Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Search the Community

Showing results for tags 'privacy'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

  1. [Hidden Content] Privacy Tools Blacklist And Hot Tips Privacy Operation Systems Alternative Frontends Privacy Based Search Engines Leak Tools List Browsers For Your Privacy Firefox Addons Free Email Services One Time Emails Aecentralized And Social Networks Encrypted Online Communications Social Media Identity Privacy Why Privacy Matter Metadata Cleaners Youtube Alternatives News Readers And Aggregators Shared Logins Best Privacy Short Urls Services Guides Disk Encrypt Tools Privacy Sharing Texts List Files Sharing Anti-Privacy Tools. OSINT Tools Privacy Groups, Chats And Forums Mobile Privacy Alternatives Privacy Tools Deep Fakes Software Other Lists Backup Tools Free Email Forwarding Developer Privacy Free Privacy Email Clients Jabber Clients VPN Free Jabber Servers Other
  2. I have the following question - is the following true: -If we enable the VPN plugin in the Opera browser, we can use various services, e.g. bypass a simple company firewall that blocks our access to FB or YT. We then go out into the world with public IP addresses other than our native address, and this is obvious. But the question arises - can connecting via this VPN be understood in such a way that we first enter a network in which there are many other VPN users like us, who create a kind of local network from which we only go out to the world through the gateway of this network ? The merits of the matter are then whether we can be attacked by other users of this VPN network? Does a VPN in the Opera browser pose this type of threat? After enabling this VPN, one user had the IP addresses of the DNS servers changed in the TCP/IP connection properties of the network card. I wonder if and how it was possible.
  3. Tails OS is a live operating system that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity and helps you to: use the Internet anonymously and circumvent censorship; all connections to the Internet are forced to go through the Tor network; leave no trace on the computer you are using unless you ask it explicitly; use state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging. [hide][Hidden Content]]
  4. PC Privacy Shield 2020 – is designed to protect user privacy. PC Privacy Shield is used to protect information from phishing, clears all or certain information of your choice, and also allows you to embed false / fictitious information in history files. PC Privacy Shield deletes credentials and alerts in real time when they are logged by browsers. PC Privacy Shield cleans instant messaging / chat history, keeping your computer clean of any previous chat entries. PC Privacy Shield users can select specific categories for scanning and cleaning, or simply enable full automation. Features • Leave no traces of your private online activity on the Web and your computer or laptop. • Prevent phishing and identity theft by stopping hackers, scammers and fraudsters dead in their tracks • Sleep better at night knowing that your PC is safer from intruders and unwelcome visitors • Automatically delete cookies that advertisers place on your PC to learn about your habits and behaviours. • It lets you easily scan your PC or laptop for any potential threats. • Conveniently lets you to selectively delete any record of visited websites that remained stored on your browser history. • Easily remove tracking records that include your personal browsing information. [Hidden Content] [hide][Hidden Content]]
  5. Tails OS is a live operating system that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity and helps you to: use the Internet anonymously and circumvent censorship; all connections to the Internet are forced to go through the Tor network; leave no trace on the computer you are using unless you ask it explicitly; use state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging. New features Tails now uses the zram Linux kernel module to extend the capacity of the computer's memory. You can run more applications or use your session for longer periods of time. Tails will handle more load before freezing and become slow more progressively. You can record screencasts using the integrated feature of GNOME. We configured this feature to allow unlimited screencasts. See screenshot and screencast. Changes and updates Update Tor Browser to 12.0.4. Update Thunderbird to 102.9.0. Redesigned the unlocking section of the Welcome Screen. [hide][Hidden Content]]
  6. Whoami is a user-friendly privacy and anonymity tool designed to provide a high level of security through its simple interface and easy-to-use features. The tool uses over 9 modules to ensure maximum anonymity and also comes equipped with a Bug fixer module that is currently under development to solve any potential issues. While the tool offers comprehensive security measures, it is important to note that there is no such thing as 100% security on the internet. To use Whoami, simply complete the setup and then launch the application by searching for "Kali Whoami" in the search menu or by typing "sudo kali-whoami --help" in a terminal. For more detailed information about the tool and its modules, please refer to the website. [Hidden Content] Happy Hunting!
  7. Tails OS is a live operating system that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity and helps you to: use the Internet anonymously and circumvent censorship; all connections to the Internet are forced to go through the Tor network; leave no trace on the computer you are using unless you ask it explicitly; use state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging. Tails OS 5.10 has been released. Changelog Update Tor Browser to 12.0.3. Ask for confirmation when starting without unlocking the Persistent Storage. Do you really want to start Tails without unlocking your Persistent Storage? Update our documentation on the Persistent Storage. Fixed problems Avoid crashing when the download of an upgrade is stopped and resumed. (#18435) Solve a possible privilege escalation through a symlink attack. (#19424) Dennis Brinkrolf discovered that an adversary who could already run arbitrary code as the amnesia user in Tails 5.9, could have escalated their privileges to reading arbitrary files on the system. It might have been possible to use this as part of an exploit chain to gain root privileges. Persistent Storage Avoid opening the Persistent Storage settings each time after login. (#19410) Solve some cases of failure to activate the Persistent Storage by bumping the unlocking timeout to 120 seconds. (#19432) [hide][Hidden Content]]
  8. FREE Alternative Tools For Your Online Privacy. Search Engine Duck Duck Go Web Browser Brave Firefox Messenger Signal Telegram Operating System Any Linux based system Web Site Analytics Plausible Email ProtonMail Password Manager Bitwarden
  9. Protects your privacy on your System & Internet Hide your Pictures, Videos, Documents Lock Files and Folders with Password Create a personal space for you Securely Wipe Sensitive files or Entire Hard Drive Erase Surfing and Operation History What Does Gilisoft Privacy Protector Do? If you share a PC, there is no reason to make it easy for someone else to see your senstive personal files, there is no reason to make it easy for someone else to know your surfing habits, recent activities, search history, personal identity details. Now it is the time to stand up for your right to privacy, you need install a Privacy software can protect you. GiliSoft Privacy Protector is an all-in-one privacy suite that protects your privacy by hiding or locking your files, protects your privacy by cleaning up all your Internet history tracks and past computer activities, protects your privacy by securely shreding files & folders. GiliSoft Privacy Protector effectively prevents most illegal operations performed by hackers or malicious software such as viruses, trojans and spyware, that may damage or steal the data from your computer. [Hidden Content] [hide][Hidden Content]]
  10. Description Privacy is one of the big advantages of crypto and Web3. Grant will show you how the cryptography used by Bitcoin and many other privacy coins actually works. At the end of this course, you’ll have an in-depth understanding of stealth addresses, confidential transactions, and the popular privacy coin protocols. Welcome Course Roadmap Keys for Success Intro to Bitcoin Privacy Foundations Bitcoin Basics Bitcoin Explorer Linking UTXOs Anonymity Set and Trust ECDSA Basics HD Wallets The CryptoNote Ecosystem Stealth Addresses Ring Signatures Cryptonote Anonymity Set Pedersen Commitments RingCT The Monero Explorer Monero History Introduction to Zero Knowledge Proofs Zerocoin Zerocash A conversation about Lelantus The Zcash Explorer Zcash and Monero Comparison MimbleWimble 1 OWAS MimbleWimble 2 Excess Values MimbleWimble 3 Cut Through Mimblewimble 4 Time to upload your Certificate on LinkedIn! [hide][Hidden Content]]
  11. Cyber Privacy Suite – is a package of tools to protect against data theft, termination web tracking and blocking of web cameras and microphones from external abuse. The solution allows you to categorically block all external and internal attempts to access the webcam and microphone, delete insecure confidential and personal data, as well as registered viewing habits and credentials, in advance eliminating the possibility of theft and abuse of this information. Features • Prevents Others From Fingerprinting Your Identity • Keep You and Your Family Safe • Enjoy Online Privacy Again • Encrypts Login Credentials • Identifies What Personal Information Is Exposed • Defends Wencams And Microphones From Hacking Attempts • Guards Against Dangerous Websites • Secures Your Connections Through VPN Gateways • Blocks Unwanted Tracking Cookies • Thwarts Annoying Ads • Detects Sensitive Documents On Your Device • Protects Financial And Medical Documents • Safeguards Your Privacy In Real-time • Scans The Dark Web For Your Information [Hidden Content] [hide][Hidden Content]]
  12. WinZip Privacy Protector Mantenga su información personal y actividades de internet privadas. Protégete de los ciberdelincuentes Borra tus pistas en línea Defiende tu información personal y financiera Privacy Protector escanea toda tu PC en busca de rastros ocultos de tu información privada y actividades personales en línea que pueden exponerse a los piratas informáticos. Privacy Protector lo ayudará a eliminar estos rastros de manera segura para que pueda mantener su privacidad segura. [Hidden Content] [hide][Hidden Content]]
  13. PC Privacy Shield Super charged privacy & identity security suite! Overview PC Privacy Shield will wipe out your online digital footprint, including your browsing history and tracking records. PC Privacy Shield will also provide you with an advanced file encryption mechanism to protect your personal and sensitive files! PC Privacy Shield is used to both defend one’s information from phishing AND to cover his/her tracks when needed. PC Privacy Shield will let you encrypt or delete login credentials and alert in real-time when those are being logged by the browsers. PC Privacy Shield includes an easy to use ad blocker that blocks annoying and sometimes abusive banner advertisements! [Hidden Content] [hide][Hidden Content]]
  14. WPD (Windows Privacy Dashboard) – Whether you’re looking to protect your privacy by disabling some Windows services, take control over the firewall or uninstall unwanted applications, you can turn to WPD (Windows Privacy Dashboard). Features Disable Windows features and make various tweaks • Wrapped in a clean and attractive interface, this program provides you with intuitive and practical options for tweaking your computer, whether you’re running Windows 7 or 10. It doesn’t require installation so you can copy the downloaded package to a USB flash drive to directly launch it on any PC without setup. Administrative rights are required, though. • The main app menu is brought up to the screen at startup, allowing you to access the privacy-related features, firewall settings, apps to uninstall, or other tweaks to make. Configure privacy, firewall and app settings • When it comes to privacy matters, you can deactivate the steps recorder, advertising ID, search companion, telemetry, Windows Error Reporting, handwriting auto learning, OneDrive (for file storage), and others. Some of the options displayed here might seem confusing. However, you don’t have to look up definitions on the web since WPD shows descriptions in tooltips next to each option. Otherwise, you can disable everything listed here with the click of a button. • As far as firewall settings are concerned, Windows Privacy Dashboard can be instructed to block Windows telemetry, third-party apps and Windows Updates from establishing Internet connections. If you change your mind and wish to reset these options to default, you can simply delete the newly created rules. Uninstall unwanted apps and perform tweaks • Only Modern UI apps can be uninstalled with the aid of this utility, whether they came bundled with the operating system or got installed from other sources. Lastly, the tweaker gives you the possibility to hide sync provider notifications, allow the swap file to be cleared during restart, and prevent apps from using your camera, microphone and other devices. • Taking everything into consideration, WPD turns out to be a straightforward and useful system tweaker. It enabled and disabled system settings without any issues on Windows 10 in our tests. 1.5.2042 RC 1 10-17-2021 Added Support for Windows 11. New privacy settings. New settings for blocking Windows updates. Dark theme. Updated The user interface has been significantly updated. Build-in blocking rules. Localization. Changed The localization file now has a .json extension. Fixed Possible fix for "helper" crash. Known issues Localization: some new strings are not translated. [hide][Hidden Content]]
  15. ghacks user.js The ghacks user.js is a template that aims to provide as much privacy and enhanced security as possible and to reduce tracking and fingerprinting as much as possible – while minimizing any loss of functionality and breakage (but it will happen). A user.js which resides in the root directory of a profile is used to set preferences for that profile when Firefox starts. Preferences are settings that control Firefox’s behavior. Some can be set from the Options interface and all can be found in about:config, except for what is called hidden preferences which will only show when they are set by the user. That’s a bit to digest, so here is a pretty picture showing a preference with the same value as status user set/modified and default. In about:config’s search box, you can use wildcards (e.g network*policy) to save time typing, and it is case insensitive. [hide][Hidden Content]]
  16. Is Your Digital Privacy Important to You? What you do online and on your computer should be your own business. Yet, in most cases, your personal information & web habits are being tracked constantly by 3rd parties who want to monetize your online behaviors or steal your identity. It takes powerful software to stave off malicious cyber attacks all day, every day. That’s where we come in. Keeping You and Your Family Safe In our increasingly digital world, anyone is an easy target for a cyber attack. We put so much of our personal information online today, making it harder to guard against malicious hacking attempts. Our comprehensive software keeps you and your family safe at all times when using your devices or surfing the web. Cyber Privacy Suite fends off harmful privacy threats and proactively identifies where your information is vulnerable or exposed. Enjoy Online Privacy Again We protect your webcams, microphones, and essential documents from prying eyes and prevent your most valuable information from getting into the wrong hands. With Cyber Security Suite, you can enjoy the freedom of online privacy again. [Hidden Content] [hide][Hidden Content]]
  17. Cyber Privacy Suite – is a package of tools to protect against data theft, termination web tracking and blocking of web cameras and microphones from external abuse. The solution allows you to categorically block all external and internal attempts to access the webcam and microphone, delete insecure confidential and personal data, as well as registered viewing habits and credentials, in advance eliminating the possibility of theft and abuse of this information. Features • Prevents Others From Fingerprinting Your Identity • Keep You and Your Family Safe • Enjoy Online Privacy Again • Encrypts Login Credentials • Identifies What Personal Information Is Exposed • Defends Wencams And Microphones From Hacking Attempts • Guards Against Dangerous Websites • Secures Your Connections Through VPN Gateways • Blocks Unwanted Tracking Cookies • Thwarts Annoying Ads • Detects Sensitive Documents On Your Device • Protects Financial And Medical Documents • Safeguards Your Privacy In Real-time • Scans The Dark Web For Your Information [Hidden Content] [hide][Hidden Content]]
  18. About The Project The purpose of the Whoami tool makes you as anonymous as possible on Kali linux. It is an user friendly with its ease of use and simple interface. It follows two different paths to ensure the highest possible level of anonymity. Finally, don't forget that there is never a hundred percent security on the internet! Features Anti mitm Log killer IP changer Dns changer Mac changer Anti cold boot Timezone changer Hostname changer Browser anonymization [hide][Hidden Content]]
  19. PC Privacy Shield Super charged privacy & identity security suite! Overview PC Privacy Shield will wipe out your online digital footprint, including your browsing history and tracking records. PC Privacy Shield will also provide you with an advanced file encryption mechanism to protect your personal and sensitive files! PC Privacy Shield is used to both defend one’s information from phishing AND to cover his/her tracks when needed. PC Privacy Shield will let you encrypt or delete login credentials and alert in real-time when those are being logged by the browsers. PC Privacy Shield includes an easy to use ad blocker that blocks annoying and sometimes abusive banner advertisements! [Hidden Content] [hide][Hidden Content]]
  20. W10Privacy - for what? The by default highly questionable set options concerning privacy and data protection in Windows 10 brought me to the idea to develop this program. Microsoft generously enables everybody to change the concerning settings, but hides them in countless menus, where a normal user does not want to search for! The program should therefore be a help, to display the available settings relatively clearly and to set the desired options if necessary. The primary focus is on settings for Windows 10 and its apps (for example the new browser "Edge"). The program will be expanded gradually, if possible and available, with the corresponding Windows 8.1 features in the future. W10Privacy is certainly no programming masterpiece, but it fulfills my intended purpose. The software is still in an early development phase, requests are welcome and may be included in future releases! 3.7.0.2 (12/20/2020) - "Microsoft Edge" uninstallation optimized: In the initial 20H2 original state, partially no uninstallation key could be determined. - Improvement of the German language requirements: spelling and grammar improved, spelling in the event of unnecessary separation, spellings standardized, line breaks in tool tips improved! Many thanks to Johnny for this work! 👍 - Completion / improvement of the Italian texts! Thanks again to NAMP! 😊 [hide][Hidden Content]]
  21. WinZip Privacy Protector Keep your personal information and internet activities private. Protect yourself from cyber criminals Erase your online tracks Defend your personal and financial information Privacy Protector scans your entire PC looking for hidden traces of your private information and personal online activities that can be exposed to hackers. Privacy Protector will help you safely remove these traces so you can keep your privacy secure. [Hidden Content] [hide][Hidden Content]]
  22. A small but powerful portable tool working via Windows API. WPD is the most convenient and proper way to customize privacy related settings in Windows. Features Privacy management Customize Group Policy, Services, Tasks and other settings responsible for data collection and transmission. IP Blocker Block IP addresses of telemetry using rules from @crazy-max repository. Appx uninstaller Easy remove pre-installed Microsoft Store apps or any other appx. Portable, freeware, no ads, command line arguments support. Supported OS Windows 10 Enterprise 2009, 2004, 1909, 1903, 1809, 1803, 1709, 1703, 1607 Windows 10 Enterprise LTSC 2019, 2016, 2015 Windows 10 Education 2009, 2004, 1909, 1903, 1809, 1803, 1709, 1703 Windows 10 Pro 2009, 2004, 1909, 1903, 1809, 1803, 1709, 1703, 1607 Windows 10 Home 2009, 2004, 1909, 1903, 1809, 1803, 1709, 1703 Windows Server Standard 2016, 2019 Windows 8-8.1 Windows 7 Requirements .NET Framework 4.5+ 1.4.1722 12-01-2020 Stable #Added Support for October 2020 Update (2009). Ability to add your own switches (Experimental Settings). #Updated Build-in blocking rules. #Fixed Error "Access to the registry key is denied" [hide][Hidden Content]]
  23. Debotnet is a free and portable tool for controlling Windows 10's many privacy-related settings and keep your personal data private. The Windows 10 default privacy settings leave a lot to be desired when it comes to protecting you and your private information. Whenever I set up a new computer or update a current setup for my family or job, I always carefully go through the privacy settings for each install, making sure to lock it down to make it as private as possible. Windows 10 has raised several concerns about privacy due to the fact that it has a lot of telemetry and online features, which send your data (sensitive and not) to Microsoft and can't be disabled. Most of it seems pretty legit stuff when telemetry is set to basic. If you don't trust them, Debotnet can help you to prevent Windows 10 from sending your data to Microsoft. Intro of Debotnet The most important features at a glance Disable telemetry and online features, which send your data (sensitive and not) to Microsoft Choose which unwanted functions you wish to disable Uninstall Windows 10’s Built-in Apps Debotnet will show you what it's doing. You have full control, because the executing code can be viewed in a simple text editor Debug mode. E.g. the Test mode lets you see which values are twisted in registry or commands executed Simple scripting engine for adding custom privacy rules Scripts updated on GitHub Support for Ninite service, which allows you to download and install more than 70 popular apps for Windows. Download Windows 10 ISO files using Microsoft Media Creation Tool with command line switches and also through MCT Wrapper Integration of custom PowerShell debloating scrips, e.g W4RH4WK / Debloat-Windows-10, Sycnex / Windows10Debloater etc. Download deprecated Windows apps, e.g. Classic Calculator Modern and familiar UI, with theme support Small footprint. No installation required (Portable) Open Source (GPL-3.0) [Hidden Content] [hide][Hidden Content]]
  24. A small but powerful portable tool working via Windows API. WPD is the most convenient and proper way to customize privacy related settings in Windows. Features Privacy management Customize Group Policy, Services, Tasks and other settings responsible for data collection and transmission. IP Blocker Block IP addresses of telemetry using rules from @crazy-max repository. Appx uninstaller Easy remove pre-installed Microsoft Store apps or any other appx. Supported OS Windows 10 Enterprise 2004, 1909, 1903, 1809, 1803, 1709, 1703, 1607 Windows 10 Enterprise LTSC 2019, 2016, 2015 Windows 10 Education 2004, 1909, 1903, 1809, 1803, 1709, 1703 Windows 10 Pro 2004, 1909, 1903, 1809, 1803, 1709, 1703, 1607 Windows 10 Home 2004, 1909, 1903, 1809, 1803, 1709, 1703 Windows Server Standard 2016, 2019 Windows 8-8.1 Windows 7 Requirements .NET Framework 4.5+ 1.3.1532 05-25-2020 Stable #Added Support for May 2020 Update (2004). New privacy settings. New arguments. Ukrainian localization. #Updated Build-in blocking rules. Localization. #Changed Minor UI changes. #Fixed WebRequest security protocol. Bug fixes and general improvements. [HIDE][Hidden Content]]
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.