Personal > Blogs

Personal blogs.

No user evaluation yet
The domain and web site were surrendered to U.S. law enforcement pursuant to a federal prosecution and felony plea agreement for conspiracy to violate criminal copyright laws.
Customs seal

David Rocci, a.k.a “krazy8,” pled guilty in the United States District Court for the Eastern District of Virginia on December 19, 2002, to conspiring with others to violate federal copyright laws by illegally importing, marketing, and selling modification, or "mod," chips. Mod chips illegally circumvent built-in security protections and allow individuals to play pirated games on game consoles, such as the Microsoft Xbox and the Sony Playstation2. Rocci and his co-conspirators used www.iSONEWS.com as the exclusive outlet to market and sell their mod chips to individuals in the illegal warez scene. As a result, the iSONEWS website is now the property of the United States government. Individuals involved in this conduct face up to five years in federal prison and a fine of $500,000 for each count charged. To learn more about United States v. Rocci, click here.

Piracy is the unauthorized, willful reproduction or distribution of copyrighted material, such as software, movies, music, and games. People who distribute pirated works over the Internet via IRC, FTP sites, web sites, or file-sharing networks, and people who download or reproduce pirated works are risking criminal prosecution. Piracy is a crime even when the works are distributed over the Internet for free or where the conduct does not involve monetary gain, such as the trading of pirated products for other pirated products.

The Department of Justice and federal law enforcement will continue to investigate and prosecute individuals and groups that violate the federal criminal copyright laws at home and abroad. For more information on these and other federal anti-piracy investigations, visit www.cybercrime.gov.
You need to login to report a site Details
Last check 2026-02-28 01:22 UTC Offline
KILLER OF MANY SITES AND PPLZ
You need to login to report a site Details
Last check 2026-02-27 23:52 UTC Offline
No user evaluation yet
You need to login to report a site Details
Last check 2026-03-17 15:32 UTC Offline
No user evaluation yet
Here you can buy real paper (stolen) for a very small amount that is worth. This paper comes already with security ribbon for $100 dollar bill
You need to login to report a site Details
Last check 2026-02-09 22:02 UTC Offline
No user evaluation yet
Abstract
You need to login to report a site Details
Last check 2026-02-17 02:25 UTC Offline
No user evaluation yet
Windows
TrueCrypt

WARNING: As of 28 May 2014, TrueCrypt is no longer maintained by its developers, which might have security implications. However, TrueCrypt version 7.1a is generally still considered safe. [1]

Step 1: Get TrueCrypt
Step 2: Install TrueCrypt
Step 3: In Truecrypt select the “Create Volume” option
Step 4: Follow the instructions of the "TrueCrypt Volume Creation Wizard"
Step 5: Select a drive letter in the main TrueCrypt window
Step 6: Select your TrueCrypt container or drive using the "Select File..." and "Select Device..." button
Step 7: Click the "Mount" button and enter your password. A new drive will now pop up in "My Computer"
Step 8: Store your sensitive files on that drive
Step 9: Click the "Unmount" button to unmount the drive

For additional security, encrypt your bootdrive with TrueCrypt.
You need to login to report a site Details
Last check 2026-03-20 19:17 UTC Offline
No user evaluation yet
Firefox and SELinux

Update: it seems that updating the confined version of Firefox doesn't work. To work around this, temporarily disable SELinux before updating. Once the update process finished, you'll need to reset the file contexts on the files by running the command "restorecon -F -R -v ~/firefox-strict". Without doing this, Firefox will run unconfined after the update!

This guide has been written to help people out there creating a safe Firefox installation which is only allowed to browse through Tor. This means no other network traffic (eg. DNS requests, direct HTTP or FTP requests) is permitted to be sent from the process preventing any kind of data leakage possible by abusing the process (eg. memory leaks, buffer overflows, bugs in the code etc). This greatly increases the protection of your anonymity as it prevents all attempts to send your real IP address and other sensitive data to 3rd parties (like in the case of the recent FH attack where IP and MAC addresses and hostnames have been sent to a clearnet server).

Note that if you dedicated your system to the risky or illegal activities you do (eg. you use a VM inside your normal system or have a dual-boot setup), a better way to defend yourself is to simply block all outbound connections using a firewall and then configure your system to use the SOCKS proxy of Tor to connect to HTTP hosts on the internet. Otherwise, if you share your system between different activities and use a RHEL-based Linux distribution, you may follow this guide to make your browsing sessions more secure.

First of all, SELinux is a pretty hard-to-understand thing, so I won't go into technical details too much. Basically, think about SELinux as an additional security layer on top of the usual POSIX rights set on files, directories and other filesystem objects. POSIX rights are provided to grant read/write/execute/browse privileges for the owner user, the owner group and "everybody else" which means anyone having a user account on the system. SELinux extends this security scheme by creating application domains which are strictly separated from each other, applications from different domains cannot access each other's resources. All processes run in their confined security contexts (domains) which ensures they only have access to resources they really need access to.

To strengthen the security of the browser, I created a policy package for firefox which permits only connections to the SOCKS proxy of Tor. The steps below describe how to install and use the package:
You need to login to report a site Details
Last check 2026-03-20 19:22 UTC Offline
No user evaluation yet
AnyFace2077,Leaks,Leaked,Intelligence,Free Databases,confidential,secret,BTC,Leaks Market,Breaches,Cyberpunk
Life is brief, and then you die, you know?
You need to login to report a site Details
Last check 2026-01-25 04:35 UTC Offline
FOSS and life. Kushal Das talks here.
You need to login to report a site Details
Last check 2026-04-10 11:25 UTC Offline
You need to login to report a site Details
Last check 2026-03-29 14:27 UTC Offline