YOUR PRIVACY IS YOUR SECURITY
HACKER
H- HIDE IP A- AIM VICTIM C- CRACK PASSWORDS K- KILL FIREWALL E- ENTER INTO DATABASE R- RETURN ANONYMOUS
### we are no longer safe online, everything we do is monitored by National security agency (NSA), Government Communications Headquarters (GCHQ) and others.
# what is being monitored:
- online banking transactions
- pictures sent via short message service (SMS), email and social media chats
- phone records, locations
- browsing history etc...
Difference between HACKER AND CRACKER.
Who is HACKER.
A Hacker is a person who finds and exploits the weakness in computer systems and/or networks to gain access. Hackers are usually skilled computer programmers with knowledge of computer security.
Who is CRACKER.
A cracker is someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security. ... The term "cracker" is not to be confused with "hacker". Hackers generally deplore cracking.

4 ways to be anonymous online

- using proxies websites
- using virtual private network (vpn)
- using tor browser
- ssh tunneling
- what is proxies?
- what is virtual private network (VPN)?
- TOR Browser tor concept.
- tor is the network of routers or relay nodes that helps users to stay anonymous by routing the internet traffic through different nodes. the destination website can not access the exact location of you. because your ip address has been masked by the tor nodes. each time, the user visits the site, the apparent location of his/her is ip address is changed. tor relay nodes are provided only the ip of the next node from which it obtained the traffic.
- location is an important aspect in internet which helps to track you. normally website cookies can track accurately to your city.but specialized malware bots can access you exact address based on your searches, and you browser cache tor enabled browsers does not store cookie data not allow java script to run.
- essentially, tor acts as the god father of dark web website. each dark web server is connected ti tor relays directly so that the clear web (clear web is the normal internet that we use) search engines fail to index their urls.
- you can download tor browser through google search.
- Onion Links:
- onion links are the domain name extensions in the dark web. just like.com, .us, .in, .net etc. which we are familiar with, .onion is TLD of dark web. you can not access .onion domains via clear webs because this TLD exists only in dark web. you will need to use TOR network to browse .onion sites.
- the good thing about .onion websites is that even if it implement cookies to track you, it can not why? simply because the onion site is self is hosted on tor relays. the traffic from tor relays to onion is coming from different locations and then it finally joins together at the destination.
- each onion site has a public key and private key similar to APIs in clear web and tor network connects users to website by following its public key.
- SIX RULES TO SURFING DEEP & DARK WEBSITES.
- never skip any of the rules mentioned below!! skipping any one rule can lead to revealing you true identity and land you hot soup!!
- never sign up on any website with your clear web email id and username example: do not use gmail, yahoo, outlook or any email provider on the dark web. create a dark web email id using the different service, make sure that email address does not contain your name or any thing that relates to you.
- disable java script and cookies in your browser
- use a secure operating system never use windows use KALI LINUX OPERATING SYSTEM AND OTHER LINUX DISTRIBUTION.
- keep you mind clear. dark web is a lure. it offers service of hackers, hit men, chemical assassins , illegal drug sales and uncensored trolls. you can explore every part as you wish. but never get deeply involved - there is no one to save you in dark web
- do not provide your original name, date of birth, city, phone number, email id etc. in any deep and dark web.
- SSH TUNNELING
-
secure shell (ssh) is a cryptographic network protocol for operating network services securely over an secured network.
- ssh runnel is a encrypted tunnel created through an SSH protocol connection.
- ssh tunnels may be used to tunnel unencrypted traffic over a network through an encrypted channel. in easy language, you can surf internet without being monitored and even surf blocked sites too.
I Hope you like this article Thanks for read this article.
Please share this article to your friends and family members..
subscribe to our blog for more articles...
0 Comments
For More Information Please Comment