. Do it through cloud services or file sharing. Those. upload folders with installed software from the main machine to file hosting and download from Dedicated Server.
 
The ideal carding machine
Choose a version, click on the button, follow the instructions.
Win XP VMware 1. Download and install VMware v10
In VMware, press Ctrl + O, or File-> Open, open the MrGood assembly Win 7 VMware
Download and install VMware v10
In VMware, press Ctrl + O, or File-> Open, open assembly MrBright

Win 7 VBox 1. Download and install VirtualBox
Open the MrGenerous assembly in VirtualBox
In development: Spoiler: Win XP VBox Download and install VirtualBox. Download the assembly, unzip Open the assembly in VirtualBox
Win XP VMware1 Download and install VMware v10
Download the assembly, unzip 3. In VMware, press Ctrl + O, or File-> Open, open the assembly

Frequently Asked Questions:
How to avoid customizing the system for yourself every time?
Configure the virtual machine for yourself so that you can drive it in right away. Turn it off and don't touch it again. For driving, make a clone of it and drive from it.

The Ghostery start page opens every time the browser starts, why?
You need to go through a greeting to configure what the plugin will block and what only warn about. Again, set up once for each browser in the source virtual machine, depending on your needs.

Why doesn't R-Wipe & Clean work?
In the first two assemblies, it will not crack, so you need to download this and follow the instructions: Spoiler After restarting the program, everything should be ok. It will be fixed with the next update.

What's in the assembly:
Many browsers for any, even the most sophisticated taste. Most likely, such a number will even seem excessive, but it does not significantly affect the size of the system. And it's always convenient to have an extra browser on hand. If your eyes are annoying, just remove the icons you are not using. No software in startup
A small list of useful links DNS Google
Reduced the number of unnecessary animations
Browsers: SRWare Iron - a browser based on Chrome for safe and anonymous work.
Comparison of Iron and regular Chrome
Iron Incognito - the same browser in anonymous mode --incognito (cookies are saved only for the current session and are cleaned upon restart) Firefox classic + home + hybryd + safe - portable build with four modes:
Classic mode gives the user the opportunity to work with the regular version browser. € Home mode will save you from pop-up banners and teasers that prevent the page from loading quickly. abp and ghostery
Hybrid mode, optimized for flying away surfing the internet. abp and ghostery
Safe mode, provides the maximum level of user security. All traces of work in the browser are removed after closing it. abp and ghostery Mozilla Firefox - regular freshly installed, abp and ghostery.
Google Chrome - regular freshly installed, abp and ghostery Opera - regular freshly installed, no change.
Safari - regular, freshly installed, no change Tor Browser Bundle - Anonymous virtual tunnel network providing encrypted data transfer plus the latest Firefox browser.
In the installers folder there is an older version of the installation file, in which vidalia is separate.
Andy Browser - Iron + Tor. Version 2.1, on the old version of Tor.
PC Cleaner: CCleaner + Enhancer - the familiar and favorite program for cleaning cookies / caches and other junk, as well as solving registry problems
R-Wipe & Clean - removes the remaining information about the work of 600+ applications, including Microsoft Office 2007 and Skype
CCtools 7 - allows you to change the identifiers of the computer, host, S / N browser and windows, processor name and much more. Extended list of processors. STZBlaster is an analogue of CCTools. Located in the installers folder.
Disguise and security:
Proxifier is a must have for anonymity Bitvise is a client for SSH tunnels.
Plinker is an alternative to Bitvise. Much worse, but just in case there is in the Installers folder, suddenly you need OpenVPN - a free open source implementation of Virtual Private Network (VPN) technology for creating encrypted point-to-point or server-client channels between computers.
OpenVPN Protector - protects against sudden disconnection of VPN connection so as not to expose your real IP. For an amateur, I myself am not one of those (I have enough proxy).
Communication: Pandion Psi Pidgin
Mail: Mozilla Thunderbird, Postbox
Essentials: Skype Vbivotron 2014 v1.2 - converts information from the clipboard into manual input, simulating the actions of a live user. Putting the pluses for m-power! Foxit Reader is a free pfd reader
Notepad ++ is a free open source text editor. Supports opening over 100 formats. Can be called from the context menu of the Winrar file.

Carder Software Encyclopedia
Disclaimer: Programs from this list are not the only correct ones, because for almost any software there are always similar solutions. If you know of more convenient or suitable tools than those listed, or if something is missing from this list, be sure to write. I also ask you to point out any errors and shortcomings.
Virtual machines The two most popular: VMware Workstation Download: rutracker.org Oracle VM VirtualBox Download: rutracker.org They have approximately the same functionality, they allow you to virtually emulate PC hardware.
Finished cars. Download, install and drive: Configured and ready-to-use virtual machine from me
Configured and ready-to-run virtual machine from k1th Interesting: Comparison of virtual machines
SRWare Iron browsers - based on Chromium, designed to work safely and anonymously.
Comparison of Iron and regular Chrome ]More: Browser not cookies Download: srware.net
Firefox hybrid is a portable build with four modes:
Classic mode gives the user the opportunity to work with the regular version of the browser. € Home mode will save you from pop-up banners and teasers that prevent the page from loading quickly. abp and ghostery.
Hybrid mode, optimized for flying away surfing the internet. abp and ghostery.
Safe mode, provides the maximum level of user security. All traces of work in the browser are removed after closing it. abp and ghostery Download: xetcom.com
Epic Browser is a lot like Iron, but there are a couple more pleasant surprises: one-click American proxy installation, built-in ad blocking, automatic blocking of cookies from third-party sites, automatic use of HTTPS on all sites where it is supported, etc.
Epic Browser: Chromium-based secure browser
Download: epicbrowser.com
Tor Browser Bundle - allows you to maintain anonymity within certain limits. Uses fi refox. More: wikipedia Download: torproject.org
Andy Browser - Iron and Tor symbiosis Download: rutracker.org
Browser plugins: Adblock and Adblock plus are about the same, they block ads.
Ghostery - blocks scripts monitoring the user.
Tamper Data - used to track and modify http / https requests from sites.
Cookies Manager - allows you to track, add, edit and delete cookies. TYC + PR Indicator - displays Google Page Rank and Yandex TCI indicators for the current web page in the browser status bar (lower right corner of the window in Firefox) or in the toolbar (in Chrome). Spoiler: More Useful Plugins
Cleaner CCleaner + Enhancer is a well-known and favorite program for cleaning cookies / caches and other garbage, as well as solving registry problems. Download: rutracker.org
R-Wipe & Clean - removes the remaining information about the work of 600+ applications, including Microsoft O ffi ce 2007 and Skype Download: rutracker.org thepiratebay.se
CCtools 7 - allows you to change the identifiers of the computer, host, S/N browser and windows, processor name and much more. Not recommended for your main system, only for a virtual machine (you should also make a backup of it).
STZBlaster is an analogue of CCTools. Not recommended for your main system, only for a virtual machine (you should also make a backup of it).
A little more BCWipe - promise to erase files beyond recovery Download: thepiratebay.se
Clearing the history of RDP connections
Network security Proxifier - a must have for anonymity Download: thepiratebay.se
Bitvise is a client for SSH tunnels.
SSH Tunels, how to use them and where to get them Download: bitvise.com
SSHmanager Spoiler: More / download Plinker is another Bitvise alternative. There is no functionality, connectivity is not available to all tunnels. She's here just for general development.
OpenVPN is a free open source implementation of Virtual Private Network (VPN) technology for creating encrypted point-to-point or server-to-client channels between computers. OpenVPN Protector - protects against sudden disconnection of VPN connection so as not to expose your real IP. For an amateur, I myself am not one of those, since this utility is too buggy.
Alternatively: Setting up a firewall for the same purposes.
Jabber + OTR (o ff- the-record) - jabber using the OTR cryptographic protocol to protect against eavesdropping. Read more: Secure communication.
Part 1: jabber + OTR (how to set up Pidgin + OTR)
Clients with built-in OTR support Alternatively: Build "Paranoid +" - Jabber (Psi) + OTR + GPG + Tor-proxy
Encryption TrueCrypt is a program for creating encrypted partitions to hide your data. At the moment there are rumors that they were hacked and the latest version with a vulnerability, so you can choose from: Download: truecrypt.org (latest version) rutracker.org v7.1a (earlier) In any case, the crypto containers created by these programs are decrypted by special software (proof)
Analogues Necessary In our activity there is always a need for a good mailer. Postbox is a convenient, usable email client. Download: thepiratebay.se
More Mailers
Vbivotron 2014 - converts information from the clipboard into manual input, simulating the actions of a live user. Putting the pluses for m-power! Read more / download: Imitation of hand-to-hand input when driving into a shop
TrackChecker - designed to organize your parcels, automatically check the status, has many postal services in its arsenal.
More details: Convenient TrackCheker program Download for Windows: trackchecker.info
For Android: plus.google.com; For iOS: itunes.apple.com
KeePassX is a free password storage program. Download: keepassx.org
AV Voice Changer Software - allows you to change a male voice to a female, female to male, as well as vary the timbre, bringing the voice beyond recognition.
Read more:
Ringing: Changing the Voice Download: rutracker.org (v7 diamond), thepiratebay.se (v6 diamond)
Notepad ++ is a free open source text editor. Supports opening over 100 formats. Designed primarily for programmers. Much more convenient than a regular notepad (there are tabs, line numbering and a million more functions). Download: notepad-plus-plus.org
 
Top