• Visit Rebornbuddy
  • Visit Panda Profiles
  • Visit LLamamMagic
  • [Guide] How to not get hacked

    Discussion in 'Ban Section - Ban Reports' started by mspazz, Jan 16, 2011.

    1. vampirictorch

      vampirictorch New Member

      Joined:
      Sep 22, 2011
      Messages:
      137
      Likes Received:
      1
      Trophy Points:
      0
      also a good site to scan software/sites with is www.virustotal.com you can scan websites for bad data/viruses with 40ish anti-viruses, using that site, as well as downloaded content but sadly some lesser anti-viruses and even good ones "AVG" can detect what is called "False" positive or they can even not detect any virus which is called "FUD" Fully undetectable virus, but those only last a week after being released then they get detected/updated to the antiviruses typically, but normally no longer then a month, that can help cut down some too to use that site. limit i beleive is 20mb to upload/scan other sites out there, i just like this one the most because if it does find viruses, the info is sent to all the antiviruses they provide.
       
    2. MonstaR

      MonstaR Banned

      Joined:
      Jul 28, 2012
      Messages:
      10
      Likes Received:
      0
      Trophy Points:
      0
      You may want to add this to the list:

      - Never run java from an unknown website (eg. wowprivateserveronweb.com)

      Usually these website are a JDB (aka a Java Drive-By), these are usually FUD crypted (bypass your AV) and as soon as you run java, it downloads and executes a RAT ( Remote Administration Tool ) or a keylogger. Personally I would rather have a keylogger than a RAT, a RAT can do some damage. Run anything from your pc, delete things, view your webcam, view your desktop, and it comes with a built in keylogger.

      Usually once you have one, they're is no way of getting rid of it unless your format your pc, or look into whitehat help on certain websites, of which I won't mention.

      Another thing you should add is:

      - Never click the "remember me" button or "save password".

      These days, stealers are getting more common.

      What is a stealer you may ask?

      A stealer is something that can steal your cookies and send them to the hacker via the following ways :

      - Php script
      - FTP (File Transfer Protocol)
      - Email.

      This is a simple yet effective way of gaining your password. If you suspect you have a stealer, delete all your cookies and boot in safe mode with networking. Usually a stealer cannot be crypted, unless its iStealer. Next what you need to do is download MBAM (MalwareBytez) and run a scan on your pc (Full scan isnt usually needed, but it is recommended.) If the stealer has been found, your fine. If not, format will be suitable.

      Here is a program which will get you some time to do what you need to do if you are guaranteed infected.

      -TrueCrypt <--- What is this?

      TrueCrypt encrypts all the text into a md5 hash string. It is commonly used by serious black-hatters that are involved with carding (Credit card fraud), however, if it can encrypt their text, it can also be a use to you. Encrypting your text using truecrypt makes it so the hacker cannot steal your information using a keylogger. This will not make you bulletproof, though, so don't rely on it too much.

      Well, theres a few things to add to your tutorial, hope you like it :)
       

    Share This Page