Discord Server Red Security Twitter Donation to Red Security Red Security Youtube Channel Red Security Tumblr Profile
Windscribe
Login or Register to Hide ads and Accessing all features on the forum
Welcome, Guest
You have to register before you can post on our site.

Username
  

Password
  





Search Forums

(Advanced Search)

Forum Statistics
» Members: 2,470
» Latest member: JamesNed
» Forum threads: 1,144
» Forum posts: 2,118

Full Statistics

Online Users
There are currently 41 online users.
» 0 Member(s) | 38 Guest(s)
Bing, MJ12, SEMrush

Latest Threads
I are him
Forum: Introductions
Last Post: him
05-17-2021, 02:51 PM
» Replies: 0
» Views: 94
How to browse safely.
Forum: General
Last Post: JamesAlulk
03-22-2021, 03:12 PM
» Replies: 11
» Views: 12,135
How to make Internet conn...
Forum: General
Last Post: JJAskiz
03-21-2021, 07:47 AM
» Replies: 2
» Views: 881
Help
Forum: General
Last Post: Mr.Kurd
03-12-2021, 04:42 PM
» Replies: 1
» Views: 922
Download Privacy Microsof...
Forum: General
Last Post: JJAskiz
01-17-2021, 03:51 PM
» Replies: 0
» Views: 2,669
How to use 3 VPN programs...
Forum: General
Last Post: JJAskiz
12-07-2020, 01:08 PM
» Replies: 0
» Views: 2,521
Good Heavens! 10M Impacte...
Forum: News
Last Post: News
11-21-2020, 04:21 AM
» Replies: 0
» Views: 3,461
Iowa Hospital Alerts 60K ...
Forum: News
Last Post: News
11-20-2020, 02:36 AM
» Replies: 0
» Views: 719
What is a Crypter
Forum: Help
Last Post: Mr.Kurd
11-18-2020, 07:56 AM
» Replies: 1
» Views: 1,181
Microsoft releases Chromi...
Forum: Operating Systems
Last Post: ZDNet Linux
11-17-2020, 05:24 PM
» Replies: 0
» Views: 1,291

 
  I are him
Posted by: him - 05-17-2021, 02:51 PM - Forum: Introductions - No Replies

I are here. My bad. Kinda late on the intro.

Print this item

Brick How to make Internet connection secure with VPN/ TOR programs/ Software (Secure way).
Posted by: JJAskiz - 03-17-2021, 04:00 PM - Forum: General - Replies (2)

Hi everyone,

JJAskiz here again, Last time I showed you's all how to use three VPN programs/ Software all at the same time to secure your Internet connection for normal use, This time, I am going to be showing you's all how to encrypt your Internet connection the most secure way possible that I know. You's will be using two programs/ Software, The third one is optional and highly recommended if you are doing anything illegal, You don't have to use the third one if you are not doing anything illegal but you can if you want to be even more secure online.

What you will need:

1. ProtonVPN program/ Software.

2. OnionFruit program/ Software.

3. TOR Web Browser program/ Software (Optional).

Step one: Download and install the ProtonVPN program/ Software, Run it and then choose the SecureCore option (To run your Internet connection through two VPN Servers at the same time) And pick a double VPN Server to connect to, (Please note: You will need a paid subscription to use the SecureCore VPN Servers which runs your Internet connection through two VPN Servers at the same time on the ProtonVPN program/ Software), (Please also note: Turn the KillSwitch option on to make sure your IP Address does not get leaked if the ProtonVPN program/ Software gets disconnected, (Even though the OnionFruit program/ Software should still stay connected even if the ProtonVPN program/ Software disconnects because it did that for me every time the ProtonVPN program/ Software disconnected).

Step two: Download and run the OnionFruit program/ Software (Which is used to run your Internet connection through the TOR Network) And you are done, Your Internet connection should be super secure since it is getting run through two VPN Servers and through two TOR Network Servers. (Please also note: You can choose what TOR Network Servers you want to connect to but the OnionFruit TOR Network Servers you connect to have to be from the same countries you chose for the ProtonVPN program/ Software VPN Servers you are connected to before, Otherwise the OnionFruit program/ Software might fark up and not connect/ Work, That happened to me). (Another side note: Turn the DNS Settings option and make sure the DNS settings are on and are set on primary unless you need them set on secondary and turn off the Proxy option unless you are using a Proxy which you probably won't need to use anyway. So that way, If the OnionFruit program/ Software farks up, Restart the OnionFruit program/ Software and then go to ''Settings'', Then click ''DNS Settings'' And then click the ''Restart OnionFruit program/ Software'' Option every time the OnionFruit program/ Software farks up and doesn't connect to the TOR Network and it should work afterward, Every time without fail by doing those steps. And if it still doesn't work, You can use the unObfuscated Bridges option and then try the previous steps I mentioned before and it should work again). (One last side note: Your Internet connection speed will depend on which ProtonVPN program/ Software VPN Servers and which OnionFruit program/ Software TOR Network Servers you choose. if you choose a ProtonVPN program/ Software VPN Server and an OnionFruit TOR Network Server further away from the country you live then your Internet connection may be slower but If you choose a ProtonVPN program/ Software VPN Server and an OnionFruit TOR Network Server that is in the country you are from or a country that is nearby then your Internet connection should be Fast/ Faster).

Step three (Optional): And here is step three which is optional, Download and run the TOR Web Browser program/ Software which will run your Internet connection through the TOR Network a second time through another two to three TOR Network Servers a second time.

If any of you's have any questions or problems, Then you's can write them down below in the comment section or write to me on the Red Security Forum website Discord Chat Server.

Smile


I hope enjoyed reading this really easy-To-Do tutorial and learned something new, Enjoy everyone and until next time.

Smile

JJAskiz.



Attached Files Thumbnail(s)
   
Print this item

  Help
Posted by: MiDAS - 02-10-2021, 02:49 AM - Forum: General - Replies (1)

How do i get invited to the discord server trough my app? because it seems that is keeping to use the browser instead of my discord app :S thank you

Print this item

Brick Download Privacy Microsoft Windows 10 OS with no spying Telemetry bull shite in it.
Posted by: JJAskiz - 01-17-2021, 03:51 PM - Forum: General - No Replies

I have looked far and wide on the Clear Net for The Microsoft Windows 10 OS with no spying bull shite Programs/ Software bull shite in it and I have finally found it, Thanks to Linus Tech Tips, Enjoy everyone.

Smile

https://www.youtube.com/watch?v=nwkiU6GG-YU

https://ameliorated.info/

https://git.ameliorated.info/malte/scripts

https://wiki.ameliorated.info/documentation_2004

Extra information.

Default login credentials:
Username: user
Password: malte

Thank you section.

A big thank you Linus Tech Tips for helping us finally find the Microsoft Windows 10 OS with no spying Programs/ Software bull shite in it.

Smile

Please support LinusTechTips by subscribing to their YouTube Channel.

Smile

https://www.youtube.com/channel/UCXuqSBl...-yeJA0Tunw

Also, I big thank you to Ameliorated for editing the Microsoft Windows 10 OS and getting rid of all the spying Programs/ Software bull shite in it, Keep up the great work.

Smile

Print this item

Brick How to use 3 VPN programs/ Software all at the same time on Microsoft Windows 10 OS.
Posted by: JJAskiz - 12-07-2020, 01:08 PM - Forum: General - No Replies

Hi everyone,

I just figured out another way to stay safe online so I decided to post it here on the Red Security Forum for everyone else to do as well to stay safe online too. So this is how to use 3 VPN programs/ Software all at once without them interfering with each other method.

Please note: This method is for normal privacy use, Not for illegal use, I don't think it will be safe to use for illegal use but it will be safe to use for normal privacy use.

Step one, First, Run your main VPN program/ Software first, For example, ExpressVPN, NordVPN, MullvardVPN, ProtonVPN, CyberGhost VPN Program/ Software, Or whatever other main VPN program/ Software that you use.

Then step 2. Run the Psiphon3 VPN program/ Software.

Step 3. Run the Opera Web Browser VPN program/ Software.

And done, You are now running 3 VPN programs/ Software all at the same time. (The Opera Web Browser VPN Program/ Software is optional, You can just use two VPN programs/ Software if you want but that is up to you).

Please note: This was only tested on the Microsoft Windows 10 Pro OS, I am not sure if it will work on Apple MAC OS or on the Linux Distros/ OS since the Psiphon3 program/ Software only works on Microsoft Windows 10 OS (For now). You can try doing this on the Linux Distros/ OS too with another VPN program/ Software similar to the Psiphon3 VPN program/ Software and see if it works or not, Then you can come back here and let us know.

Please also note: The Psiphon3 VPN program/ Software and the Opera Web Browser VPN program/ Software may log IP Addresses so never use them alone without activating your main VPN program/ Software that logs no IP Addresses, Information and etc... First, So you are completely safe online.

And One last side note: Your Internet connection speed will depend on which VPN program/ Software VPN Server you choose, If you choose a VPN program/ Software VPN Server that is far away from the country you live in then your Internet connection may be slow/ Slower but If you choose a VPN program/ Software VPN Server that is in the country you live in or if you choose a VPN program/ Software VPN Server of a country that is near the country you live in then your Internet connection should be Fast/ Faster).

If you need any help then please write to me below in the comments section or chat with me on the Red Security Forum website Discord Chat Server.

Smile

Enjoy,

Smile

JJAskiz.



Attached Files Thumbnail(s)
   
Print this item

Star Good Heavens! 10M Impacted in Pray.com Data Exposure
Posted by: News - 11-21-2020, 04:21 AM - Forum: News - No Replies

Good Heavens! 10M Impacted in Pray.com Data Exposure

The information exposed in a public cloud bucket included PII, church-donation information, photos and users' contact lists.


https://threatpost.com/10m-impacted-pray...ure/161459

Print this item

Star Iowa Hospital Alerts 60K Individuals Affected by June Data Breach
Posted by: News - 11-20-2020, 02:36 AM - Forum: News - No Replies

Iowa Hospital Alerts 60K Individuals Affected by June Data Breach

The data breach began with a compromised employee email account.


https://www.darkreading.com/attacks-brea...id/1339497

Print this item

Brick Microsoft releases Chromium-based Edge preview for Linux
Posted by: ZDNet Linux - 11-17-2020, 05:24 PM - Forum: Operating Systems - No Replies

Microsoft releases Chromium-based Edge preview for Linux

Microsoft is releasing its promised first preview of its new Edge browser for Linux. Here's how to kick the tires.


https://www.zdnet.com/article/microsoft-...RSSbaffb68

Print this item

  What is a Crypter
Posted by: RipSky - 11-16-2020, 10:48 AM - Forum: Help - Replies (1)

What is a crypter?
A Crypter is a software used to hide our viruses, keyloggers or any RAT tool
from antiviruses so that they are not detected and deleted by antiviruses.
Thus, a crypter is a program that allows users to crypt the source code of their program.
Generally, antivirus work by splitting source code of application and then search for
certain string within source code. If antivirus detects any certain malicious strings,
it either stops the scan or deletes the file as virus from system.
Thus a crypter basically makes an infected file FUD or UD by encrypting it.

What does UD and FUD mean?
UD means undetectable, so only a few antivirus programs detect it.
FUD is acronym for Fully UnDetectable, so no antivirus detect it. I reccomend to scan all the
files you crypt on  .Also make sure you check the box
"Do not distribute sample"

Also as a headsup please DO NOT scan your crypted servers on "Virus Total" as they
send over all the infected files to the antivirus companies,thus spelling doom for the
"FUDness" of your crypter.

What does a crypter really do?
A Crypter simply assigns hidden values to each individual code within source code. Thus,
the source code becomes hidden. Hence, our sent crypted trojan and virus bypass antivirus
detection and our purpose of hacking them is fulfilled without any AV (Anti Virus) hindrance.
Not only does this crypter hide source code, it will unpack the encryption once the program is
executed.

How does a crypter really work?
As some of you must be wondering,how does a crypter do the wonderful job of hiding your
infected servers,away from the preying eyes of the antiviruses?
Well, the basic working of a crypter is explained below.

The Crypter takes the original binary file of you exe and applies many encryptions on it
and stores on the end of file(EOF).So a new crypted executable file is created.


The new exe is not detected by antiviruses because its code is scrambled by the crypter.
When executed the new .exe file decrypts the binary file into small data small pieces
at a time and injects them into another already existing process or a new empty one,
OR it drops the code into multiple chunks in alternative data streams(not scanned by most a/v)
then executes it as a .txt or .mp3 file.

Can I hide my crypted files in another program?
The simple answer to this is yes.For this we can make the use of file binders.Some crypters come
inbuilt with binders,some are not,but we can easily use a binder program to meet our purpose.
A file binder is very self explanatory.It binds,or puts two files together as one,hence when one
opens this "binded" file,two files will execute at once. A binder makes a server look even more stealthy,
than just a simply crypted file.

What are the parts of a crypter?
Generally a crypter has two parts

°A client,
°A stub.

The client is the interface where we may upload our file and use the options it brings,
according to the programmer that made the crypter and crypt our files.

The stub is an executable file(.exe) or a. Dll some times.
This file is used as a filter for files that are uploaded to the client crypter

What are the types of crypters?
Well crypters can be broadly classified into the following types:
Types of Crypter

° External Stub
° Internal Stub
° Runtime
° Scantime

External Stub : Well most of you have downloaded a public crypter by now and when you open the
folder you have seen 2 things:

1.Client.exe and 2.Stub.exe

These type of crypters are called External Crypter in which the functionality of the crypter pretty
much depends on the external stub.
You delete the stub and the crypter is useless.

Internal Stub : The crypters that contain only Client.exe fall under this category.
In this the stub is coded within the crypter.

Print this item

Star How to address inefficiencies of using multiple cybersecurity systems
Posted by: News - 11-16-2020, 12:46 AM - Forum: News - No Replies

How to address inefficiencies of using multiple cybersecurity systems

Like us on Facebook @ /HackRead


https://www.hackread.com/address-ineffic...ty-systems

Print this item