Twitter Facebook

Category: guru

How to change your MAC address

Change or Spoof a MAC Address in Windows or OS X Every NIC (Network Interface Card) has a unique MAC address (Media Access Control). This applies to all types of network cards, including Ethernet cards and WiFi cards. The MAC Address is a six-byte number or 12-digit hexadecimal number that is used to uniquely identify a host on a network. An example of a MAC address is 1F-2E-3D-4C-5B-6A and it falls into the Layer 2 networking protocol of the OSI model. In today’s networks, ARP, or Address Resolution Protocol converts a MAC address to a Layer 3 protocol address, such as an IP address. A…

Read more

Free VPN

The following VPN services have a free mode, but remember that somebody has to pay for the bandwidth, hardware and maintenance. One way or another they will get their money, mostly by trying to get you to upgrade limiting what you can do, for example, no video streaming or P2P. Other providers will show advertisements, and one or two could be a scam logging username and passwords. To ward off fraud it is best to stick with VPN companies that have been around for a long time, tell you who they are and how they make their money. Unlimited bandwidth free VPN VPNBook: Free VPN…

Read more

How Tor Users Got Caught – Defcon 22

4 examples of people who have used Tor for illegal activities and how they were caught. Multiple de-anonymization attacks are shown at the end of the video. Part 2 can be found here You can read more about the cases here: 0: Harvard bomb threat Eldo Kim getting busted by being one of the only users at Harvard on the tor network, and admitting he emailed the bomb threat.Case 1: Hector Xavier Monsegur (Sabu) and Jeremy Hammond LulzSec getting caught for logging on to IRC one time without tor and FBI using correlation.Case 2: Freedom Hosting admin under attack from Anonymous group previously fighting CP…

Read more

Learn To Avoid NSA Spying And Become Anonymous Online

Today I finds grate book from, It has some useful TOR and The Dark Net we must fallow, I have been using tor browser since 2012, but this book give me some extra knowledge about tor and TOR and The Dark Net, so i think I should share this with you.Here its index,IntroductionChapter 1What is the Deep Web and Why Is It Worth Exploring?Chapter 2The Only Ways to Surf AnonymouslyChapter 3Pros and Cons of Using TorChapter 4Pros and Cons of VPNChapter 5Pros and Cons of ProxiesChapter 6The Most Common Mistakes Made in Anonymous SurfingChapter 7How to Avoid NSA SpyingChapter 8Anonymous EmailChapter 9Getting Rid of Evidence and…

Read more