Sunteți pe pagina 1din 8

How to protect your identity online [Part 1/2] [Extremely DETAILED] - Printable

Version
+- Hack Forums ( http://www.hackforums.net )
+-- Forum: Hacks, Exploits, and Various Discussions ( /forumdisplay.php?fid=45 )
+--- Forum: Hacking Tutorials ( /forumdisplay.php?fid=47 )
+--- Thread: How to protect your identity online [Part 1/2] [Extremely DETAILED]
( /showthread.php?tid=929221 )
How to protect your identity online [Part 1/2] [Extremely DETAILED] - TheUnknown
1 - 12-27-2010 01:18 PM
Please RATE and Comment.
Hello everyone, it's been a few months since I posted a tutorial and I thought i
t'd be a good time now before the year ends since I do this for a living and I'm
annoyed hearing it from the TV news exaggerating on the matter without being ve
ry detailed,and instead confuse their viewers even more since they are too misin
formed themselves as well.
I will not guarantee 100% assurance that ifyou follow my tips, you will be entir
ely untraceable, but your percentage will increase dramatically.
Part 2: http://www.hackforums.net/showthread.php?tid=929223
The information I will provide might makeyou paranoid by the time you are done r
eading this, so if you don't want to be informed and paranoid, please don't read
this.
I will be covering:
1) History - Hackers
2) Website owners
3) Your name
4) Your e-mail
5) What you sign up to
6) Information you expose unknowingly
7) Keeping you safe
You hear it on the news, you read it on thenewspaper, you live with it everywher
e without even acknowledging its existence.
"Hackers have stolen identities" I have heard that line so many times this year,
it is ridiculous.
Companies promising to "defend" your identity, memberships giving their words to
keep your information to themselves only, the government reassuring that theywi
ll only have access.
All this is a lie as information ALWAYS gets leaked or there is an inside worker
providing information out into the black market.
Not only that, but securities on big companies are always exposed and hackers al
ways find their way in.
1) History - Hackers
I will explain briefly on the type of hackersthat there are out there for the sa
ke of academical knowledge. These descriptions are not in dept, instead they are
meant to slightly touch the subject and educate those are who are unaware of th
ese titles on the cyber world.
1) Black Hat Hackers - These are the most infamous hackers there are. These are
the guys you hear about it on the news due to committing crimes. These people ar
e whose purpose is to gain information and use for their own need. They could be
anyone.
-Black Hats tend to be professionals at what they do and are extremely well info
rmed on everything related with the cyber world and crimes.
-Black Hats tend to be educated people who have worked many years to accumulate
all the knowledge they hold. They are not your kid who uses "hacking tools" to s
care their gaming buddies online.
-Black Hats is the image typically portrayedon movies.
2) White Hat Hackers - These are the lesser known hackers simply because they do
theclean up work that goes behind the scenes cleaning up the messes from Black
Hat Hackers.
-White Hats are the heroes of the cyber world. They fight crime using their hack

ingknowledge to patch exploits on system and assure that your information does n
ot gets leaked out or easily acquired by any Black Hats.
-White Hats are professionals at what they do. They have as much knowledge as Bl
ack Hats, but use their skills to fight crime rather than aid it.
3) Gray Hat Hackers - These are the somewhat known hackers simply because they a
re unpredictable on what their actions might turn into. They are known as"Gray H
ats" because it's a mixture between the color White + Black = Creating: Gray
-Gray Hats are essentially neutrals on what they do. They might decide to do wha
t's right even if there's some other entity telling them that it's wrong or coul
d be vice versa.
For example, Black Hat steals bank information and leaks out on the internet. Gr
ay Hat could either decide to either use the information OR let the owners, auth
orities, or the companies know of the exposure.
2) Website owners
Websites, there are millions of them around the world in all languages. You can
keep yourself entertained on them or you can become smarter reading potential us
eful information as you are reading now.
Do you ever wonder "Who owns this website?" or "How can I find out who ownsit?"
I decided to include this topic on here since more and more people decide to pay
for hosting services to have their very own website for either personal usage o
r some sort of business.
Well, unlike in the real world where you fillout papers and they get stacked or
hidden in some compartment where not a randomperson could have access. Websites
expose your information unknowingly. Maybe notthe websites themselves, but the c
ompanies that provide hosting services.
I will use this website "HackForums.net" as an example to teach what I'm talking
about.
There is something known as a "whois" that essentially tells you who registered
the domain name.
You can easily Google "whois domain" and a huge list of websites that allow you
to whois either a location or a domain to find its location.
My favorite website to do whois is:
http://whois.domaintools.com/
Now, if we do a whois on HackForums.net, here's what we get.
Quote: Domain Name: HACKFORUMS.NET
Registrar: MONIKER
Registrant [2341726]:
Moniker Privacy Services
Moniker Privacy Services
20 SW 27th Ave.
Suite 201
Pompano Beach
FL
33069
US
Administrative Contact [2341726]:
Moniker Privacy Services
Moniker Privacy Services
20 SW 27th Ave.
Suite 201
Pompano Beach
FL
33069
US
Phone: +1.9549848445
Fax: +1.9549699155
Billing Contact [2341726]:
Moniker Privacy Services
Moniker Privacy Services
20 SW 27th Ave.

Suite 201
Pompano Beach
FL
33069
US
Phone: +1.9549848445
Fax: +1.9549699155
Technical Contact [2341726]:
Moniker Privacy Services
Moniker Privacy Services
20 SW 27th Ave.
Suite 201
Pompano Beach
FL
33069
US
Phone: +1.9549848445
Fax: +1.9549699155
Domain servers in listed order:
NS1.DALLAS-IDC.COM
NS2.DALLAS-IDC.COM
NS1.ZANMO.COM69.162.82.250
Record created on: 2005-09-27 14:18:41.0
Database last updated on: 2010-11-29 02:16:59.78
Domain Expires on: 2011-09-27 14:18:41.0
As you can see it exposes a lot of information that you wouldn't want strangers
to get a hold of you and then useto sell for their own good.
HackForums.netis registered as a "Private" domain, so no real information is sho
wn ofthe real owner. Instead, it displays the information of the company providi
ng theservice for the domain or hosting.
This is also how you can contact a companyif you want to report a website with d
isgusting content such as child pornography.
I'm not going to whois a person's website since it would be against the rules to
expose personal information about anyone, but I believe that you get the idea o
f what can be done to discover information such as address, name, phone number,
fax number, and more using nothing but a website name.
Experienced website administrators alwaysshould use Private domains to avoid exp
osing information to the public as much as possible.
If you have a website, whois it yourself and find out whether if you are exposed
ornot. If you are, call the company you registered your domain and request your
domain to be put as private. They might require a fee of around $7 extra a year
, butit's worth it knowing that you're not exposed.
You could also find out the ISP or company by doing a ping on an IP.
Example,
Open Command Prompt and type "ping Hackforums.net" the response will be an IP. O
nce you have that IP, you can use:
http://iplocation.net/
To tell you where the servers are located and giving you a definite location for
the company's machines.
http://iplocation.net/ Can also be used to find the location of a person's locat
ion with their IP.
3) Your name
Your name is as unique as you can be. Yourparents/guardians named you and that's
what makes you, you.
Your name can be your worst enemy whenyou are online as it can be used to expose
so much information about you to the point of where you could be blackmailed.
Where should you ever use your real nameonline? NEVER. Why? Because, using your
name alone anyone can find out where youlive within a matter of 5 seconds.
Websites such as:
http://com.lullar.com/

http://www.pipl.com/email/
http://www.spokeo.com
http://www.emailfinder.com
http://www.411.com/
http://www.ask.com/
http://www.bebo.com/
http://www.facebook.com/
http://www.flickr.com/
http://www.ip-adress.com/ipaddresstolocation/
http://www.myspace.com/
http://www.myyearbook.com/
http://www.searchenginez.com/findpeople.html
http://www.skipease.com/
http://www.sonico.com/
http://www.spock.com/
http://www.twitter.com/
http://www.usatrace.com/
http://www.whitepages.com
http://www.whois.com/
http://www.whois.net/
http://www.wink.com/
http://www.youtube.com
http://www.zabasearch.com/
http://www.zoominfo.com
Make it extremely easy to search names, e-mails, etc to dig information about wh
oever you want. There are more websites in which I personally use to dig informa
tion about people, but I will not mention them since I do not want the news stat
ion going crazy on a new rage of identity exposers.
Here's an example of a person I searched for the sake of showing.
I have satellite pictures using Google Earth to pinpoint exactly where she lives
and what her house looks like, but I will not expose that.
Where is this information normally exposed? Hmm...I'll let you guess. Or maybe n
ot...The answer is Social Networks.Ah, Facebook, Myspace, Orkut, and so many oth
ers...The list goes on and on.
I highly recommend that you NEVER use your real name, instead use an edited name
or initials instead rather than exposing your real name to the real world. If yo
ur friends on social networks already know you, they should not need to see your
complete name as they will already know you.
For example,
Bill Gates
My recommendation would be to use "Billy Gates" simply because a letter being of
f makes it so incredibly difficult to pinpoint someone.
You can use your imagination for what you should replace your name instead of yo
ur real name. That is, if you want to avoid being looked up.
Something I have found based on experience is that it's much more difficult pinp
ointing teenagers on the internet sincethey are not normally registered with gov
ernment database that eases finding them.
If you are a teenager, do not have your parents names exposed as the name of you
r parents can be used to pinpoint you or vice versa, if you are a parent. Ironic
ally,it's the teenagers that expose more information than adults and yet, they a
re the ones harder to pinpoint.
Part 2: http://www.hackforums.net/showthread.php?tid=929223
All credit goes to me (TheUnknown1) from experience and learning.
I can find out or dig information on anyone for a fee if you are interested in m
y services. PM me on how we can do business. I will be asking $35 per person. I
can track down a lost friend, find phone number of a person, find the address of
a person, find their relatives, and more. I will include a full report for thos
e interested in my services.
* - TheUnknown1 - 12-28-2010 12:47 PM
4 hours writing this...

120 views and 0 replies.


Anyone?
* - Filo^ - 12-28-2010 05:40 PM
I shat myself after reading this. got like 5 domains registered to me and my nam
e is on it :P
Cheers for this!
* - aggouras - 12-28-2010 06:21 PM
Nice Tutioral!Wow,after that I hope I will be almost unknown.A great idea would
be if you made a Tutioral on how These Info
Spoiler (Click to View) of a person. :D.
* - TheAxis - 12-28-2010 06:26 PM
Awesome tutorial, thanks alot. Gives great info
* - JesusOfSuburbia - 12-28-2010 06:34 PM
Nice tutorial. It's very usefull and well written
* - syrenen11 - 12-28-2010 07:16 PM
This is quite somply amazing! I knew about finding someone and a bit of this inf
o already. But, some of these thigns, I actually had no idea about. Such as the
whois. I learn something every day. Thank god I have an alias. :)
Still, thanks for the share, it's very, very well written in my opinion, and I w
ill makegood use of it in the upcoming future.
-Syrenen
* - UniQ - 12-28-2010 07:18 PM
Wow, I did not knew any of these things! I guess i'll need to be more careful wi
th myname on social network sites. Thanks for the share. great tutorial man, kee
p it up!
* - seskanda - 12-28-2010 07:20 PM
Great info,but how does it 'protect your identity online' though?
* - UniQ - 12-28-2010 07:24 PM
(12-28-2010 07:20 PM) seskanda Wrote: Great info,but how does it 'protect your i
dentity online' though?
He gives hints to protect your identity online such as: "Where should you ever u
seyour real name online? NEVER. Why? Because, using your name alone anyone can f
ind out where you live within a matter of 5 seconds."
have you even read the tutorial?
+--- Thread: How to protect your identity online [Part 2/2][Extremely DETAILED]
( /showthread.php?tid=929223 )
How to protect your identity online [Part 2/2][Extremely DETAILED] - TheUnknown1
- 12-27-2010 01:19 PM
Part 1: http://www.hackforums.net/showthread.php?tid=929221
4) Your e-mail
Your e-mail, the one you use to check on your everyday business or activities on
line.The one you rely to deliver things to you safely.
Question is, are you delivering to it safely? Probably not, or at least I hope y
ou are.
The e-mail problem is an easy fix since all it takes is common sense.
If you have various accounts such as Social networks, have an e-mail specificall
y for messing around. If you have accounts for serious business such as your Pay
pal, Bank, etc...
Have an e-mail that only you have access toand is different from your regular"me
ssing around" e-mail.
If you work for any companies or have services with an ISP, avoid using their email services to register on important websites where your money is dealt with s
uch as Paypal, AlertMoney, banks, etc...
Why? Because they have been known to get hacked leaving all your information exp
osed for hackers to gorge in. Instead, I would recommend focusing on big compani
es such as Yahoo, Hotmail, or Gmail since these are much more secured companies
and will always be up 24/7 any time of the year.
Not much to say on that, just have different e-mails for different activities fo
rsecurity measures. Not only that, but also have different passwords that requir

e extensive typing with various complicatingsymbols such as:


you%(3cool
That above is a ridiculous example, but I believe you get the idea.
You know what hackers love the most? Not having to do much work and having every
thing set for them easily for the taking. For example, if you are infected with
a keylogger, a hacker would love to have 1 e-mail to have access to everything.S
o, this gives you an idea why you should have a variety at all times with up-todate information to assure that you could retrieve it, in case if it were to get
stolen.
5) What you sign up to
Ever wondered why you get so much spame-mails? Well, it's simple. It's because e
-mail collectors acquire a list of e-mails in which they can mass e-mail to send
spam.
Just as I mentioned earlier, have an e-mail for messing around and e-mails for s
erious business. Avoid using an e-mail for all activities as this will only clog
your inbox with useless e-mails that will steal your valuable time.
There are many websites which sell their database of e-mails to E-mail spammers
fora certain amount of money behind the scenes or the collectors themselves have
set traps through the internet such as Phishing to acquire a list of e-mails to
spam.
Avoid registering to websites such as products and random useless subjects that
promise to pay you money for signing up or trying their products.
Seems to me like it's common sense, but it's good to know.
6) Information you expose unknowingly
Well, I hope that I have given you a good idea of easily information can be acqu
ired using the internet.
Privacy does not exists anymore on the internet.
If you use Social Networks, try to have your information concealed as much as po
ssible from the public and do not exposevaluable information such as Birthday, l
ocation, or name to keep yourself as underground as possible.
You have to consider that information could be leaked physically or electronical
ly as well.
Keep yourself up-to-date and informed to know if a company you might use has bee
n breached or not.
http://en.wikipedia.org/wiki/Timeline_of_computer_security_hacker_history
As they say, Google is your friend. Use it when you need it.
7) Keeping you safe
This is probably the most important part of the tutorial as this is where the mo
st incidents occur due to infections or traps.
Infections or traps can range from:
-RATs (Remote Access Tool) which essentially give completely control of your com
puter.
-Keylogging which retains a log of all the keys you ever press on your keyboard.
-Phishing which retains a log when you manually input your information on a fake
website emulating an original website.
-And more, but those above are the most common.
How can you protect yourself?
Around 90% of malware on the internet was coded to infect Windows Operating syst
ems. I got that number from PC Worldabout a year ago, forgive me if it's incorre
ct now.
Anyway, assuming that you run on Windows you are the ones are the highest risk o
f getting targeted or infected.
You will want to always have your computer clean and secured having the proper t
ools. All these tools are the best ofthe best and are all free. They are probabl
ybetter than paid security software.
How do I know this? Well, there are websites where you can scan malware after yo
u crypt them (making them undetectable) to ensure that they are not detected by
Anti-virus of any kind. Avira isthe one that people always have a hard time bypa
ssing, so I can safely say that it's the best from my personal experience of cry
pting and scanning.

Download and install all these tools below and I can assure you that your comput
er will be protected 1000% better than what it might be as of now. Get the free
versions.
http://www.malwarebytes.org/
http://personalfirewall.comodo.com/
Avira Anti-Virus - Follow the instructions on that link on how to get it free.
KeyScrambler Pro 2.7 - Follow the instructions on that link on how to get it for
free. This software helps to encrypt everything you type on the internet.
If you use Google Chrome, get this:
https://chrome.google.com/extensions/detail/flcpelgcagfhfoegekianiofphddckof?hl=
en
It encrypts all your website visits as https:// rather than http:// which makes
you more secured.
If you use Firefox, get this:
http://www.eff.org/https-everywhere
It encrypts all your website visits as https:// rather than http:// which makes
you more secured as well.
http://notendur.hi.is/~gas15/FireShepherd/
FireShepherd, a small console program thatfloods the nearby wireless network wit
h packets designed to turn off FireSheep, effectively shutting down nearby FireS
heep programs every 0.5 sec or so, making you and the people around you secure f
rom most people using FireSheep.
The program kills the current version of FireSheep running nearby, but the user
is still in danger of all other session hijacking mechanisms. Do not do anything
over a untrusted network that you cannot share with everyone.
-Know that this is only a temporary solution to the FireSheep problem, created t
o give people the chance to secure themselves and the others around them from th
e current threat, while the security vulnerabilities revealed by FireSheep are b
eing fixed.
The other option is using a different operating system which has a lower percent
age of being targeted.
You don't have to spend tons of money onApple computers, instead you can get a f
ree operating system from the Linux distributions.
The easiest to use and most similar to Windows looks is Ubuntu. You can install
Ubuntu as a normal program on Windows and once it restarts, it shows you the opt
ion to choose Ubuntu over Windows.
You can watch this video:
http://www.youtube.com/watch?v=UdI8_92QTkQ
To learn more in dept. It's very simple, so don't be afraid to try.
The video focuses on completely replacing your current operating system Windows
and replacing it or dual booting with Linux Ubuntu.
If you are a noobie, I would recommend you stop at the part where he goes to:
Wubi Installer - Ubuntu
It's as simple as going Next, next, next on any normal installation and whenever
you restart your computer, it will ask you to choose either Ubuntu or Windows.
Running under a Linux distribution will putyou at around a 2-5% of getting infec
ted with anything. Not only is Linux good, but you don't have to worry much abou
t installing anti-virus or anti-malware software to keep your computer clean and
running.
I have been running on Backtrack 4 R2, a Linux Distribution and I can tell you t
hat I have NEVER been infected.
Well, I believe this is all I have to say.
I hope you guys learn something from thisnew tutorial. Check out my other tutori
als on Facebook hacking.
Good luck!
All credit goes to me (TheUnknown1) from experience and learning.
I can find out or dig information on anyone for a fee if you are interested in m
y services. PM me on how we can do business. I will be asking $35 per person. I
can track down a lost friend, find phone number of a person, find the address of
a person, find their relatives, and more. I will include a full report for thos

e interested in my services.
* - Do0ks - 12-27-2010 02:40 PM
Great share man! Keep it up!!! Better safe then sorry, I think everyone on HF sh
ould read more in to keeping there self's safe much before going in to "hacking"
.
* - I am not giving my name out - 12-27-2010 07:09 PM
This is detailed! Thank you very much!!!!
* - TheUnknown1 - 12-27-2010 08:19 PM
No problem. I hope you guys learned something.
* - bernardbear - 12-27-2010 09:48 PM
maybee i will read it next time . . .tired now
thank you
* - dragonmaster - 12-27-2010 10:25 PM
THAT'S GREAT SHARE BRO ;D
* - System113 - 12-27-2010 10:25 PM
Thank you and thanks for the share,,
* - tcracken - 12-27-2010 10:32 PM
thanks for those precious tips !
* - fidgit - 12-27-2010 10:38 PM
Big ups for this share - most helpful
* - TheUnknown1 - 12-27-2010 11:42 PM
No problem everyone. Glad to have helped.

S-ar putea să vă placă și