Jump to content

Drjek

Members
  • Content Count

    251
  • Joined

  • Last visited

  • Days Won

    1

Drjek last won the day on September 5

Drjek had the most liked content!

Community Reputation

18 Good

4 Followers

About Drjek

  • Rank
    Rank #5

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. Chapter 1. Why carding? So we have to figure out, why do we need carding to make money? Why not just learn to be an accountant, for example, or a lawyer, and then sit in an office getting your $500 a month and not sweat it. Some people think you can make a lot of money in carding. If you, my dear reader, have decided to go into carding for this reason, then I’m in a hurry to disappoint you. There’s no such thing. I’m not kidding or trying to be ironic. Carding has long ceased to be easy work. Yes, in the '90s there was this theme, the bourgeoisie sent all sorts of goods anywhere in the world on the generated map tracks. But those days are long gone. Now, carding is a world with tough rules. There’s always a standoff between shops, banks, cards, and our fellow carders. So think about it 40 times before you, the reader, decide to go into carding. There’s a lot of money here for people who actually work from the dawn to the dawn. There’s no freebies here anymore. People get money with their will and tenacity. Remember that, reader. There’s also another bad side to carding. This is a problem with the law. You steal a lot or a little, but you are a thief. As Zheglov said «The thief should sit in prison». And the police are taking care of us in some way, and they’re catching us. There’s a lot of news today about this or that case of catching the carders. If you’re not afraid to sit down, or you’re so sure of yourself, then welcome to carding. And you should also remember the golden rule, don’t steal from your own people and everything will be fine! So look only towards our beloved America. And one more thing. Remember the carder is a thief. You can call it whatever you want, but it doesn’t change the point. When you become a carder, you become a thief. And also, think of all the other aspects of carding that you’re attracted to besides money. For example, I like carding because I’m a crook in life. When I was a young man, I used to hack cars and carry magnets and stuff. I’d pull women’s purses and raise them for change. The truth then calmed down, but I realized I couldn’t live without it, so I became a carder. I like to steal. But you, my dear reader, I urge you once again to consider whether I need all of this. A lot more money for you to become an official or a politician. No one’s ever canceled a bribe. No one’s ever canceled it. And if you still think you want to be a carder. Welcome to chapter two. Chapter 2. Where to start? It’s a question of concern to all newcomers without exception. Where would carding start? From the Gulf, Rolls, Hugs, Drones, Doorbells, Drawing Documents, Stuff, Casinos, Dating? But not all of them fit the newbies. Personally, I think the newbie might be a good start in the rearview and start his first business there. So, what’s a thing? In short, it looks like this. We visit the website of the online store, select a laptop or a gold chain with a large toe thickness, pay for the data from the bourgeois card, and we get the ordered product to the post office. But as with any case, there are many nuances. One of the biggest problems is the antifroid defense. It’s a kind of special automatic system that tries to track the person entering the card and determine whether it’s a carder or the actual bourgeois. Basically, this system looks at the IP address of the customer of the country and state where he lives. So for example, we’re putting in a map of John Smith who lives in Chicago, Illinois, and the IP address shows that this man is now in Russia in the north of the Urals, or Na Sakhalin, for example. These antifroid tricks won’t work. She’s also looking at local computer settings like the language of the system, the time zone. Because it’s illogical that the bourgeois sits on a Russian vinda with a +5 time zone. So we need a well-tuned system to successfully play the card. But we don’t just need her. We also need to focus on our own safety. Imagine what a miracle you’ve done for yourself with $50,000 worth of stuff, and here the police uncles come to you because you’ve been flashing your real IP addresses everywhere and ordering all the packages to your home address. Yeah, after reading chapter two, I don’t think you want to get caught so foolishly. So we need to get maximum cover for the rear and the flank. And that’s not the only thing that’s going to be our next chapter. Chapter 3. Security. Let’s start with how to protect your real IP address from glow. One of the best solutions to date is VPN. VPN is a service that will help you remain anonymous, that will help you hide your real IP address, and will not allow you to listen to traffic. Nowadays there are a lot of offices providing services to VPN. Look for an office with a good reputation and a cheaper price, because you have to spend your start-up capital carefully. Next on the list is the juice. Actually, the juice isn’t so much for security, it’s so much for the anti-frod system to think we’re coming out of the right state. Not from anywhere in Zimbabwe... So now we’re going to talk about how to take a product that was ordered in the store. It’s out of the question to take it. It’s only for the deadliest kamikaze or emo, whatever. And we want to live, not in prison, but in freedom. So we need to find a drone. Drop is a person who will take over not only the parcel but also the visit of the cops if they arrive. Drops are breeding and non-water. Divvy drops are those who think they’re doing everything right and legally and have no idea that the product comes to them carbonated. How they talk about it is second, but they believe that I’m working on a real job, or that you brought a new plasma for Grandma and you went to another city on business. The non-water drops are the ones who know that your merchandise is left-handed and that the police can come to them at any moment. Getting a drone is pretty much a gemonic thing to do, not for beginners. So we have a clear conscience to turn to the drone. The Drosca is the man who runs the drones and gives us his drones for a fee. Usually this is a percentage of the sale of the goods or the second item in the parcel (two video cameras in the parcel). So the system is, when you pay with the card, we give the drop address and the package is sent to it, and it already sends us half of the package. So for example, he gets two laptops, one he keeps with the other he sends you. But anyway, this structure is pretty pale because they’ll take a drop by the balls and he’ll happily turn you over to the cops. There’s a way out of this. Now the drowsies are also the buyers in one person. I.e. you send him a laptop worth 1 kilo bucks and he drops 500 bucks on your WMZ purse when you receive it. This way is more convenient, etc. you don’t have to take over the goods, but you can sell them and get laundered money right away. I don’t think it’s worth remembering that drones are supposed to look for tested ones that have been around for a long time, because there’s always a chance you’ll get dumped. Work through the guarantor, calm down. Now, let’s talk about how to protect private information on the computer. We have credit card numbers, shopping tracks and other tastes. We need to put this away somewhere so it doesn’t hurt our eyes, and in case the cops come to us, we don’t have to worry about them finding something illegal on our computer. Personally, I advise you to use to store important and compromising information on the yub screw or flash drive or SD microSD card. Personally, I use a regular SD card that my laptop successfully steals. In order not to store data in open form, we need to encrypt it. We encrypt with the program Truecrypt. So, download a program from the offline site (you can also find a Russian there). The wizard chooses to encrypt the yubb device. Then choose to create a hidden volume. The hidden volume is for better protection. This is how it works. We create a cryptic partition disguised as any file. For example, a film. So if you mount a partition with a password for a normal volume then you open a regular volume, I recommend you put porn pictures there in a way that’s more robust. If you enter the password from the hidden volume then the hidden volume is mounted. The point is, if the cops find out about the encrypted partition, then you tell them a section from the regular volume and they see the porn, not the documents. A more detailed helper for this program is available on the offf site. So it’s time for you to get a detailed look at the process of making money. But first we have to configure the system. So welcome to the next chapter. Chapter 4. System Settings So to have a configured system, we need to put it somewhere. The best option is a virtual machine. For this situation Wmware is the most suitable one. Download it from offline servers or torrents. Then we put an English windmill on it (it is assumed that we will work with JUSA). After we have downloaded and put the windows on the cook (detailed instructions do not come to you, i.e. millions of them are in the Yandex), we need to configure the programs we need. Programs can be downloaded from the Internet or can be copied from the main operating system (simply click on the files, and then click in the virtual machine). So we need Truecrypt to have access to our important document repository. Here’s a little comment. If you have your encrypted container stored on a flash drive, you simply need to open the network to access it and in the guest wasp in Trukripat to point the way through the network to the container. IMPORTANT! One container cannot be mounted simultaneously on the guest and main operating systems. To mount the container in the guest room, first unmount it in the main operating system and vice versa! After configuring this app, we move to the sock preview. I personally use Proxifier_2.8 to download it by the link I gave above. To get the programs to work through the socks, start proxyfier, click options > proxy > add settings. That’s where you put the socks. The Check button is also available immediately. To hide DNS, click Option > Name Resolution > Check Choose the mode automatically > Check Remotely > OK This has been dealt with, and I also recommend downloading the Cctools program to change the idioms of the computer and names. Also download and set yourself a good browser like Opera or Firefox. Also use programms to delete temporary Internet files such as cookies, sessions, cache. Privacy Eraser Pro is a program that allows you to clean your browser history constantly. In addition to Privacy Eraser, Ccleaner also cleans the history of the browser, removes redundant files, and cleans the registry. The system has been configured, it’s ready. Welcome to the next chapter! Chapter 5. Tests For starters, I recommend you to practice on «cats». That is, on little things that would then take place on the real site without any problems. So the first thing you can do is scar yourself with a Counterstrike. To do that, you go into our virtual machine. On the main wasp we get VPN, on the guest juice by the state of the holder. You don’t need to buy credit cards for this case, but you need to look for it a little bit more cheaply or ask someone for credit. And I’ve seen a lot of credences on free CI, but I’ve seen a lot of newer ones. And then I can have a cardiac rhythm. Read more about the art in the article «Cardim to himself in pictures» (on the forum lies in the section for beginners). You can also practice swinging a card in porn. You can buy whatever cheap prog you want. You don’t have to sniff it on your computer afterwards. Burn down. If everything went well with the tests, and you’ve got some experience with the injectors, let’s look for a real job! Chapter 6. Real life To start earning on the real shops need to find these shops. We need the shops that send to a different address to the usual CC +CVV. It is the most difficult to find such shops. Enter in Google that thread of type «buy asus laptop» and start to walk on links and watch the shops. Read in the shop what you need to order, if you think the shop should send, then do so, take a credit card in the mail and write the address of the owner of some other card. T.E. has to be a real person at your address. If you are successful, you will be booked and sent to the post office. Also register mail on servers yahoo.com msn.com gmail.com, Russian mail of type mail or Yandex is moveton. Forget about this. So if the store sent you the track and the package left, congratulations! You found the sluice shop. Now go to the drone, it gives you the address of the drop. You put the package back in the name and address of the drop and go! The track that the shop gives you needs to drop the wank. Now, sit back and wait for the first money from the blackbird! Chapter 7. Conclusion... In conclusion, I would like to say that while carding is not good, it has its advantages. Learn to withstand the blows of fate, learn to sit behind a computer all day, learn to force yourself to work and learn, and everything will work out. I mean, I’ve been doing this for five years, and at the moment, I’m more than okay with it. This is the feeling of not being hurt by the height of the $ and living better!
  2. hit the PM I will help you as much as I can
  3. https://uplovd.com/L7deE2M8o3/Good_txt
  4. Hacker accused of hacking and extorting companies, selling stolen data online. Bulgarian law enforcement has arrested on Wednesday a local hacker going by the name of Instakilla on accusations of hacking, extorting companies, and selling hacked data online. Authorities raided two of the hacker's residences in Plovdiv, a city in central Bulgaria, and confiscated several computers, smartphones, flash drives, and cryptocurrency, according to a press release from the Ministry of Interior. The hacker was identified as a young Bulgarian male. His name was not released to the public, and he is currently detained on a three-day arrest warrant. Prior to his arrest this week, the hacker has been a staple on the underground hacking scene. He has been active since 2017 but has only recently risen to notoriety. Although he was not directly involved in the hack of the Bulgarian National Revenue Agency (NRA) in the summer of 2019, Instakilla is one of the hackers who tracked down the database and later offered it for download on a popular hacking forum, helping the data spread across the hacker community. The hacker also ran a website where he offered hacker-for-hire services. Prior versions of this website were indexed by the Wayback Machine and included links to a Bulgarian individual's Facebook account. The account, prior to being deleted, belonged to a young male from Plovdiv, when ZDNet reviewed the page last year during our NRA hack story. Earlier this year, the hacker also took credit for hacking the forum of Stalker, a Russian first-person shooter online game, from where he stole more than 1.2 million user records, which he later put up for sale on a hacking forum. On the same forum, the hacker also ran a so-called store, where he sold the data of multiple companies, including two Bulgarian entities -- an unnamed local hosting provider and an unnamed email service. Most of the hacked entities were forums, and based on conversations ZDNet had with the hacker in May, Instakilla appears to have been an avid fan of using vBulletin exploits to target unpatched forums and pilfeer their databases.
  5. Looking for Drops of top banks.
  6. leave me contacts for communication
  7. For cracking I would buy priv ones of me and word list there cheap like 10
×
×
  • Create New...