• Comments Show: How To Make A Rogue Identity


    In this video, I answer the comments for “How To Make A Rogue Identity”, which you can find here:
    https://www.youtube.com/watch?v=vY5vKtPifpA

    Links used in this video:

    FakeInbox
    MaskMe
    Boun.cr
    Disconnectme
    Mailinator

  • How to Make A Rogue Identity


    [tabby title=”Overview”]
    This video shows you how to keep your identity secret online while making a fake identity to take it’s place. Below are all the links used in this video.


    [tabby title=”Steps”]
    PROXIES AND VPN

    How To Hide Your IP Address – http://www.youtube.com/watch?v=FBpfrg3z0TI
    Chrome Proxy Plugin – https://chrome.google.com/webstore/detail/proxy-switchy/caehdcpeofiiigpdhbabniblemipncjj
    Foxy Proxy – https://addons.mozilla.org/en-US/firefox/addon/foxyproxy-standard/
    CyberGhost – http://cyberghostvpn.com/
    Make Your Own VPN – http://www.youtube.com/watch?v=bpkRWvPWiOY
    Paid VPN Service – https://www.witopia.net/

    HIDE YOUR BROWSING HISTORY

    Prevent Being Tracked Online – http://www.youtube.com/watch?v=nJ045WSs7gw
    Chrome Plugin (Do Not Track Plus) – https://www.abine.com/dntdetail.php
    Plugin for All Browsers (Ghostery) – http://www.ghostery.com/
    Tor Browser – https://www.torproject.org/
    SRWare Iron – http://www.srware.net/software_srware_iron.php

    GENERATE A FAKE IDENTITY

    FakeNameGenerator – http://www.fakenamegenerator.com/
    DataFakeGenerator – http://www.datafakegenerator.com/

    DISPOSABLE EMAIL ADDRESSES

    10MinuteMail – http://10minutemail.com/
    GuerrillaMail – https://www.guerrillamail.com/
    MailNesia – http://mailnesia.com/

    Last Weeks Tutorial (How To Find Free WiFi) – http://www.youtube.com/watch?v=ASdzY7Gy0DQ
    Last Weeks Comments Show – http://www.youtube.com/watch?v=FxyecJ3Dugk

    [tabby title=”Links”]

    Follow Tinkernut!
    Google + http://goo.gl/1dmi1
    Facebook http://www.facebook.com/tinkernut
    Twitter http://www.twitter.com/tinkernut
    [tabbyending]

     

  • Prevent Being Tracked Online!


    With recent events regarding Edward Snowden and the NSA, it’s hard to tell who’s watching us and what is private. This video will show you some free tools to ensure that you aren’t being tracked.

     

    Follow Tinkernut!

    Google + http://goo.gl/1dmi1

    Facebook http://www.facebook.com/tinkernut

    Twitter http://www.twitter.com/tinkernut

     

     

    Ghostery – http://www.ghostery.com/

    “Do Not Track Me” – https://www.abine.com/dntdetail.php

     

    Disposable E-mail Addresses – http://10minutemail.com/

    Fake Phone Numbers – http://lifehacker.com/5994262/burner-brings-disposable-phone-numbers-to-android-for-private-calls-texts-and-more

     

    Mailvelope – http://www.mailvelope.com/

     

    CyberGhost – http://cyberghostvpn.com/

  • How To Make Your Own Encryption


    ****UPDATE: DOWNLOAD THE PROJECT FILES****

    This video lays out the steps for creating a very simple encryption and decryption program using free tools. The programming language we will be using is VB Script.  See if you can decrypt this text:

    wkjlue#vnrro#huxwxi#uxr\

     

    The code below is for the encrypting program:

    <—–Start copying below this line—–>
    ‘SIMPLE VB ENCRYPTION PROGRAM
    ‘Create a dialogue box that asks for the text to encode
    set x = WScript.CreateObject(“WScript.Shell”)
    mySecret = inputbox(“Enter text to be encoded”)
    ‘Reverse the submitted text
    mySecret = StrReverse(mySecret)
    ‘Open up an instance of Notepad to print the results after waiting for 1 second
    x.Run “%windir%\notepad”
    wscript.sleep 1000
    x.sendkeys encode(mySecret)’This function encodes the text by advancing each character 3 letters
    function encode(s)
    For i = 1 To Len(s)
    newtxt = Mid(s, i, 1)
    newtxt = Chr(Asc(newtxt)+3)
    coded = coded & newtxt
    Next
    encode = coded
    End Function
    <—-Stop copying above this line——>
    <—–Start copying below this line—–>
    ‘SIMPLE VB DECRYPTION PROGRAM
    ‘Create a dialogue box that asks for the text to encode
    set x = WScript.CreateObject(“WScript.Shell”)
    mySecret = inputbox(“Enter text to be encoded”)
    ‘Reverse the submitted text
    mySecret = StrReverse(mySecret)
    ‘Open up an instance of Notepad to print the results after waiting for 1 second
    x.Run “%windir%\notepad”
    wscript.sleep 1000
    x.sendkeys encode(mySecret)’This function encodes the text by advancing each character 3 letters
    function encode(s)
    For i = 1 To Len(s)
    newtxt = Mid(s, i, 1)
    newtxt = Chr(Asc(newtxt)-3)
    coded = coded & newtxt
    Next
    encode = coded
    End Function
    <—-Stop copying above this line——>
    <—–Start copying below this line—–>
    –Applescript encryption program
    set words_to_encrypt to “I want to encrypt sentences. Not just words!”
    set multiplier to 5
    set charList to {“a”, “b”, “c”, “d”, “e”, “f”, “g”, “h”, “i”, “j”, “k”, “l”, “m”, “n”, “o”, “p”, “q”, “r”, “s”, “t”, “u”, “v”, “w”, “x”, “y”, “z”,”A”, “B”, “C”, “D”, “E”, “F”, “G”, “H”, “I”, “J”, “K”, “L”, “M”, “N”, “O”, “P”, “Q”, “R”, “S”, “T”, “U”, “V”, “W”, “X”, “Y”, “Z”, “1”, “2”, “3”,”4″, “5”, “6”, “7”, “8”, “9”, “0”, ” “, “~”, “!”, “@”, “#”, “$”, “%”, “^”, “&”, “*”, “(“, “)”, “_”, “+”, “{“, “}”, “|”, “:”, “\””, “<“, “>”, “?”, “`”, “-“,”=”, “[“, “]”, “\\”, “;”, “‘”, “,”, “.”, “/”, “a”}considering case
    –get a list of numbers for the words corresponding to the item numbers of the characters in charList
    set p_letter_list to text items of words_to_encrypt
    set p_num_list to {}
    repeat with i from 1 to (count of p_letter_list)
    set this_letter to item i of p_letter_list
    repeat with j from 1 to count of charList
    set this_char to item j of charList
    if this_letter is this_char then
    set end of p_num_list to j
    exit repeat
    end if
    end repeat
    end repeat
    –encrypt the numbers
    set modulus to count of charList
    set c_num_list to {}
    repeat with i from 1 to (count of p_num_list)
    set p_num to item i of p_num_list
    set c_num to ((p_num * multiplier) mod modulus)
    set end of c_num_list to c_num
    end repeat
    –get the characters for the encrypted numbers corresponding to the characters in charList
    set c_letter_list to {}
    repeat with i from 1 to (count of c_num_list)
    set this_item to item i of c_num_list
    set end of c_letter_list to (item this_item of charList)
    end repeat
    –coerce the encrypted characters into a string
    set c_string to c_letter_list as string
    end considering
    <—-Stop copying above this line——>
  • HELP!! GOOGLE IS SPYING ON ME!!!


    Google wants to know everything about you, but there are some ways you can fight back and keep your privacy private.

    Links:
    http://www.google.com/dashboard
    http://www.google.com/privacy.html

  • Security Tip: Make A Security Camera


    This video will show you how to make a security cam by making a webcam remotely accessible from the internet.