Academy
Proxy Shop
SMS Activation
Ru
En
Academy
Proxy Shop
SMS Activation
Theme
Change language
Internet privacy and security course
Contents
Show all
+
Introduction
(8)
Threats
(14)
How hackers get caught
(2)
Common misconceptions
(1)
Virtual operating systems
(7)
Password
(8)
Operating systems
(4)
Encryption
(14)
Encryption of operating system
(1)
Social media
(2)
Tails and Whonix
(1)
Mass surveillance systems
(1)
Email
(4)
Deanonymization
(8)
Browser
(2)
Cloud Storage
(1)
Cyber spying
(9)
Account hacking
(2)
External media devices
(3)
Data theft
(2)
IP address
(2)
Instant messengers
(8)
Steganography and concealed data storage
(4)
MAC address
(1)
Software
(2)
Data leaks
(1)
Personal Information
(1)
Tor
(1)
PGP
(1)
Malicious software
(3)
Identity theft
(3)
Forensics
(2)
Search engines
(1)
Anti-computer forensics
(2)
Images
(2)
VPN
(4)
SMS
(3)
Wiping data
(3)
Information for readers
(2)
Introduction
Course Interaction Tips
Shield, Mask, and Sword. Why We Teach Attacking.
How to Follow the Publication of New Materials
The most important advice of the course
Test your online privacy and security.
Help and answers to your questions
What do I learn from this course?
The importance of donations
Threats
Cyber spying
Dangerous search
Telemetry
Data leakage
Privacy violation and tracking
Mass surveillance systems
Physical access and computer forensics
Peeping information on the screen
Mass hacking of devices
Digital data loss
Cyber-warfare, cyber diversions and cyber terrorism
Planting digital evidence
Deanonymization and unicalization
Digital identity theft
How hackers get caught
How hackers get caught sdafasdfsaedf
The fatal mistakes of cybercriminals
Common misconceptions
Why should I need privacy and security on the Internet?
Virtual operating systems
Virtual machine and virtual operating system
Creating a virtual machine
Snapshots and virtual machine cloning
Why you shouldn’t use shared folders, shared clipboard and Drag’n’Drop
Encryption of virtual data on virtual machine VirtualBox
The information VirtualBox stores about users
Virtual machines’ vulnerabilities. How hackers go beyond the virtual environment.
Password
Creating a secure password
The secrets of a strong password
A huge mistake or how exactly you should not keep passwords
Secure ways to store passwords
Password Managers or Ross Ulbricht's Fatal Mistake
MiniKeePass is a password manager for iOS (iPhone / iPad)
KeePassXС. Setting up a password manager for macOS.
Emergency erasure of saved passwords
Operating systems
Operating Systems. Choosing your path.
iOS. First steps to protect your iPhone and iPad.
The myth about the incredible security of macOS
Qubes OS. System for those who have something to protect.
Encryption
History of encryption. Rivalry between encryption and special agencies.
Encrypted file-hosted volumes
A brief history of TrueCrypt. Unprovability of encrypted file-hosted volumes.
Your TrueCrypt is spying on you
Installing and setting up basic security in TrueCrypt
How to install and set up basic security in VeraCrypt
VeraCrypt. VeraCrypt vs TrueCrypt.
Creating and using a secure encrypted file-hosted volume with TrueCrypt / VeraCrypt
Encryption of external data storage devices with TrueCrypt and VeraCrypt
Secrets of working safely with encrypted file-hosted volumes TrueCrypt and VeraCrypt
AES Crypt. A straightforward, cross-platform solution for file encryption.
Encrypting files with AES Crypt on Windows and macOS
Emergency destruction of encrypted file-hosted volumes
Encryption of operating system
Comprehensive encryption of operating system or hard disk drive
Social media
Forensic analysis of activities on social networks
Gaffes in social media that turned fatal for the careers of their authors
Tails and Whonix
Tails. A few tips before you start using this operating system.
Mass surveillance systems
Total surveillance: good or evil?
Email
Test: check email for hacking resistance
Deanonimization of email owner
Sending Anonymous Emails
Protect data from leakage at the email recipient level
Deanonymization
Cross-device tracking. Deanonymization of users of Tor, VPN, proxy using sound beacons
What you can find out based on the photos on the network.
Timing attack. How the special services deanonymize the users of messengers
How the FBI obtains authentic IP addresses of criminals using Tor, VPN or proxy
Deanonymization of VPN and proxy users through the User agent and browser fingerprints
Deanonymization of Tor users through bait files
How to get a Telegram-linked mobile number
De-anonymization of users of messengers using P2P-connection
Browser
Browser history through the eyes of an IT security professional
Security professional’s point of view about browser cache
Cloud Storage
Cloud Storage Threats
Cyber spying
How to check if you are not being spied on your mobile phone
Cyber spying through computer repair centers
Cyber spying through wireless keyboards and mice. “MouseJack” attack.
Tapping premises using speakers and acoustic systems
Cyber espionage through smart TVs
Cyber espionage through monitor emanation analysis
Universal method of deleting programs for cyber espionage
Hacking, erasure and cyber espionage via USB cables.
Cyber spying through mobile phone
Account hacking
The secret to a secure login
Two-factor authentication
External media devices
BadUSB. The deadliest threat there is no defense for.
Hacking the computer via hotkeys / shortcut keys
Dangerous flash drives. What can USB connection lead to?
Data theft
Data theft with an attack “web cache deception”
The danger of capital letters or forever working phishing scheme
IP address
How do they figure you out by IP address
What blacklists are for and the consequences of having your IP address on a blacklist
Instant messengers
General principles of secure communication in the network
Disrupting the continuity of correspondence. One-time-use note services.
XMPP (Jabber). How do they communicate in darknet?
Bitmessage. The most anonymous messenger.
A trap for hackers: checking if someone is reading your correspondence.
Encrypting your correspondence in a browser.
Link substitution in messengers
Four secrets of safe communication for hackers
Steganography and concealed data storage
The secrets of keeping your data concealed
Disguise cryptocontainers
The 3 mistakes of Russel Knaggs, or 20 years of imprisonment for a “deleted“ email.
Creation of double-bottom cryptocontainers
MAC address
What is MAC address and how is it related to your anonymity?
Software
Open and closed source codes. Errors and situational bugs.
Audit of a list of installed programs and applications
Data leaks
Checking data leaks
Personal Information
Data collection by software
Tor
DeepWeb or the hidden internet of Tor
PGP
Intro to PGP
Malicious software
Here’s how you will go through the training course on detecting and removing malicious software
Safe opening of short links
Attack drive-by download, or secret download.
Identity theft
Preventive measures in order to preclude identity theft
How to check if your identity has not been stolen
How to delete your personal data posted on the network
Forensics
Firewire attack
Practical examples of using forensic analysis of photos and videos
Search engines
Anonymous DuckDuckGo Search Engine
Anti-computer forensics
Counter forensics (anti-computer forensics)
Secret threat or files from messengers
Images
Hiding data on images
View, edit and delete image metadata at macOS
VPN
Choose a protocol for VPN. Compare OpenVPN, PPTP, L2TP/IPsec and IPsec IKEv2
Choose a reliable VPN: TLS authentication, connection port and session key
Choose a secure VPN: encryption algorithm, key length and data authentication
How hackers and security services hack VPN
SMS
The security problems of SMS messages
SMS messages that self-destruct. How to check if your SMS are being read.
Sending anonymous SMS
Wiping data
Electromagnetic systems for wiping data on hard drives
Emergency data erasure of the computer. How hackers cheat forensics.
Emergency erasure of mobile phone and tablet
Information for readers
Collaboration with technical writers
User Agreement
Read and Watch
CyberYozh
Telegram
YouTube
The methods of breaking encrypted file-hosted volumes and how to protect yourself from them