Jump to content

Mxng22

Members
  • Content Count

    327
  • Joined

  • Last visited

  • Days Won

    1

Mxng22 last won the day on September 30 2020

Mxng22 had the most liked content!

Community Reputation

16 Good

6 Followers

About Mxng22

  • Rank
    Rank #5

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. Full list: 1: 000webhost.com 2: Freehostia.com 3: Jimdo.com 4: FreeHosting.com 5: xtreemhost.com 6: Zymic.com 7: Byethost.com 8: 110MB.com 9: AwardSpace.com 10: 1FreeHosting.com 11: FreeHostingEU.com 12: Uhostfull.com 13: 50Webs.com 14: ZettaHost.com 15: x10hosting.com Everything is as standard - we register, go to the control panel and load our site.
  2. Now any student can slip you an iplogger and steal your IP. With this article, we will protect against such cases. Let's get started: First, follow the path: c: \ windows \ system32 \ drivers \ etc Find the "hosts" file: We copy it to your desktop or to any folder convenient for you. Click RMB -> "Open with": Choose "Notepad" or another text editor of your choice, click "OK": Add these lines to the bottom: 0.0.0.0 ezstat.ru 0.0.0.0 iplogger.org 0.0.0.0 2no.co 0.0.0.0 iplogger.com 0.0.0.0 iplogger.ru 0.0.0.0 yip.su 0.0.0.0 iplogger.co 0.0.0.0 iplogger.info 0.0.0.0 ipgrabber.ru 0.0.0.0 ipgraber.ru 0.0.0.0 iplis.ru 0.0.0.0 02ip.ru We press the key combination "CTRL + S" and close the file. Copy the modified hosts file and paste it along the original path with replacement: c: \ windows \ system32 \ drivers \ etc Reboot the PC. That's all, by these actions we blocked most of the Iploggers' domains and protected ourselves from personal data leakage. Keep track of your data, good luck!
  3. Almost all of them occasionally need to understand a new area, conduct research or quickly find very highly specialized information. I present to your attention 2 search engines that will simplify your surfing and help you find what you need. 1. Fagan Finder (https://www.faganfinder.com/) - The platform contains a huge number of different search resources, divided into groups. Here you will find, for example, search engines only for encyclopedias, only for documents, for articles from magazines or, finally, for presentations. What is collected here may not be found through a regular search engine, because the source of information may not be online, the search may find it not important enough, or may not be published in the form in which the search engine has access to it. 2. Social Search (https://www.social-searcher.com/) - Searches by mentions both in social networks and in search engines. Interestingly, VK is on the list of social networks he's looking for. Usually foreign search engines do not include it. Here you can also set up e-mail notifications about new publications at your request.
  4. The founder of the cryptocurrency hedge fund Virgil Capital, Stephan Qin, pleaded guilty to defrauding investors in the amount of more than $ 90 million. He used the money to lead a luxurious lifestyle. According to a US Department of Justice press release, 24-year-old Australian citizen and founder of cryptocurrency hedge fund Virgil Capital Stefan Qin has appeared in federal court on securities fraud charges. From 2017 to 2020, Qin managed two funds: Virgil Sigma Fund LP from New York and VQR Multistrategy Fund LP from the Cayman Islands. During this time, Qin lied to investors and withdrew $ 90 million from Virgil Sigma Fund to fund his luxury lifestyle. In addition, he lied about the Sigma fund's earnings and the whereabouts of investors' money, and also tried to cover up his fraud by paying Sigma investors money from the VQR fund. In December, the US Securities and Exchange Commission (SEC) accused Qin of defrauding fund investors by using investment proceeds for "personal gain as well as other high-risk investments."
  5. The CEO of Visa spoke about plans for cryptocurrency payments during a teleconference on the company's financial activities for the first quarter of 2021. In his speech, Visa CEO Alfred Kelly said the company is ready to make cryptocurrency payments safer and more widely used by working with the firm's partners. Visa plans to work with wallets and exchanges so that users can buy cryptoassets, he said. In addition, the company intends to provide users with the ability to cash out and make purchases in fiat currency using cryptocurrencies. Kelly also voiced Visa's position on digital assets. At the moment, the company distinguishes two classes of crypto assets: assets like bitcoin - "digital gold", and assets backed by fiat currencies, including stablecoins and digital currencies of central banks. He called the second category "a new payment innovation with potential for global trade."
  6. The Facebook Libra stablecoin will launch in January 2021 despite regulatory concerns. Libra will initially be backed by US dollar only at a 1: 1 ratio. According to the Financial Times, the Libra stablecoin may be launched early next year. The publication refers to the information of anonymous sources - "three people participating in the initiative." The stablecoin will be pegged 1: 1 to the US dollar. Last September, Facebook unveiled the official list of currencies that will be in the basket providing Libra. Then it was assumed that the stablecoin would be backed by the US dollar, euro, yen, pound and Singapore dollar in different proportions. However, in April, the Libra White Paper was updated. The developers stated that the value of the base LBR cryptocurrency will be calculated based on a whole basket of stablecoins with different shares for each. The original plan was to issue LibraUSD pegged to the US dollar, LibraEUR to the euro, LibraGBP to the British pound and LibraSGD to the Singapore dollar.
  7. A Method Used For 350 Years Blaise Pascal, who lived in the 1600s, was a prominent French thinker. As a child, he began to show amazing abilities in mathematics and science. During his short 39-year life, he made significant contributions to philosophy, mathematics, fluid dynamics and physics. He even invented several computers that were centuries ahead of their time. He also worked on decision theory, which ultimately helped lay the foundation for modern economics. Unsurprisingly, some of his work included research on how to persuade people. His ideas were unique at the time, as the first experimental psychologists to begin “officially” looking at persuasion did not appear until the 1800s. Modern psychologists now agree with Pascal's work, and his recommendations are applied in the fields of sales, marketing and business. In his book Thoughts, Section 2, Part 1, Excerpt 9, Pascal writes: “If you want to argue not in vain and to convince your interlocutor, first of all, understand for yourself which side he approaches the subject of the dispute, for he usually sees this side correctly. Admit he is right and immediately show that if you approach from the other side, he will be wrong. Your interlocutor will willingly agree with you - after all, he did not make any mistake, he simply did not see something, and people get angry not when they do not see everything, but when they make a mistake: perhaps this is due to the fact that a person by his very nature is not is able to see an object from all sides at once and at the same time, by its very nature, if it sees, then it sees correctly, for the evidence of our feelings is undeniable. " He also adds: "The arguments that a person thinks out on his own usually convince him more than those that came to mind of others." The first important point: show the client that you understand their position Basically, Pascal says that if you want to start persuading a person, you must first show him that you partly share his position, and in some points he is really right. Otherwise, communication can escalate into conflict, which is probably the worst way to convince someone to buy your product. For example, imagine that you are offering someone to purchase a service, and the person does not agree, because he is absolutely satisfied with the service in another company. What should be done? First of all, agree with him, tell him that his current supplier really offers excellent service and that you are pleased that quality is the most important thing for the client. This will not only disarm the potential buyer, but it will also show that you are really listening to them. You can then reformulate the client's objection in a way that you can overcome it. - I am very glad that you are satisfied with the quality of customer service in another company. Is that the only thing stopping you from buying? - Yes. - I understand, but I must say that our company is ahead of the one that you mentioned, because we received more points in the rating for assessing the quality of service. 95% of reviews about our work are positive. I know that our competitors provide good service, but I am confident that we can do for you what they cannot. So what did you do in this case? You have accepted the customer's objection; agree that competitors do offer good service; have repeatedly provided information about your company in such a way as to show the benefits of cooperation; and finally overcame the objection. If you answered only, “Well, our customer service is better than the competition,” it would make the person even more convinced that they shouldn't do business with you; and you wouldn't have a chance to change his mind. Second important point: you are "planting the seeds" of ideas - the client is "harvesting" The next feature that Pascal notes in his work is more difficult to apply in sales, but it is also extremely important. The thinker argued that if an idea comes into your head, you are more willing to start implementing it than if the idea originated in the head of another person. Simply put, if you're presenting a product to a potential customer, try to present it in such a way that the person can connect in their head the benefits of your product and their individual needs. Instead of saying, “I see that your hydraulic press is not working well enough. I suggest that you purchase our equipment, thanks to which it will run more smoothly, and you can avoid downtime ", try to say:" I faced a similar situation. A client of mine had problems with several machines in production, but after using our equipment, his company's productivity increased by 30%. " The buyer must connect the real story of third parties with his own similar situation. You planted the seeds, and the potential client “reaped”, that is, thought about the prospect of using your new equipment on old machines. The client will think that it was his own idea, therefore, with a high degree of probability, he will agree to your proposal.
  8. Allowing all traffic to pass through the Tor network will increase the user's security and anonymity. In addition, .onion domain zone sites will become available for any browser. The disadvantage of this procedure is a significant decrease in the speed of the Internet, which can lead to the inability to conduct live broadcasts or complicate communication in the same Zoom, for example. However, this method takes place, especially when you need to anonymize some background processes. Installing everything you need To pass traffic through Tor, you need to download (https://www.torproject.org/download/) its client. Next, you need a Proxifier. You can download it from here (https://www.proxifier.com/download/). Setting up Launch Tor Browser. Launch Proxifier. In the "Profile" tab, select the "Proxy servers" item. In the window that opens, click "Add" and enter the local address 127.0.0.1 with port 9050 and type Socks 5. Done! Now absolutely all Internet traffic of the system passes through the Tor network.
  9. The use of all services is intuitive and hardly requires a detailed explanation. Search by photo on social networks: 1. VK Watch - (https://vk.watch/) 2. FindClone - (https://findclone.ru/) 3. Pimeyes - (https://pimeyes.com/en/) 4. Search4faces - (https://search4faces.com/) Collecting information on the search engine: 1. Yandex - (https://yandex.ru/images/) 2. Google - (https://images.google.com/) 3. @ search - (https://go.mail.ru/search_images)
  10. Replacing data, such as PC name, processor ID, MAC address, can help with advanced blocking variations in programs or games. Having changed all the data, you can, under the guise of a new user, re-enter the system to which you were denied access. You can do this with STZBlaster. This is a small, fully automated program for changing the main characteristics of the operating system and hardware. Installation and use This utility can be found freely available on file sharing or torrent trackers. STZBlaster is installed under Windows using the standard bootloader. At the first start, a window opens with all the standard settings of the device. To change all parameters, click on "Randomize all values". Then wait a little and use previously unavailable utilities under the new system data.
  11. Definition of "tail". Be careful and learn to recognize that you are being watched. If you notice a tail, don't show it. "Bad guys" rarely wear loose-fitting raincoats with a belt. Don't expect to see a la Sam Spade. Your tail will most likely be the person you least expect to see. For example, a woman or an elderly person. You need to identify the person or several people who most often catch your eye. The tails work in shifts. Don't expect to see the same tail. The surveillance is carried out by teams. One person is walking directly behind you. Others are slightly behind. Other team members may follow you along parallel routes, across the street, or along a parallel street. They can use car or portable radios. Permanent attributes and items. Tail may carry a bag full of wigs, glasses, quick-change ties, and reversible jackets. Try to concentrate on things like height and facial features. Look at items and details of clothing that cannot be quickly changed, for example, trousers or boots, as well as remember personal items, such as a ring or other jewelry. Some techniques for conducting outdoor surveillance on a car The surveillance vehicle may overtake you and stop so that you can catch up with it. This usually occurs in heavy traffic. The tail will always use the given situation to its advantage. Headlight tricks. Some surveillance teams arrange tricks with the headlights so that in the dark the car looks like a sedan, then like a motorcycle. This is done using a switch. In the off position, you will see a single headlamp in the rearview mirror. This is done in order to make you believe that the suspicious sedan that you noticed earlier has left. Taillight tricks. Check your car's rear lights. If you find a small hole in one of them, it means that you are under surveillance. This is an old trick that allows the tail to stay at a sufficient distance from the subject at night, even with very heavy traffic. A perforated lantern will glow with a bright white spot rather than red or amber. A seasoned professional can also insert a bright light bulb in one headlight of your car and leave a weaker one in another. He can also just take out one of the bulbs. Tracking devices. Don't underestimate the level of sophistication and ingenuity of the surveillance team. A smart professional can glue a strip of reflective tape to your car's bumper, or attach various miniature tracking devices and radio compasses. Keep this in mind when checking your vehicle every day. Increase your speed first, then slow down. An inexperienced agent will put on the brakes in order to catch your pace of movement, or will be at a loss, trying to disguise or somehow justify their maneuvers. This technique can also work while walking. Step aside and look around. Capture the signs of people and great features of the cars that follow you. If you are driving in a car, try to remember the registration numbers of the cars that follow you. Repeat this operation several times in order to determine who is constantly following you. Remember that surveillance can be conducted in parallel by several teams on parallel routes and using radio communications. The same person or car will not constantly turn after you, but eventually they will reappear. If you have calculated one “tail”, this does not mean that you have identified all. Change the direction of travel often. This way you can define multiple "tails". Get close to them, record their distinctive features and other important details. At the same time, your pursuers will understand that you have found them and will be forced to change the brigade. Be on the lookout! Stop by shop windows. If you are walking, this gives you the opportunity, looking at the window, to discover the "tail". Enter the building and stop abruptly. Your pursuer will be able to stop only after bumping into you. Throw something on the floor or sidewalk. Your pursuer will definitely stop to pick up this item. Take the subway or bus at the last minute. You've probably seen this trick in the movies before. If you are walking with another person, let him stop or back away. This way you can check if someone is following you. Check the amateur radio band and other radio frequencies. Periodically look through the repertoire of radio stations in HF and VHF - you can hear a lot of interesting things about your person. Change your appearance. Enter the store quickly
  12. By default, Windows 10 collects sensitive user information secretly. Microsoft says this information is only collected to improve the operating system, but this is not comforting to many users. Destroy Windows 10 Spying (https://github.com/spinda/Destroy-Windows-10-Spying/releases) will help solve this problem: it stops tracking services, disables telemetry and adds addresses of all Microsoft spy servers to the hosts file so that your computer cannot send any data there. The utility can also remove all built-in Windows 10 applications, however, it is worth noting that after that it will be impossible to return them. We also recommend using the program only if you understand what you are doing, and also be sure to create a system restore point before using it.
  13. Hopefully, you are reading this article out of curiosity, not out of necessity! Types of crimes IT crimes are very diverse. Let's highlight the main ones: Theft using information technology - This category includes phishing scams, theft of funds from accounts, including carding. Drug Crimes - It was soon ten years after the illegal Silk Road marketplace, and since then, the fight against anonymous marketplaces has not subsided around the world. There are still adventurers who believe that no one will find their online store. It is enough to look at the statistics, and you will see how many similar businesses are covered up every year - these are huge numbers; But you can easily serve a quarter of a century for selling drugs in the Russian Federation! Acquisition of Special Means - This and the next item are called "people's articles", and here's why. The law enforcement system loves statistics: the more people are held accountable, the better - bonuses, awards, and ranks of employees depend on this. Several years ago, there was a bug in the legislation that made it possible to prosecute “geeks” who buy mobile phones, GPS-beacons, microcameras that are not licensed in the Russian Federation - for the purchase of funds to secretly obtain information. Internet extremism - Everyone has heard about the terms for “memasics” or “reposts”. Now they are not so fierce under this article, and yet hundreds of people have already received their, albeit suspended, sentences and convictions. Creation, distribution of malware or illegal access to computer information - This is already a real hacker article, and quite rare. The less common a crime is, the more interesting it is for statistics. So if you come to the attention of the authorities in connection with something like that, then they will "develop" you more diligently than usual. Distribution of child pornography - Torrent lovers run into this lineup: downloaded and forgot to delete - consider that you are already committing a crime. Did you catch malware and transfer your PC to a botnet? They will come for you. Our authorities "calculate by IP" without any jokes. Anyone who is caught in this way, most likely, turns out to be not a malicious hacker, but an innocent lover of cracked programs. Nevertheless, the matter will not do without the withdrawal of equipment. Internet aggravates I would like to emphasize that under the Criminal Code, fraud, theft, and drug trafficking through the Internet entail heavier sanctions than the same crimes committed without the use of information technology. Cybercrimes are more difficult to solve, so not so long ago they were "aggravated" - now these compounds are grave and especially grave. So for the theft of two thousand rubles from the pocket of your bag, you will sit on a "recognizance not to leave" during the preliminary investigation and get off with a suspended sentence, and if you stole two thousand from a bank card account, you can easily be arrested and get a very real term of up to ten years. Time is playing against you If you crossed the line of the law (through inattention or intentionally), then neither tomorrow nor the day after tomorrow, most likely, they will not come for you. Even operational units are burdened with bureaucratic requirements and do not always live up to their name and act promptly. In addition, in all textbooks on operational and investigative activities, it is recommended not to rush, but to thoroughly gain a foothold in the evidence. If you catch the attacker too early, then all the work can go down the drain: there will not be enough evidence and he will have to be released. Law enforcement officers are not always smarter than a criminal, but they know how to wait. I have seen cases when cybercriminals have been developed for over a year. Sooner or later, the attacker will lose vigilance and make an obvious mistake. Here it is possible to impute to him at once the totality of crimes. After all, each theft or other action is a separate crime, and it is always more profitable for the authorities to attract a person for 10–20 crimes than for one. How can law enforcement agencies find out about you at all? The first "thread" can come from anywhere: informants, data from providers, some analytical results of traffic, or messages from citizens about an unlawful action committed against them. What are the signs that you can understand that you are “under the hood”? The main tool is intuition. But there are also more objective signs. Here is some of them: Your phone started working strangely; there are suspicions that you are being bugged. “New friends” appear who are interested in your activities. Strangers ask your neighbors about you - they can be employees of the authorities. If you really do something wrong, then you may still have a chance to stop in time. However, if the officers of the authorities began to interview neighbors or relatives openly, it means that the development of you is approaching the final stage and there is already a verification material, which they are preparing to transfer to the investigator to initiate a criminal case. Checking before the initiation of a criminal case Before opening a criminal case, law enforcement agencies consider the material of the check. If such material exists, it means that law enforcement agencies already have information about a possible crime. One of the tactics is to collect all the evidence at this stage so that the investigation of the criminal case does not drag out. Sometimes, after considering the material of the check, the investigator can only process and send the criminal case to the court. The trick is that the check lasts up to 30 days, then the employee issues a formal decision to refuse to initiate a criminal case, the prosecutor cancels this decision and the check period begins anew. Thus, it is possible to consider the verification material and look for evidence for a long time: I saw the verification materials five years ago, and this is not at all uncommon. The criminal case, however, cannot be extended forever. Investigators aim to investigate him within two months. Only cases with a large public response are allowed to be investigated for more than a year. A number of investigative actions can be carried out even as part of an audit: inspections of the scene of the incident (for example, your apartment), within the framework of which equipment may be seized; interrogation (this is not an investigative action in the full sense, but interrogation will be based on the testimony of the interrogation, also if the article is suddenly under investigation by the body of inquiry, then the interrogation can be evidence); expertise; obtaining samples of voice, handwriting, fingerprints and palms of hands, genotype - for comparative research; inquiries to providers, banks, cellular companies and other organizations; assignments to other services, including foreign ones through Interpol. Inspection Without initiating a criminal case, a search will not work, but if you have clear traces of a crime in your apartment, then they can do everything necessary as part of a routine inspection of the scene - and even against your will. Inspection against will still have to be legalized after the fact through the court, so that the seized evidence is considered legal. However, investigators take such a step only if they have reinforced concrete foundations in their hands, and the courts in most cases agree to legalize such actions. Also, if the circumstances do not tolerate delay, even a search can be carried out without the prior permission of the court and subsequently legalized. How does a home inspection differ from a search? In both cases, the action can take place against your will and be accompanied by the seizure of things, but according to the law, the difference lies in the goals. But even here there are no clear boundaries. In practice, examinations tend to be "softer", do not turn everything inside out, but simply explore the place. However, even on inspection, employees can search anywhere and anything. Poll As part of the check, you can be summoned for an interrogation (not interrogation!). It is allowed to take a lawyer with you to the interview. It is not necessary, but it is important to realistically assess the risks. Perhaps, immediately after the interview, a criminal case will be opened against you and your problems will suddenly take on a serious turn. In any case, arrange with a good lawyer so that he is ready to urgently come to you. If you are detained, then you will no longer be able to leave the building of the law enforcement service on your own. Criminal case If a criminal case is opened against you, you will, of course, immediately find out about it. Most likely, the investigator will inform you not even by mail, but already in his office, officially inviting you to investigative actions. But there is a nuance - a criminal case can be initiated against an unidentified person. The investigation may not have enough evidence, or the criminal has not really been identified yet. Or maybe you have already been “identified” informally, just the investigator uses such a trick to conduct operational search and investigative measures while you remain in the dark. Scenarios of interaction with the investigation Scenario one: you found out that a criminal case is being investigated against an unidentified person. Personally, the active actions of the authorities do not affect you, but you took a real part in the crime (if you didn’t, then there’s nothing to worry about, I haven’t heard that the innocent was imprisoned for cybercrimes). The second scenario: you find out that a criminal case is being investigated against an unidentified person, and you are involved in inactive investigative actions (interrogations as a witness, searches while maintaining the status of a witness, and so on); in this case, you will have less rights than in the status of a suspect, which simplifies the investigation. The third scenario: when a criminal case is initiated against you or you are interrogated as a suspect (these events are equivalent - in both you have the status of a suspect). According to the first two scenarios, it is enough to work out a line of self-defense and, if possible, discuss with a specialist how events can develop, what could mitigate and what could aggravate the punishment. In the third case, you need to immediately conclude an agreement with a lawyer. In any case, if you find out that something is being started against you, even if these are testing activities, you must stop any illegal activity as soon as possible and pull on your white hat harder, once and for all, go over to the light side. Perhaps you are lucky and you will get off with an alarm bell and wasted nerves. Preliminary investigation The preliminary investigation is divided into several stages. The first stage - the initiation of a criminal case - we have already analyzed. Interrogation The second stage begins soon - this is interrogation. During the preliminary investigation, he gives you a criminal procedural status: witness, suspect, accused. Each of these statuses implies its own rights and obligations within the framework of a specific criminal case, you can familiarize yourself with them in the Code of Criminal Procedure of the Russian Federation. If the crime is not serious, you will be summoned for interrogation, a measure of restraint that is not related to imprisonment (not to leave the place and proper behavior) will be chosen, and you will be summoned upon call to other investigative measures. In the event of a serious crime, you can be detained, and even before the initiation of a criminal case. Operatives of the operational services will catch you anywhere except your home (after all, you need a court decision and an open criminal case), bring you to the investigator's office and draw up a detention report. Detention Employees can approach you at any time, even when you are calmly walking down the street. They will introduce themselves and tell you that you are detained. It is better not to resist, because any bruise on the body of an organ employee is a criminal article. You need to call your relatives or a lawyer, but do it without aggression, otherwise the phone will be immediately seized during the search. You will be brought before the investigator, and he will draw up a protocol of detention. During the arrest, the presence of a lawyer is not essential. All the same, you cannot influence the detention if it is legal. And it is legal in three exceptional cases: when a detainee is caught while committing a crime or immediately after it has been committed; when the victims or eyewitnesses point to him as the person who committed the crime; when clear traces of a crime are found on a person or his clothes, with him or in his home. The protocol of detention must be signed, since the mark of the investigator “refused to sign” will negatively affect the consideration of the criminal case by the court. Check that the time of detention on the protocol matches the time of the actual arrest. From this moment, 48 hours are counted, during which the investigator must go to court with a petition for arrest and prepare materials proving why imprisonment is necessary for an objective investigation of a criminal case. When arrested, the investigator must give you a call, use this right wisely. Don't call your accomplices, because your entire conversation will be heard by employees (and will be able to trace the call), and coming up with a word code on the go is a bad idea. It is better to call your relatives so that they can bring you bedding and warm clothes as soon as possible so that you do not die in the isolation ward. The investigators will meet you halfway and wait, because then it will be much more difficult to transfer things to the detention center. Search In the early stages of the investigation, an inspection of the scene of the incident or a search must be carried out, in which at least two attesting witnesses must participate. Any items of interest for investigation will be searched for and seized. You will not be allowed to leave the search area. At the end, the employees will draw up a search protocol, you can familiarize yourself with it and make a photocopy. If your equipment - be it a hard drive or an entire PC - is to be turned off and taken away, an IT expert (civilian or forensic expert) must be present during the search. An operational employee, even if he is from the "K" department, cannot replace such a specialist. Expertise If you are a suspect or a witness, further examinations await you. Expertise can be of different directions: from computer, to phonoscopic, fingerprint, biological. It all depends on the objects under study. In any case, the suspect will be familiarized with the examinations. And the witness - only when samples were seized from him directly. Other investigative actions Testimony on the spot: under video or photo recording, you will tell and show what you did and how you did it right at the crime scene. Investigative Experiment: Employees will reproduce the conditions under which the crime was committed to ensure that their or your assumptions are realistic. Face-to-face confrontation. Even if you have built an ideal technical defense, you refuse to admit guilt, and the investigation has no objective evidence, your partner can always turn you in. In this case, the investigation will conduct a confrontation between you and your partner, where he will tell you “how it was”, and you will either stand your ground or agree with him. In any case, you will have a confrontation of versions, the purpose of which is to establish the truth. Accusation In the end, when the investigation has formed the qualifications of your actions, you will be charged. You can agree with the accusation, partially agree or disagree. At this stage, you will certainly be interrogated again - already as an accused, in order to dot the “i's” and understand your attitude towards criminal prosecution (whether you regret it or not) and the final position on your deed, with which you will appear before the court. The final part of the preliminary investigation You will certainly be given to familiarize yourself with all the materials of the criminal case, about which a protocol will be drawn up. You will be able to study all the evidence that the investigator has gathered and, together with your lawyer, choose the final line of defense for the court. In the acquaintance report, you can apply for the choice of legal proceedings (for example, in a special order or by jury). At this stage, the investigative actions have been completed. Then the criminal case will be sent to the prosecutor's office for approval, and then to the court. Confession of guilt, confession and special procedure To admit guilt or not is up to you. The main rule: under no circumstances admit to what you did not do. If you are subjected to violence or threats ("confess, otherwise we will beat you"), threaten that you will write a statement to the Investigative Committee. The threats will most likely end there, since “knocking out” testimony is a crime on the part of employees and entails serious sanctions. When you do commit a crime, denial is the worst option if the criminal case goes to court. The court will give the maximum term, and even with imprisonment. Conversely, criminal proceedings are very humane towards those who confess. If you committed a crime for the first time and confessed to it, there will not even be a trial, only a court fine. As a result, you will have no criminal record. This is an innovation in legislation. The application of a court fine has its own nuances, read more in the Code of Criminal Procedure of the Russian Federation. What else will help? A confession. In the old days she was the "queen of proofs", but now it is a life hack that allows you to knock off the maximum punishment. Even if you wrote a confession, and then the entire investigation was denied and you were found guilty at the trial, the appearance will help you out. If the conditions for applying a court fine are not met, there is a special procedure. Admitted fully guilty? Ask for a special order. Then the court does not consider the case on the merits, but only decides the issue of sanctions. In most cases, a special order will entail a conditional sentence or (if you also appear guilty) the minimum real term. Lawyer A lawyer is your main defense tool. You can hire him yourself, "by agreement", or use the services of a free lawyer provided by the state. The appointed attorney is not just a formality, many of them defend in good faith, and the famous “pocket lawyers of the investigator” have long been a thing of the past, since they are appointed not by the call of the investigator, but according to the queue established by the bar association. Oftentimes, a designated defender will be sufficient, especially if your strategy is to plead guilty. In this case, it will be more efficient to spend money not on a lawyer, but on damages. If you understand that you are being charged more than you did, hire a lawyer by agreement. A good defender is expensive, and will never guarantee you that you will not be responsible and will even warn you about it directly. Of course, if it is really a professional, and not a marketing lawyer who will imitate hectic activity and make promises for your money. Unfortunately, there are no ratings of the professionalism of lawyers, you have to focus on word of mouth, previous experience in the right category of cases and reputation. General advice. How to communicate with the investigation Do not conflict with representatives of the state, they always have more powers. This is especially true of the investigator, because this is the only employee who can really influence the fate of a criminal case in the range from "not proven" to "the maximum term and worse conditions in the temporary detention center and in the zone." Subordination is an important point. How many times have I seen a suspect pay bitterly for his cheeky behavior with a female investigator? Conversely, seeing respect and understanding on your part, the investigator will probably respond in kind. You shouldn't give in to the investigation either, because their job is to send criminal cases with the heaviest possible compositions to the court in order to improve statistics. The optimal behavior model is to negotiate. For example, an investigator often forgets to familiarize a suspect with rights before starting an investigative action. It is much better not to write a complaint, but to mention it with understanding, ask him to meet you halfway, soften your guilt. Your complaint would not be satisfied anyway, but the location of the investigator would come in handy. The investigator is also a human being and strives to do his job fairly. If you see that the investigator is torn between conscience and the demands of the authorities to improve the indicators in terms of the severity and number of trains, show your best sides. Let him know that you just made a mistake, but now you are ready to become another "Kevin Mitnick" and teach young hackers not to make mistakes and not to break the law. REMINDER Online crimes are punished more severely. The police know how to wait, and the criminals lose their guard. If you smell burning, immediately stop dark deeds. Each violation is a separate crime. Watch for signs that you are being developed. They can dig under you without initiating a criminal case. Consult with a lawyer about tactics and arrange an urgent departure in advance. Witness status does not guarantee your safety. An accomplice can set you up. Do not resist when detained. Don't call your accomplice, call your lawyer or relatives. Ask your relatives to bring you warm clothes for the isolation ward. Check the time of your arrest and sign the protocol. A special order, confession, and confession will reduce your punishment. Do not confess to what you did not do - even under pressure. A free lawyer is not always useless. A paid lawyer is not always good, choose according to reviews. Do not conflict with the investigator, but negotiate with him!
  14. People often include personal information in their passwords, which can often be found on accounts, social networks. The following program is a password generator based on the above criteria, and can be used in penetration testing and forensic research to crack passwords. Installation: (https://anotepad.com/notes/m7jx3p65) Usage: python setup.py After filling in the proposed fields, passwords will be saved to a text file wordlist.txt
  15. Salute, Friends! Today's method has been tested in the Russian Federation and Ukraine. It is better to use it on an empty SIM card, where there is no balance and traffic. If there is money in the account, it can still be withdrawn due to the initial connection to the Internet. Begin 1. Download the AnonyTun program (Play Market | w3bsit3-dns.com); 2. Launch, click on the Stealth Settings button; 3. Turn on the Stealth Tunnel; 4. Connection Protocol: HTTP; 5. Connection port: 8081; 6. Turn on Custom TCP / HTTP Headers and click the Edit Custom TCP / HTTP Headers button; 7. URL host: the address of a site that does not keep track of your operator's traffic. For MegaFon, MTS, Kyivstar, Lifecell, for Beeline; For other operators: most likely this is just the address of your operator's website, or the address to your personal account. Just try to access the Internet without balance and available traffic, you will be transferred to the operator's website (or a website where traffic is not recorded). Some operators can only work with a + balance on the account, but the traffic will not be wasted. 8. Request method: POST; 9. Extra headers: Online host, Keep-alive, user-agent; 10. Click on Generate. In the window that opens, click on Save, then again on Save; 11. Exit the settings, click Connect, check.
×
×
  • Create New...