Jump to content

HyperAlpha

Members
  • Posts

    4
  • Joined

  • Last visited

Recent Profile Visitors

225 profile views

HyperAlpha's Achievements

Newbie

Newbie (1/14)

  1. So I was watching a DEFCON 21 video and I was surprised actually how flawed full disk encryption can be I always had the idea that when you encrypt a hard drive you can't break into it but there is actually allot of method's that can be done: How do you protect your hard drive and encrypt it with the intention it can never be broken into or I guess just enough to feel safe from another person if they try to break into it? I will also add a cool github with a program/code that allows your hard drive to be deleted when it is taken away from a sensor since its sorta relative to this discussion. defuse/swatd
  2. I have skimmed and read a couple of things...I could be wrong here and there. TOR as it was is no longer secure the FBI has shutdown the silk road and if not other website's and is monitoring traffic most computer hackers are going to the other platform. Which I forget is called since its been so long since I have used a Dark net which basically use's PEER to PEER connections to make a unique anonymous link to the dark net and is what most people are using now and using a IRC function host to host to be able to talk about business or other related things. The only reason you should be using a VPN or anything like that is if you are doing illegal business or wanting to find illegal business or finding top secret documents/knowledge. There is about 400 websites that require some computer hacking knowledge to access them last I checked which was a hell of a long time ago. There is a point of wanting to protect privacy and just going completely offline because you are trying to steal information. ---------------------------------------------------------------------------------------------------------------------------------------------------------- If you are trying to go completely anonymous make sure you use software that doesn't have to pay to get because then your bank and everything will see that unless you use bitcoin and cyberghostvpn is a good VPN to use since they accept bitcoin as a currency.
  3. That was my general assumption but I wasn't sure since I haven't used it but this makes things allot clearer and I am glad you could help me .
  4. Introduction: I am new to Hak5 and I have watched a couple few episode's it is very interesting and I love them! Q: What can https://www.kali.org/ do as a operating system and is there limitation's to using software? ------------------------------------------------------------------------------------------------------------------------------------------------------------- I have a 2TB hard drive free I thought I might install it as my first penetrating operating system. What I have heard it's a operating system based on penetrating tool's but I also do video editing and other thing's like that. I was wondering if I can get all of that nice stuff together in this operating system? ------------------------------------------------------------------------------------------------------------------------------------------------------------- * I feel like signing into twitter was a trick not to use twitter lol*
×
×
  • Create New...