In this video, I answer the comments for “How To Make A Rogue Identity”, which you can find here:
https://www.youtube.com/watch?v=vY5vKtPifpA
Links used in this video:
In this video, I answer the comments for “How To Make A Rogue Identity”, which you can find here:
https://www.youtube.com/watch?v=vY5vKtPifpA
Links used in this video:
[tabby title=”Overview”]
This video shows you how to keep your identity secret online while making a fake identity to take it’s place. Below are all the links used in this video.
[tabby title=”Steps”]
PROXIES AND VPN
How To Hide Your IP Address – http://www.youtube.com/watch?v=FBpfrg3z0TI
Chrome Proxy Plugin – https://chrome.google.com/webstore/detail/proxy-switchy/caehdcpeofiiigpdhbabniblemipncjj
Foxy Proxy – https://addons.mozilla.org/en-US/firefox/addon/foxyproxy-standard/
CyberGhost – http://cyberghostvpn.com/
Make Your Own VPN – http://www.youtube.com/watch?v=bpkRWvPWiOY
Paid VPN Service – https://www.witopia.net/
HIDE YOUR BROWSING HISTORY
Prevent Being Tracked Online – http://www.youtube.com/watch?v=nJ045WSs7gw
Chrome Plugin (Do Not Track Plus) – https://www.abine.com/dntdetail.php
Plugin for All Browsers (Ghostery) – http://www.ghostery.com/
Tor Browser – https://www.torproject.org/
SRWare Iron – http://www.srware.net/software_srware_iron.php
GENERATE A FAKE IDENTITY
FakeNameGenerator – http://www.fakenamegenerator.com/
DataFakeGenerator – http://www.datafakegenerator.com/
DISPOSABLE EMAIL ADDRESSES
10MinuteMail – http://10minutemail.com/
GuerrillaMail – https://www.guerrillamail.com/
MailNesia – http://mailnesia.com/
Last Weeks Tutorial (How To Find Free WiFi) – http://www.youtube.com/watch?v=ASdzY7Gy0DQ
Last Weeks Comments Show – http://www.youtube.com/watch?v=FxyecJ3Dugk
[tabby title=”Links”]
Follow Tinkernut!
Google + http://goo.gl/1dmi1
Facebook http://www.facebook.com/tinkernut
Twitter http://www.twitter.com/tinkernut
[tabbyending]
wkjlue#vnrro#huxwxi#uxr\
The code below is for the encrypting program:
‘SIMPLE VB ENCRYPTION PROGRAM
‘Create a dialogue box that asks for the text to encode
set x = WScript.CreateObject(“WScript.Shell”)
mySecret = inputbox(“Enter text to be encoded”)
‘Reverse the submitted text
mySecret = StrReverse(mySecret)
‘Open up an instance of Notepad to print the results after waiting for 1 second
x.Run “%windir%\notepad”
wscript.sleep 1000
x.sendkeys encode(mySecret)’This function encodes the text by advancing each character 3 letters
function encode(s)
For i = 1 To Len(s)
newtxt = Mid(s, i, 1)
newtxt = Chr(Asc(newtxt)+3)
coded = coded & newtxt
Next
encode = coded
End Function
‘SIMPLE VB DECRYPTION PROGRAM
‘Create a dialogue box that asks for the text to encode
set x = WScript.CreateObject(“WScript.Shell”)
mySecret = inputbox(“Enter text to be encoded”)
‘Reverse the submitted text
mySecret = StrReverse(mySecret)
‘Open up an instance of Notepad to print the results after waiting for 1 second
x.Run “%windir%\notepad”
wscript.sleep 1000
x.sendkeys encode(mySecret)’This function encodes the text by advancing each character 3 letters
function encode(s)
For i = 1 To Len(s)
newtxt = Mid(s, i, 1)
newtxt = Chr(Asc(newtxt)-3)
coded = coded & newtxt
Next
encode = coded
End Function
–Applescript encryption programset words_to_encrypt to “I want to encrypt sentences. Not just words!”
set multiplier to 5
set charList to {“a”, “b”, “c”, “d”, “e”, “f”, “g”, “h”, “i”, “j”, “k”, “l”, “m”, “n”, “o”, “p”, “q”, “r”, “s”, “t”, “u”, “v”, “w”, “x”, “y”, “z”,”A”, “B”, “C”, “D”, “E”, “F”, “G”, “H”, “I”, “J”, “K”, “L”, “M”, “N”, “O”, “P”, “Q”, “R”, “S”, “T”, “U”, “V”, “W”, “X”, “Y”, “Z”, “1”, “2”, “3”,”4″, “5”, “6”, “7”, “8”, “9”, “0”, ” “, “~”, “!”, “@”, “#”, “$”, “%”, “^”, “&”, “*”, “(“, “)”, “_”, “+”, “{“, “}”, “|”, “:”, “\””, “<“, “>”, “?”, “`”, “-“,”=”, “[“, “]”, “\\”, “;”, “‘”, “,”, “.”, “/”, “a”}considering case
–get a list of numbers for the words corresponding to the item numbers of the characters in charList
set p_letter_list to text items of words_to_encrypt
set p_num_list to {}
repeat with i from 1 to (count of p_letter_list)
set this_letter to item i of p_letter_list
repeat with j from 1 to count of charList
set this_char to item j of charList
if this_letter is this_char then
set end of p_num_list to j
exit repeat
end if
end repeat
end repeat
–encrypt the numbers
set modulus to count of charList
set c_num_list to {}
repeat with i from 1 to (count of p_num_list)
set p_num to item i of p_num_list
set c_num to ((p_num * multiplier) mod modulus)
set end of c_num_list to c_num
end repeat
–get the characters for the encrypted numbers corresponding to the characters in charList
set c_letter_list to {}
repeat with i from 1 to (count of c_num_list)
set this_item to item i of c_num_list
set end of c_letter_list to (item this_item of charList)
end repeat
–coerce the encrypted characters into a string
set c_string to c_letter_list as string
end considering
Google wants to know everything about you, but there are some ways you can fight back and keep your privacy private.
Links:
http://www.google.com/dashboard
http://www.google.com/privacy.html
This video will show you how to make a security cam by making a webcam remotely accessible from the internet.