Complete Introduction to Hacking [Part-2]


Complete Introduction to Hacking [Part-2]

Protection

In hacking industry most important thing is security, anonymity and protection. Play cool and be safe. There are numerous rules in the hacking area i’ll list few of them.
  • Don’t mess with government. You may be a great hacker but hacking government, not a good idea they will hunt you with their best of best hacker and catch you so no government.
  • Don’t mess with big international lvel or rich company. Again the rich douches will bring you down.
  • Never hack or destroy a website supporting education for poor, home for poor or any program for backward countries, you will be a disgrace and other hackers will leve you to nothing.
  • Don’t hack for personal gain. Fight for rights and seek information. Like Anonymous.

Methods of Protection

Don’t Use Windows

Windows is full of holes that can be exploited. These holes may allow spyware to infest, completely overcoming all your anonymity efforts. Any good hacker avoids Windows. Instead, they use security hardened open-source operating systems, such as Tails and Whonix.

Never Connect To Internet Directly

Connecting to internet directly means giving away your privacy by showing you IP.
Avoid anyone tracking down you’re real IP address through using VPN or Proxy. VPN enables users to create a encrypted private tunnel. Anyone attempting to trace from the internet side can only see the address of the VPN server, which could be a server located in any country around the world you choose. Here is a tutorial telling what is Proxy and how to get one and use. LINK:

Never Mail Using Your Real ID

Instead, use anonymous email services or remailers. Anonymous email services allow you to email someone without any trace back to you, especially if coupled with VPN or TOR access. Remailers are a service whereby you can send from a real email account and the remailer will forward it on anonymously. To know how to send anonymous mail visit HERE

Don’t Use Google

Google makes track everything you do in order to serve up adverts that you might click on. And as useful as the search engine is, there are ways to get the best out of it without compromising your identity. Services such as StartPage serve up google results but doesn’t store IP addresses, cookies or records of your searches. DuckDuckGo provides a similar service.

An Advice

Learning, is essential to hacking. You must first learn then hack. You cannot be lazy. To become a hacker you also need to read a lot. It’ll take you around 2-4 years of learning to be a real hacker. If you think its too much you shouldn’t be a hacker. You need to spend atleast 3-4 hrs a day with computers learning, I don’t think its too much computers are really interesting I spend my 2/3 of the day with computer.

Ask anything freely here , I will reply as soon as I see them.
SHARE

Hi I'm Dashrath Goswami Owner and writer of this blog.Loves to write on latest tech.,offensive security ,web, trends and tricks. here you can find tutorials,tips and tricks to stay tuned with technology.if any query do comment or Drop A Mail.

    Blogger Comment
    Facebook Comment

0 comments :

Post a Comment

Featured Post

Windows 7-8.1-10 (x86-x64) AIO [320in1] Package is Here ! [Exclusive]

Windows 7-8.1-10 (x86-x64) AIO [320in1] Windows 7-8.1-10 (x86-x64) AIO [320in1] is the exclusive and best tested package of windows a...