Sunday, November 10, 2013

Precautions for a young hacker

                         Precautions for a young hacker 


Friends in this article i will tell you a few precautions you should take before you start hacking... But before that i wanna tell you...

1) How hackers get caught.

First stuff that gives you away are "LOGS". You need to know how events, application, and system logs work. If you don't, you can be easily caught! The shell history will expose your actions.
Another giveaway is leaving a “:wq” in /var/log/messages or binarys.

Your laziness will take you into problems. NEVER HACK FROM HOME..! Take your time, and go to net cafe or anywhere else apart from home. Logs will take you down!
The code that you run on system will take you down. If you compile the code on target, libraries will give you away!
If your victim, notice, that he is maybe hacked, or something is wrong.. He will ask from his ISP for IP logs, and if you don't use VPN, or if you hack from home, they will hunt you down.

Thing, that takes you down 100% is BRAGGING. It is common problem of beginning hackers. They like to brag, to earn respect and reputation but NOT KNOWING that is the matter of minutes, hours may be days when they will be caught.


2) Hiding and Securing you as "Hacker"

Temporary guest accounts, unrestricted proxy servers, buggy Wingate servers, and anonymous accounts can keep hackers carefree.

A young hacker is less likely to know all the little things that an expert hacker might know. Besides, the young hacker may be trying to impress others and get a little careless about covering his tracks. This is why younger hackers are often caught.
An older hacker, on the other hand, will rarely leave any tracks. They know how to use their slave's computers as a tool for a launching place to get into another computer.

There will always be hackers, and there will always be hackers in prison.

* DESTROY LOGS, REMOVE ALL YOUR TRACKS!

How to Destroy Logs?

Choose Start > Control Panel.
Double-click Administrative Tools, and then double-click Event Viewer.
In either pane of the Event Viewer window, right-click System and then select Clear All Events.
To save the current system log, click Yes when Windows returns the message, "Do you want to save 'System' before clearing it?", enter a file name for the saved system log file, and then click Save.



* DO NOT HACK AT HOME! USE VPN THAT SAVES NO LOGS!

Virtual Private Network - VPN
                                           


A virtual private network (VPN) extends a private network and the resources contained in the network across public networks like the Internet. It enables a host computer to send and receive data across shared or public networks as if it were a private network with all the functionality, security and management policies of the private network.This is done by establishing a virtual point-to-point connection through the use of dedicated connections, encryption, or a combination of the two.
The VPN connection across the Internet is technically a wide area network (WAN) link between the sites but appears to the user as a private network link—hence the name "virtual private network".

Some free VPN Services:

1. ProXPN

2. VPNod

0 comments:

Post a Comment

Related Posts Plugin for WordPress, Blogger...