Wij gebruiken cookies om uw ervaring beter te maken. Om te voldoen aan de cookie wetgeving, vragen we uw toestemming om de cookies te plaatsen. Meer informatie.
Hacklog Volume 1 Anonymity: It Security & Ethic... Apr 2026
How to identify and block local resources (like Cookies, JavaScript, and WebRTC) that can deanonymize you.
Explanations of how these circuits work and how to navigate them safely.
is a practical handbook focused on digital privacy and identity protection, serving as an introductory guide for those entering the world of ethical hacking. Written by Stefano Novelli and others, it originated as a crowdfunding project from the Inforge.net community. Key Themes and Takeaways Hacklog Volume 1 Anonymity: IT Security & Ethic...
Guidance on using security-focused OSs like Kali Linux , Parrot Security OS , and Ubuntu .
The book is structured to take a beginner from zero to a solid understanding of how to remain untraceable online: How to identify and block local resources (like
Practical steps for file encryption ( PGP/GPG ), secure backups, and disk wiping to irreversibly destroy data.
Users looking for quick "scripts" to hack social media accounts. Written by Stefano Novelli and others, it originated
Deep dives into using Tor , I2P , Freenet , and VPNs to mask your IP and encrypt traffic.