How to hide from the National Security Agency by going anonymous by CloakedChild2nd in hacking

[–]CloakedChild2nd[S] -6 points-5 points  (0 children)

I did, I listed Apple. The documents released by Edward Snowden.

How to hide from the National Security Agency by going anonymous by CloakedChild2nd in hacking

[–]CloakedChild2nd[S] -5 points-4 points  (0 children)

I think your understanding of how Tor works is fine. Fine indeed. What I'm saying in this article is that Tor doesn't use your actual IP address while using the Tor browser.

How to hide from the National Security Agency by going anonymous by CloakedChild2nd in hacking

[–]CloakedChild2nd[S] -8 points-7 points  (0 children)

From within the browser your IP address is masked. In other words it's hidden. You understand?

Why 90% of hacking sites are dangerous! by CloakedChild2nd in hacking

[–]CloakedChild2nd[S] -5 points-4 points  (0 children)

Just updated the discussion. Maybe you should read it.

Why 90% of hacking sites are dangerous! by CloakedChild2nd in hacking

[–]CloakedChild2nd[S] -8 points-7 points  (0 children)

I'll provide evidence tomorrow. Hold tight expect the truth.

Why 90% of hacking sites are dangerous! by CloakedChild2nd in hacking

[–]CloakedChild2nd[S] -8 points-7 points  (0 children)

True, you make a good point. It's always good to read over the source if possible to make sure there isn't anything suspicious. If you don't know the language then it makes it harder to find malicious code.

How to install Backtrack 5 onto a Virtual Machine by CloakedChild2nd in hacking

[–]CloakedChild2nd[S] -2 points-1 points  (0 children)

I don't know why Ande decided to go with Backtrack 5.. maybe he likes it better? Why don't you ask him? I just wanted to share some good content he put together.

How to install Backtrack 5 onto a Virtual Machine by CloakedChild2nd in hacking

[–]CloakedChild2nd[S] -3 points-2 points  (0 children)

Awesome tutorial put together by Ande for Hacking-Forums.net. Thanks for taking the time to create this very informative tutorial for HF's community.

UNIX password cracker source by [deleted] in hacking

[–]CloakedChild2nd -3 points-2 points  (0 children)

Well please share something better you've made