Introduction
Now, I will demonstrate
various ways on how to remain anonymous on the Internet. Privacy is a must, in
today's world. Currently, there are a lot of crimes going on, such as Swatting,
Doxing etc. When our identity gets leaked, it is a big loss for us and it is
somewhat one of the big mistakes of our lives. Which is why, staying secure,
and anonymous online is essential.
This tutorial is about two types of protection.
Online Protection
Offline Protection
First, we should get some offline protection. There are many ways on protecting
ourselves. Remember, you should always have offline protection before hacking.
Pro Tip : Never trust anyone on the Internet. There are a lot of bots and
individuals that add us on IM services for the sole purpose of infecting us.
Offline Protection
Note : In this part, offline protection refers to protecting your computer from
viruses, Trojans, root kits, etc. It may also refer to encryption, such as File
Encryption, OS protection, and such. It is very important to protect your files
because we can't always trust the ways of Online Anonymity. If it goes wrong,
our offline protection should save us. Trojans and viruses remain a great
challenge to our Anonymity. There are always Trojans around and if we get
infected, the attacker may use our machine as a proxy, and has full control on
our machines.
Protect yourself from Malware
Malwarebytes' Anti-Malware
Malwarebytes' Anti-Malware (MBAM) is a computer application that finds and
removes malware. Made by Malwarebytes Corporation
More and download
Encrypt your Keystrokes using KeyScrambler
KeyScrambler
KeyScrambler is an anti-keylogging program designed specifically to strengthen
your PC security.
More and download
Get a Firewall
COMODO firewall
It is always recommended to use a Firewall when doing hacking. I recommend
Comodo Firewall. COMODO firewall is Award-Winning personal firewall software on
Internet.
Download here
Protect your files and OS using True Crypt.
TrueCrypt
TrueCrypt is a free open-source disk encryption software for Windows
7/Vista/XP, Mac OS X, and Linux.
Source and more:
http://www.truecrypt.org/
Download here
Deepfreeze your PC to prevent common attacks
DeepFreeze
Faronics Deep Freeze makes your PC indestructible. It protects your computer by
freezing its original configuration, which prevents unwelcome or unwanted
changes made while in-session from sticking. With a simple restore-to-reboot,
your system integrity is maintained helping your machines to run smoothly and
efficiently giving you more up-time and boosting user productivity.
Source and more :
http://www.faronics.com/en-uk/enterprise...e_en-uk-2/
Download Here
Spoof your Mac Address using TMAC
TMAC
Technitium MAC Address Changer allows you to change (spoof) Media Access
Control (MAC) Address of your Network Interface Card (NIC) irrespective to your
NIC manufacturer or its driver. It has a very simple user interface and
provides ample information regarding each NIC in the machine.
Source and more :
http://www.technitium.com/tmac/index.html
Download
here
Clear the evil cookies
Flash Cookie Remover
Flash cookies are evil because they persist even if you delete your browser's
cookies. They are stored separately from normal site cookies and therefore need
a special tool to delete them.
Source and more :
http://www.trojanhunter.com/flash-cookie-remover/
Download here
Other tips : Don't think that using Linux or Mac can't get you viruses. There
are also malware that works on this Operating Systems. Malware programmers
don't feel the need to write malware for this OSs since they are not used by
many people.
Online Protection
Now we are moving to Online Protection. As you know, this is very important
also more than Offline Protection. Common methods of Online protection are
discussed below.
Types of Online Protection
VPN(s)
Proxies
Tor
SSH Tunneling
VPN (Virtual Private Network)
A virtual private network (VPN) is a network that uses primarily public
telecommunication infrastructure, such as the Internet, to provide remote
offices or traveling users access to a central organizational network.
VPN provides us a secure way of connecting to websites by hiding our IP and
encrypting our information.
Source and more :
http://en.wikipedia.org/wiki/Virtual_private_network
Free VPNs
Paid VPNs
HTTP Proxies and SOCKS5
Get Proxy lists from this sites.
More
here.
Pro-Tip : Don't use HideMyAss for hacking.
You can also get Proxies from HF,
here.
Some Proxy sites
Use Tor for secure browsing
Tor
Tor is free software and an open network that helps you defend against a form
of network surveillance that threatens personal freedom and privacy,
confidential business activities and relationships, and state security known as
traffic analysis
Source and more :
https://www.torproject.org/about/overview.html.en
SSH Tunneling
Things you will need for SSH Tunneling
PuTTy
Firefox (Preferred)
Steps of Tunneling
Open PuTTY
Enter your IP on the
Hostname or IP Address text box
To find your IP, you
can use Command Prompt. Just type ipconfig and click Enter.
Now to the left of
PuTTy, you will see a list.
Click the '+' symbol
of SSH.
From the drop down,
click Tunnels
You need to input a
port and the click "Dynamic".
Now click Add and
open the connection. You will be connected.
Now in your browser
proxy settings, type
127.0.0.1 for
IP and the selected port for port.
That's it. It is
done!!
Conclusion
It is a proven fact that nobody can be fully anonymous on the Internet.
However, that does not mean nobody is secure. We should take steps to protect
ourselves in the World Wide Web. Daily, a large amount of Cyber Crimes occurs
and Identity theft is one of them. Black Hats ruin peoples' lives for personal
gain. It is our duty to remain secure. I sincerely hope this guide helped you.
Regards,