Improve Privacy on Apple iPhone’s

Apple iOS 15 Guide I came across this guide while taking training with Intel Techniques. Very easy guide to follow – recommend check him out for any update versions. Please read and understand the entire guide before you take any action. First, choose the appropriate option for you (three options). [ Option One ] An […]

How to search the darknet?

A list of tools and to help you navigate the darkweb. [ TOOLS ] Hunchly – Daily dark web reports can help you identify new hidden services. H-Indexer – Tor required. Tor66 Fresh Onions – Tor required. Onionscan – Free and open source tool for investigating the Dark Web. Onioff – Python script for inspecting […]

{session private messenger} how to host an open group

i will assume that you’re already a user of Session since you’re interested in hosting/creating your own open group chat.  but just in case your asking….what is Session?  straight from them: “Session is an end-to-end encrypted messenger that minimises sensitive metadata, designed and built for people who want absolute privacy and freedom from any form […]

{firefox} browser privacy configuration

let’s be honest – websites and internet browsers know more about you and your family then god him/her/he/she/they/them/it/nil/null/peanut-self will ever know. even worst….if you want to take steps to be less identifiable, websites will just deny you access to their service or make you jump through hoops until you break and say fu*k it. there […]

{how to plan} a guide to planning

“plans are worthless, but planning is everything” Dwight Eisenhower You have an idea, a goal so wicked it will make you a superstar overnight and you’ll have all the moneys! Or….your mate asked you to organise next weeks beer appreciation night. Either way in order to execute there has to be some planning involved, small […]

How to deal with an online stalker?

Steps you can take to if you’re being harassed online; Online pests are fucked. Let’s not muck around here. There is nothing worst then feeling like your whole world is collapsing around you just because some peanut has nothing better to do then find enjoyment from harassing people online. Good news is – most of […]

Top 4 ways to hack a Wi-Fi network

Learning about ways to pen-test Wi-Fi There is no one tool to rule them all when it comes to cracking a Wi-Fi network. It all depends on what the circumstance is at that current time, so choosing the right strategy is more likely to lead to success. This is some of the most effective strategies […]

Passwords.txt – Top Million Passwords

Create a large password list for brute force attacks; Feel free to download and use the two password lists below; password.txt > 999,998 most used passwords in Breach data. root.txt > 4,724 common root passwords. I recommend using [ ctrl + f ] and search for passwords you use. If they are in this list…change […]

How to make your Android mobile more secure?

Simple steps for baseline device security. Device Management and Access Control; Enable passcode and biometric authentication Ensure Pattern and Swipe only lock is Disabled Enforce a minimum of 6 characters for the device authentication passcode Disallow rooted Android mobile devices Ensure ‘Ask for unlock pattern/PIN/password before unpinning’ is set to ‘Enabled’ Ensure ‘Show passwords’ is […]

How to make Google Chrome browser more secure?

Guide for basic security changes for Google Chrome browser. PURPOSE To define a set of baseline settings that allow Google Chrome (Chrome) browser to be hardened to a known level of security. COMPUTER CONFIGURATION; Disable ‘Continue running background apps when Google Chrome is closed’. Enable “Block third-party cookies”. Disable running plugins that are outdated. Enable […]