background preloader

Anonymity, Darknets and Staying Out of Federal Custody, Part One: Deep Web

Anonymity, Darknets and Staying Out of Federal Custody, Part One: Deep Web
Anonymity, Darknets and Staying Out of Federal Custody, Part One: Deep Web You've probably seen those deep-web images floating around on the Internet. Usually, it goes something like this: There is a towering iceberg and the deeper the underwater portion extends, the more “hidden” and “exotic” the content is described to be. Sometimes these images are accurate to a point, but most are just making things up. So what exactly is 'deep web' then? Are there really hidden secrets and treasure buried under some cloak and dagger type conspiracy? In this series of articles, I am going to break down the idea of a deep web, what is it, how it got there, and most importantly, how we can use it for our security—maybe even for lulz. Anonymity and Darknets As it stands today, practical knowledge of how darknets (non-indexed portions of the Internet) function will allow you to make more informed decisions regarding risks when rooting a box, hiding files, or communicating securely. Why Google?

http://null-byte.wonderhowto.com/inspiration/anonymity-darknets-and-staying-out-federal-custody-part-one-deep-web-0133455/

Related:  Dark NetLittle Sister Webs

Anonymity, Darknets and Staying Out of Federal Custody, Part Two: Onions and Daggers Anonymity, Darknets and Staying Out of Federal Custody, Part Two: Onions and Daggers In the first part of this series, we learned about darknets, as well as how they came about. But these patches of forgotten Internet are not the oasis of free information you might think. Anonymity, Darknets and Staying Out of Federal Custody, Part Four: The Invisible Internet Anonymity, Darknets and Staying Out of Federal Custody, Part Four: The Invisible Internet In the last article, we left off with the Tor network and its hidden services. As I mentioned, Tor is not the only option in the game, and I want to offer a general introduction to I2P. For a web browsing proxy and hidden services host, Tor gets the job done well. But if you are looking to expand your options for secure communication, then enter I2P! This article will show you how to obtain and set up I2P, and in the process, we will also configure an IRC client to access the IRC2P network and get you up and running.

21 Ways to Buff Up Your Browser Whether you are at home, work, or school, odds are you spend a lot of time staring at your Web brows­­er. So why does it look—and run—like everyone else’s? This collection of our favorite browser secrets and extensions can make your browser safer and more efficient than ever—and help you figure out what’s wrong when things don’t work as you expect. Unless stated otherwise, our tips are for all of the four major browsers: Chrome, Firefox, Internet Explorer, and Safari. Editor's note: For an in-depth comparison of the latest versions of six browsers for PCs--Opera and RockMelt as well as the four covered by our tips here--see "Which Browser Should You Use?"; for our appraisals of five popular mobile browsers for the Android operating system—Chrome for Android Beta, Dolphin Browser HD, Firefox for Android, Opera Mini, and Opera Mobile—see “The Best Browsers for Your Android Phone.”

Design a Ready to Print Brochure in Photoshop This time I'll help you to create a ready to print three-fold brochure from scratch using only Photoshop. This tutorial is ideal for beginners and for people who want to know more about print design. Let's get it started! This is a practical guide on how to design a simple brochure from scratch using only Photoshop. I'm doing it without using InDesign templates, nor Illustrator, since there are many people who don't have that software, or don't know how to use it.

Anonymity, Darknets and Staying Out of Federal Custody, Part Three: Hidden Services Anonymity, Darknets and Staying Out of Federal Custody, Part Three: Hidden Services For a moment, picture a situation where you want to host some files or images, but you do not want it traced back to you. Perhaps you're working on a project with others and need secure data storage. Anonymity is the new shield of the 21st century—and you best protect yourself. As always here at Null Byte, we are trying to make that happen. Before someone can learn how to root a box, they need to learn how not to be found.

Tor vs. I2P: The Great Onion Debate Tor vs. I2P: The Great Onion Debate In my recent Darknet series, I attempted to connect the dots on the Deep Web. I covered the two largest anonymity networks on the Internet today, Tor and I2P. PASSWORD HACKING Need to hack someone’s Facebook password? Well, you’re at the right place! In this post I’ll show you some of the possible ways to hack Facebook password. Also, at the end of this post, I will be discussing Read More This post will show you how to hack Windows administrator password at times when you forget it or when you want to gain access to a computer for which you do not know the password.

40+ Excellent GIMP Tutorials for Designers Gimp or the GNU Image Manipulation Program is a software that enables its user to retouch, edit and manipulate photos or image. Many of our previous posts are into tutorials for Photoshop… To spice things up a bit and to stir the usual offerings, we bring you 40+ Excellent GIMP tutorials . These tutorials are of different variety, so it is advisable to read through the article to ensure that you haven’t missed any useful technique that may help you in your designs. For future reference, you can also bookmark this post just in case you forgot something. This collection was created in response by the request of our readers. If you are thinking about learning Gimp, read through this tutorial for tips and techniques by avid gimp users.

Anonymity Networks. Don't use one, use all of them! Introduction The 3 major anonymity networks on the Internet are Tor/Onionland, I2P and Freenet. If you feel confused on which one is the "best" one to use the answer is simple. Use all three! Each anonymity network is designed for a different specific purpose. One network alone cannot do what the three can do together.

Related: