security

  1. Lord777

    5 simple rules for telegram account security

    Although Telegram is a well-protected messenger - there was not a single leak or suspicion of cooperation with special services - there is always a human factor. To accurately protect yourself from account hijacking or theft of valuable data, follow these tips: 1. Urgently enable two-factor...
  2. BigBeast

    How to delete RDP logs?

    I need help regarding deleting RDP logs after using RDP. How can i manually delete RDP logs from my PC & is there any way to delete them automatically? And,for how many days a RDP can last?
  3. BigBeast

    Incognito window

    What is advisable? Incognito window or normal Window for Browser like Firefox. I use CCleaner after closing the browser.
  4. CreedX

    The best security apps for Android!

    F-Droid - analog to Play Market, but with free and open source apps. Private Location - a simple app to set up your location anywhere in the world and increase the overall privacy of your phone's location. KeePassDroid -the best program for securely storing passwords and sensitive data in...
  5. Teacher

    Online security and privacy

    Today's material is devoted to the most common channels for transmitting information on a home or partly corporate laptop, as well as the struggle for personal safety and anonymity. Content 1. How to protect your browser from data leaks. 2. Temporary mailboxes 3. How to get a virtual number for...
  6. Carding

    Carders defensive stance to enforce justice

    How carders build their line of defense when facing justice: Correct legend and testimony. It can happen to anyone. I accidentally lost my IP, made a call from a flashed SIM card, recognized my neighbor - no matter how, but I got burned. They came to you, and guys in uniform came to you. In...
  7. Carder

    Offline anonymity and security. How not to get into a mess?

    Good time of day. Last time I wrote about how you can be tracked using your own mobile phone, but this article will be a Supplement and will be devoted to aspects of psychological security and anonymization, which is inherently associated with offline, and also rather focused on beginners and...
  8. Carder

    Free courses on anonymity and security

    Paranoid II-course on anonymity and security (2020) Paranoid II-a logical continuation of the course on anonymity in the Paranoid network Instructor: ghost What the course is about: a set of measures to protect information, privacy, personal data protection, anonymity on the Internet and more...
  9. Carding 4 Carders

    Security and anonymity for Android

    With each everything on the network, more and more potential threats arise that can harm the security of our confidential data, therefore, today we decided to share with you a list of vital applications for your phone that will protect it from external intrusion and surveillance. Services: 1...
  10. Carder

    HOW TO BYPASS PAYPAL SECURITY VERIFICATION

    - Get the paypal login ready and connect state/country IP - Then open normal window on chrome and a private window (or use your phone for more stable) - Go to paypal.com & login on both browser at same time - Now, if you clicked it same time on both window… 1 Will Ask for security challenge and...
  11. Forum Library

    Bypass Paypal error message

    "Sorry but your payment could not be processed at this time. Please return to merchant.." Получаете ошибки о невозможности проведения платежа и не знаете, что делать? Всего пара простых действий, и все заработает! Шаг 1 С помощью CCleaner очистите кеш и удалите все cookie. Запустите очистку...
  12. Carder

    Cloud Computing Security: Foundations and Challenges 2020-12-28

    Hacking and Penetration Testing Book
  13. Carding

    About security for carders in carding

    At the expense of security, everything is simple, the main thing is not to touch the CIS logs in any case, working in the USA, Germany, France, etc., there should be no problems. If someone had them, we would know about it, the carding community is not that big. Here is an excerpt from one of my...
  14. Carding

    Lecture: Security and configuration of a virtual machine

    Lecturer: Payne (19:15:46) Payne: Greetings. Topic of the lecture: "Security and configuration of the virtual machine." (19:16:13) Payne: The lecture includes the following parts: 1. General characteristics of privacy and security. 2. Structural adjustment of a virtual machine: programs...
  15. Carding

    Lecture: Introduction to Security

    Lecturer: crowe [19:20:34] <crowe> I apologize for the delay! Today we will conduct a lecture in the rhythm that is familiar to you. Then I answer your questions. [19:20:56] <crowe> [19:21:01] <crowe> Introduction to security [19:21:16] <crowe> I will try to explain in simple language...
  16. Carding

    Cloud Security

    What Is Cloud Security? Cloud security is the protection of data stored online via cloud computing platforms from theft, leakage, and deletion. Methods of providing cloud security include firewalls, penetration testing, obfuscation, tokenization, virtual private networks (VPN), and avoiding...
  17. Carding

    RDP, full online security

    Hi carders! keep talking about the online security because the freedom is so important, the most important. VPN and SOCKS make a very good team, but as I said on the post about VPN, with the help of the VPN provider your real IP can reach in the hands of Feds and same time with your IP also a...
  18. Forum Library

    ATM opening instructions - 13 methods

    This article is fully devoted to the issue of ATM security. You will be able to find out how the ATM works, what it looks like from the inside and how to get unauthorized access to cash cassettes. You can consider this article as an instruction to rob an ATM, a guide to action, you can not, but...
  19. Forum Library

    Free experimental technical journal - Paged Out!

    It is a free experimental technical journal about programming, hacking, security breaches, retro computers, modern computers, electronics, demoscene and other similar topics. Paged Out! #1 Download: https://mega.nz/file/u1lVTDIA#E9HHSGJa4lAo2jA0PQDM_sxympcCBc5EB_M_AFLEkJU Paged Out! #2...
  20. Forum Library

    Security Blueprints of Many Companies Leaked in Hack of Swedish Firm Gunnebo

    In March 2020, KrebsOnSecurity alerted Swedish security giant Gunnebo Group that hackers had broken into its network and sold the access to a criminal group which specializes in deploying ransomware. In August, Gunnebo said it had successfully thwarted a ransomware attack, but this week it...
Top