How to stay untraceable online | How to anonymous online - TechinBit- Best Techy Content available on this Site


propellars ads

How to stay untraceable online | How to anonymous online

How to stay untraceable online | How to anonymous online

Complete Forensics Guide

How to stay untraceable online | untraceable web browsing |surf anonymously online.
Anti-forensics is the art of not leaving traces on your computer; it fights against common forensic tools and prevents the penetration of forensic tests on your computer. Anti-Forensics can be largely summarized in one well-known quote:
It’s hard for them to find you, and it’s impossible to prove that they found you.

Since Linux installations are pretty much already protected, this guide will focus only on Windows. Windows is a security nightmare, but what if I tell you that there is a way around this, a way to make Windows safe? VPNs, ip hider online, how to be safe while being online,online guns,illiegal weapon
proxies, and Tor can only help you to go online anonymous, but what do you do when they track it on your computer? Anti-forensics are designed for this situation so that they cannot prove that you did something wrong, even if they have a computer.

let's get started.

Turn off timestamps

Using timestamps, forensic experts can build a “digital timeline,” which can be very convincing evidence if cross-referenced with other known evidence. To enhance security, we must disable these logs.

Step 1.) User Assist File

how to be untracebale online | There is a registry setting that stores the logs and dates of all running programs, forensic experts can use this to build a digital timeline, we must disable this for computer security.

Find to Go "HKEY_Current_User \ Software \ Microsoft \ Windows \ Currentversion \ Explorer \ Userassist". 
untraceable,online,how to be untraceable online,untraceable gun,untraceable phone call ,untraceable web browsing,how to be untraceable,surf anonymously online,hide ip address online,peliculas online,ip hider online,how to be safe while being online,online guns,illiegal weapon
user Assist file Untraceable  online

You should see two subkeys named Count, delete both of these keys. Now right-click the UserAssist key and create a new key called Settings. In this ,you have to create DWORD value and named NoLog, set value to 1.

untraceable,online,how to be untraceable online,untraceable gun,untraceable phone call ,untraceable web browsing,how to be untraceable,surf anonymously online,hide ip address online,peliculas online,ip hider online,how to be safe while being online,online guns,illiegal weapon
How to anonymously online

Windows will no longer store hidden logs of the time you accessed files, so forensic experts can no longer use these hidden logs to create a digital timeline.

Step 2.) Recent Access Logs

Disable last access in Windows. The last access is configured in Windows that allows you to see when you open, modify and / or create files on your computer, and is similar to the UserAssist registry key. By disabling this function, experts will not be able to easily determine when it accessed programs or files on your computer.

To disable last access, open a command prompt on your computer, you must run as administrator in Windows 7 or Windows 10.

Enter in command prompt below.

fsutil behavior set disablelastaccess 1

Last access is now disabled, so that it takes effect, you must restart the computer.

Encrypt your computer

hide ip address online | It is very important to make sure that your computer is encrypted, if an unwanted visitor tries to access your computer, he will not be able to access your computer if he is encrypted.

Step 1.) Veracrypt

To encrypt your computer, you can use Veracrypt, a free program that allows you to encrypt your computer.
In VeraCrypt you have two options;

(A)  The first is to create a hidden container.
(B)  A hidden container is an operating system that is impossible to prove its exist

When you creating hidden container,you have to set three different password.

1. The first will be for your decoy system, the operating system that you will show to someone who forces you to log into your computer.

2. The 2nd  password will be for your external volume, the OS (operating system)  that will show someone forcing you to enter the 2nd section on your computer { the second section requires a computer for your hidden container }

3. The third password is for the hidden operating system in the second section of your computer, this operating system is located in the internal volume, and it is impossible to prove its existence (it looks like RAW data).

Step 2.) Encrypt your keystrokes

You need to protect yourself from keyloggers. Oddly enough, even the government has keyloggers, a few years ago there was speculation about the law on CIPAV, a government spyware known to send users the IP address, the Mac address, the open ports, the operating system, the installed applications, the default web browser, visited URL, connected user, etc.

To protect yourself from keyloggers, you must encrypt your keystrokes. You can do this using software called 'Keyscrambler'. Please note that you should NOT use the free version of Keyscrambler, you should only use the Premium version, which costs quite a bit of money.

Keyscrambler Premium supports 170 programs, including Windows login, most web browsers, and popular instant messaging programs (i.e., Skype).

Make encryption secure

Encryption is meaningless if it can be easily avoided or overcome. You should also make sure that the encryption is secure.

Step 1.) Make sure your password is secure

Even with your computer encrypted, you are still vulnerable. Make sure your password is good (for optimal security, your password should be twenty or more characters long, with random symbols, numbers, and capitals, and a special symbol (such as ALT + 1456) really increases security).

If your password is not secure enough, you can change it by right-clicking on your VeraCrypt encrypted drive and selecting 'Change password'.

Step 2.) Create a locked screen saver

Encryption makes no sense if the feds reach your computer while it is running. To overcome this issue simply create a locked screen saver.

To create a blocked screen saver in Windows Vista or Windows 7;

Right-click on your desktop and click 'Personalize'. In the lower left corner you should see 'Screen Saver', click on that. Now, check 'On resume, Show login screen' and set 'Wait' to 5. Now under that, you can set what you want your screen saver to be.

Now you should go to your Control Panel. Click on System and Security, now click on 'Power Options' find your selected plan and click on 'Change plan settings'. Set  Turn Of Screen to 5 minutes.

Step 3.) Get a good antivirus

This may seem obvious, but all of this is pointless if you get infected with a keylogger that takes screenshots. Having a good antivirus is one of the most important things you can do. Now listen. AVG, Avast, McCafe, Norton? They all suck. The only antivirus that you should consider are ESET Nod32 and Kaspersky, BitDefender is also pretty good.

Disable Windows hibernation

You can also turn your computer over to the feds if your house is broken into and your computer is in hibernation. Also, putting your computer into hibernation is simply taking a screenshot of your RAM that is saved on your hard drive.

Now Disable hibernation in win7/8/10.

Open your control panel. Click on 'Power Options'. Click on “Change plan settings” for your current power plan.

Now click on "Change advanced power settings". Expand 'Sleep', then expand 'Hibernate Later'. Enter "0" for 'Settings:' to set hibernation to 'Never'.

Hibernation is now disabled.

Disable and delete USB records

Next on the list of Anti-Forensics to disable USB activity logs, flash drives, etc. This can be valuable if you have a flash drive with sensitive data and do not want any logs connected. to your computer.