Showing posts with label tutorial. Show all posts
Showing posts with label tutorial. Show all posts

Sunday, March 13, 2016

Bitcoins explained (easy)


Bitcoins and what are they?


You just found out about Bitcoins and you are not really aware of what they are, or how to use them?

I have this post over HERE talking in detail about them.

But this post will be for the real beginner on Bitcoin who is still a bit confused about it.

Let me start:

Bitcoins are a form of “currency” just as Dollars or Euros.

Bitcoin can be purchased online from other persons using your local currency, a good place to start is in localbitcoins.com

You can also earn Bitcoins for free by using the GPT industry *1

Another way to get you some bitcoin is by selling products or services and get paid in bitcoins *2

And another way to get your bitcoin (And this is the real difference between normal currency and bitcoins) is that you can “mine” them on your computer, *3

Now you now how to earn some bitcoins, but you still don't know the value of the Bitcoins you have compared to you country currency?

Bitcoin price is really volatile, depending on the markets movement, at any given moment in the day it can rise up 300% but on the next hour it can also drop at the same rate :) you can check bitcoin prices in many online websites. Personally I use my wallet to check in blockchain https://markets.blockchain.info/ At this precise moment the Bitcoin USD price is 1-414.17 that means 1 bitcoin is the same as 414 usd. You can check this screenshot:Bitcoins price on Blockchain

 

If you just search online for “bitcoin price” you will get hundreds of webpages giving you the current prices don't be so lazy :)

By now you should be aware that Bitcoin is a currency and not a payment processor like Paypal.

So what is the interest in having Bitcoins? Silly question! What is the interest in having any sort of currency?..

The main difference between Bitcoin and “regular” currency is that they are not “regulated” by a Government or by a Bank. They exist only digitally there is no “paper Bitcoin money” Bitcoin relies on anonymous peer to peer transactions which makes it very difficult to trace back to you and they are TAX free!

You got some bitcoins by now and you want to convert them into your own country currency?

Houston we have a problem :) The best way to achieve this is by selling them to other persons who want some bitcoin, to do this the best way will be to go on localbitcoins.com and sell them there. Another way is to buy physical products online and then sell them, some vendors who accept Bitcoin are:

Amazon – You can get all kinds of products with bitcoins, provided by the largest “online” store on the Internet

Victoria's Secret – You can get lingerie from the world's top brand paying with bitcoins

Namecheap – Buy you domain online and pay with Bitcoin

Reddit – You can pay for their subscription services and upgrades with Bitcoin

Bing – Bing also accepts Bitcoins, so you can advertise on one of the biggest search engines with some Bitcoin

ExpressVPN – Premium VPN service provided that accepts bitcoin

Microsoft – Microsoft needs no introduction, this software giant already jumped into the bitcoin bandwagon, so get your products from them with bitcoins.

The third way you can convert bitcoins to your local currency, is by exchanging bitcoins for some “online” processor like Paypal, and then get your money from the payment processor. But solid “online processors” will not accept Bitcoins. So what you need to do is to find a product that you can buy with bitcoins and then sell it to your “online payment processor”

It may sound all too complicated, but it is fairly easy!

Step 1 know what Bitcoin is, NOT a payment processor, but a new currency.

Step 2 Earn or purchase your first Bitcoins

Step 3 Use your Bitcoins

 

 

Hope this text could clarify some of your doubts, any other subject you want to know more about just drop me a comment.

If you liked the text please do share it on social media by using the buttons below this post (Facebook, Twitter, Stumbleupon, etc)

 

 

*1 , GPT industry and Bitcoins, for example bitbin.it is a website identical to pastebin, where you just leave some text, and you gain bitcoins according to the number of hits your paste receives. Faucets are another way to earn bitcoins very easy, a faucet is a webpage that just as some ads in it, and a box for you to leave your bitcoin wallet address. You leave the address there and they will send you free bitcoins every-time you do that

*2 Gaining bitcoins by selling services and products. For this purpose you have the dark web markets, but not only there you can actually accept to be paid in Bitcoins everywhere you want to, just like a normal online payment processor (Paypal style)

*3 Mine your own Bitcoins, achieving this is quite easy in “theory” you just download a mining program for your system, and you leave it making money for you.

Friday, March 11, 2016

Windows, how to prevent the worst from happening

 

Due to popular demand, on this post I will teach you how to protect your Windows system from getting swarm with errors and malfunctions. By giving you some good Tips and advice's on how to prevent bad things from happening, but not only that I also show you how to restore your system back to work when the worst does happen and your system gets compromised.

Our first line if defense will have to be the Windows system itself!

[caption id="attachment_1237" align="alignright" width="150"]control panel System and Security[/caption]

When you install it, make sure you create a System Restore Point at a point where the computer actually works as you like it!

To create a System Restore Point on Windows follow these steps:


Step number one open your Control Panel. On Windows 10 right click the start button and choose Control Panel

 

 

Step two locate System and Security>System>System Protection

[caption id="attachment_1238" align="alignright" width="150"]system properties system properties[/caption]

 

 

Step Three Click on Create... Choose a name and that's it you created a restore point, in case your Windows system quits on you!

The System Restore Point is an easy way to get your system back after something fails. But you can prevent your system from failing by using a sandbox application.

 

 

What is a Sandbox Application?


A Sandbox Application is a program that allows you to run any program on your Windows System, but after you are finished with it ALL your definitions will go back to ORIGINAL like if you had never used that program. Sandbox applications are great to run old programs and games that may cause compatibility issues, You can use them to browse the Internet and avoid most kinds of Spyware and Virus. Now I will leave you the link to two different kind of “Sandbox” applications.

The first one is named Sandboxie, it is a FREE download for Home users and you can get it Here  Sandboxie

 

The second application I will recommend for you in this post is Time Freeze, you can get it from this LINK time freeze

This second application after you install it and run it, will automatically “Undo” all the changes you make to your syystem after you Turn on the application, give it a try!

So what you get from this post?

In case the worst happens to your Windows System you should have a Restore Point already Set Up. To prevent the worst from happening you can use a Sandbox Tool, which is a tool that allows you to run programs, browse the Internet and fool around. With the smaller ammount of consequences possible.

Hope this helped! More tips will come in the future so keep visiting the website.

If you found this post useful, please do share it by usingthe Social media buttons below this post (Facebook, Twitter, Stumbleupon, etc)

Thursday, March 10, 2016

Socks what are them why you need them

Hi again, this will be a brief post regarding Socks

[caption id="attachment_1233" align="alignright" width="300"]technology concept technology concept[/caption]

Socks what are them and why you need them?


If you just started lurking around on the Dark web markets and foruns. Time and time again you will read someone talking about Socks or selling them.

But the reality is you have no clue at all what they are.

Basically a sock is a point of entrance to your connection. And with that "information" websites can find out if the IP address that you are using really is your own, or if you are using some proxy server or a VPN service.

Contrary to "proxies" a Sock will not last for a long time! When you get a sock it will probably work only for a few hours, if you are lucky you can get it for 1 or 2 days.

get a new identity online for free

Why a new identity?


There are many different reasons why you need to get a new identity, everyone needs some privacy! When we register to certain websites, like free services and social media they always require you to complete your "profile"; and doing so with your real identity will often lead to identity theft.
By using a "virtual" persona you created, you can forget about all the risks of identity theft.
On this article I will explain to you how to create a new identity online.

your first step is to enter this link... Fake Name Generator fake name generator logo

Tuesday, March 8, 2016

BIN list and why you need one!


Viewers be advised! This is a basic tutorial, and just for educational purposes I would never ever really suggest that someone would use this knowledge. And all of those who do use them will rot in jail for a long long time.


Iam not going to give you the very basics, like were to get this stuff, there are already a lot of blog posts suggesting some markets and autoshops. How to burn a plastic CC will be another topic, on this one I will talk about BIN's


What is a binlist? Why do I need one?



visadiscovermaestroamex



To answer this question you should know that a BIN or IIN , both of these are acronyms for Bank Identification number or Issuer Identification number. The BIN or IIN Is the first 6 digits on a credit card that determines the bank and level of the card, a BIN List is a list of BINs that you know will be aproved for your region, having a BIN list is the difference between guessing for approve and hoping to eliminating the guess and knowing it will work


Ok now that you know what a BIN and BIN list is exactly, how do you get one?


Here is the tricky part! As always you need money to make money. As such the first round of dumps you invest on should be a learning experience.


You should get a mixpack all from different BINs and test them out one by one to see which ones work in your area.


Now you are thinking “How tha Hell can I test these cards since I dont know my bins and its a guessing game whether its a decline or not” even worse what happens if it shows Hold call or Stolen??!!, Dont worry! I will tell you all about it :) (But just for you to know how the evil persons do it! You should never ever do this).


What to do in order to test your card I will suggest


1. Go to one of those movie ticket vending machines where you can pay with CC,


2. Going to ANY self slide checkout, some areas have more than others


3. Coca Cola or vending machines that take CC


4. and nowadays even Cigarette machines accept credit card, so you can use them at will


Along the way you always need to be taking notes. Write down 1 by 1 which BIN actually work and which ones are “dead” or declined. That is how you can get a Bin List.


I went back to basics with this article. Was getting a little bored of writing about MS Windows on how to open an email account :)


Hope you like this Article and keep reading for some more real tips.

Monday, March 7, 2016

Sticky post on wordpress

How to create a Sticky post on your Word press blog.


This post is a bit offtopic of my blog theme. But just today I wanted to insert a "sticky post" on my frontpage and I was not sure how to do it.

So I just used a search engine to find it and I did it in a few seconds.

If you are here because you searched "how to insert a sticky post wordpress" then mission accomplished! :)

 

Here it is how you do it:



Deep web what it really is

Hello, I will keep this post very "simple" and make it "sticky"


In it I will talk once again about the Deep Web, but no images/bullshit. The point is, the more and more I approach people and try to find out what they know about the subject, the worst it gets :)

There is a huge amount of disinformation about this!


Iam not going technical on terms like Deep Web, Darknet, Dark web. I did it already along the way on this blog.

When I use the term Deep web on this post, Iam well aware that it is not technically correct, Iam using it on the most popular idea of what the deep web represents for the majority of people around the world...

First and foremost, utmost persons not "technology inclined" have no clue at all about the Deep web. 90% of the ones who have some idea, have the wrong idea...

So here it is the reality of the Deep Web (again this is technically incorrect at some levels, its just an easy approach Iam giving for everyone to understand)

When someone refers to the Deep web, they are talking about websites that are not reachable by normal "web browsers"

To access them you need to use the Tor browser because it connects to the network (Internet) where the deep web pages are located.

The Deep web is a place OPEN for EVERYONE where you can host several services like websites, all different kind of services, IM, Radio, Video, etc.

Exactly the same as open Internet, with the difference that it runs under the Tor network. This is an anonymous, non centralized Network which grants a huge level of anonymity to its users!

 

[quadradoadsense]







 

What the Deep web is NOT is a place were are all the hackers, were drugs/weapons are sold or a pedophile paradise!

What the Deep web is. An anonymous Internet open for everyone.

But not everyone is the same! And some groups like Hackers, pedophiles, drug dealers, etc. Found it quite useful to be anonymous :) So they use it as much as they can, and websites/markets offering "illegal" or not so "moral" items and articles. Created by them, started to emerge all over the Deep web, to that "section" of the Network we call it by Dark web.

The Dark web is not the Deep web and is far away from the real idea behind the Deep web.

 

Why people don't know anything about the deep web? Most don't even know it really exists. It's way beyond me! It seems to be the obvious reason is that, its not in Governments and even the Dark web users best interest's for the truth to be told. The deep web is under NO ONE control. The last real Anarchist bastion out there.

 

 

Some links on this page you may be interested in:

 

Tor Browser Using it and testing it for the first time

Deep web (basics myths and opinion)

Deep web and Dark web

Saturday, March 5, 2016

Bitcoin and the Deep-Web:

bitcoin and its connection with the deep-web has been well documented and well known to all that are interested in it. A Wikipedia definition states that Bitcoin, invented by Satoshi Nakamoto satoshi nakamoto, is an open-source software which is peer-to-peer; it allows its users to carry out transactions without a “middle man

Now we know what the Deep-web is and also its instrumental role in elevating Bitcoin to the level it is at today.

 

DoS and DDoS attacks - Basics


DoS and DDoS attacks - Basic notionsDDoS


DoS or (Denial of services) attacks are a way to exploit a user resources in a way the “services ” become unavaliable.

While DDoS stands for (Distributed Denial of Service) attacks. Are the same as DoS except that they use hundreds, or even thousands of machines to flood the services and cause the malfunction.

Usually this is performed by flooding the service with ICMP packets forcing a server to respond to the request by the attackers (this is achieved by the need to reply to the ICMP packet). Other attacks including sending malformed ICMP packets, flooding the site with resource requests, or SYN flood attacks.


Despite the ICMP traffic uses the TCP protocol, this kind of attack will not work on a Tor network. There are hundreds of reasons for .onion websites and markets to become unavailable, but rest assure a ICMP attack is not one of them.


But when this kind of attack is targeted at the Clearnet for example against www.facebook.com. Over and over again they keep being successful.


Or another method of achieving the same result- Ping of death attack (catchy name right!)ping-of-death


This attack is accomplished in two different ways, the first method is quite obvious, just send too many packages to flood the system. A system using Windows as the absolute packet size limit of 64K (65535 bytes).


This means that if you are able to send packets larger then the 64k limit, it will either completely crash down the system, or it will enable the attacker to successfully perform a privilege escalation attack. Flooding the site with requests for resources (videos, pictures, login requests, etc.)


To prevent this attacks you need to focus more on the hardware control then the implementations with the site itself. If you are hosting and managing both, the server and the website, you should try to enable ingress filtering over your network, to stop some of the attacks on the spot. If you use the backscatter traceback method  you will be able to do just that.


Also take care to block the ICMP packets looking for your external interface (the WAN). Take special attention to block all the "unallocated source address'".


Following these steps you will not stop a DDoS, but you certainly will weaken the effect.




Tools for DDos and DoS attacks


Friday, March 4, 2016

Improve Windows performance 3 simple tips

If you are using Microsoft Windows as your main operating system, you will notice that after sometime in use it gets much slower then what it was when you just started it.

Why?
This happens because Windows does a very poor job when it comes down to memory management.slow windows

Your System gets flooded with Idle Tasks that slowly but steadily will make your computer run slower and slower by taking up your RAM.

There are many ways to fix this when it happens.

On this article I will give you:


3 easy Tips on how to Improve Windows performance.


 

The first tip I will have for you so you can Improve Windows performance, is to restart your Windows frequently. And after you turn off you PC wait at least 7 seconds for the memory completely dissipate.

If you don't want to restart your Computer frequently (I know it is boring and time consuming) then you can use my second tip for speeding up your Windows System. Use some Ram saver software!

There are a lot of Free Ram cleaner software available on the Internet. But here are some more Links for you to use:

Click any of the links below:

 

                          > Cleanmem   > Minimem   > MaxMem   > RamRush

 



 

 

The way this memory optimizers work is by creating a virtual process that loads a lot of RAM memory and immediately releasing it. But be aware this is just a temporary solution to the problem. In a worst case scenario this applications can slow down even more your system, there is nothing better then a Reboot.

Wednesday, March 2, 2016

Socks Proxy Finder AKA Pfinder

Socks Proxy Finder or Pfinder is a program to scan for Socks proxies.
A comment from a person in China said that

Proxy Hunter could miss Socks proxies that Pfinder

would find. Pfinder does not allow entry of a

string to match up with a webpage, and it

does not allow a webpage URL to be entered

(unlike Proxy Hunter).

This time I will give you a great tool to download. No ads, virus, spyware. Not even going to use sharecash in this one, you just need to click the link and Download!

But the file is hosted on a free file sharing website on the deep web, so you need to access it through your Tor browser.

If you don't know how to get the Tor browser you can see on this Link

There is a lot of interest around the Dark Web to get some Socks proxies. Normally people will pay a lot of money for some Socks that will only work for a few days. With this small and old application (Socks Proxy Finder) you can find your own Socks proxy.

You do not need to install Socks Proxy Finder on your computer, you just need to unpack it and run.

[caption id="attachment_829" align="aligncenter" width="406"]This is a screenshot from the application running on my computer: Socks Proxy Finder This is a screenshot from the application running on my computer:[/caption]

[ads1 adsenselinks=""]

Sunday, February 28, 2016

Security Tips for Firefox and TOR browser

One of the best browsers available for general purposes use is the Mozilla Firefox browser.tor logo

If you like your online privacy and security, you really must download the Tor browser version! See how to HERE

Even with the Tor browser, we can still add some extra safety tweaks to make it better.

To do this you need to open the menu (top right) and select Add-ons. (as alternative you can just type about:addons on the url part, it will bring up the same window).

Here we can search for extensions on the Mozilla browser, and there are very useful extensions we can get to get that extra layer of security and anonymity.

Iam going to suggest to you 5 essential extensions for your privacy and security.

Top 5 extensions for Privacy and Security on the Firefox browser:

[ads1 adsenselinks=""]

Friday, February 26, 2016

File Slack - What is it?

Understanding File slack


To understand file slack, one first needs to understand how disks are organized at the lowest level.
As can be seen in the diagram below, disks are subdivided into a set of tracks.
- These tracks are further subdivided into a set of sectors and collection of sectors form together to make a cluster.
- If you write a 1 KB file that has a cluster size of 4 KB, the last 3 KB is wasted.

This unused space between the logical end‐of‐file and the physical end‐of‐file is known as slack space.
The perhaps somewhat unexpected consequence from this is that the file slack contains whatever data was on the disk before the cluster was allocated, such as data from previously deleted files. Using file slack, it would be possible not only to recover previously discarded (and potentially sensitive information) information, but also to effectively hide data. The ability to hide data arises because the operating system does not modify data within a cluster once it has been allocated. This means that any data that is stored in the slack is safe (provided the files size does not change).

file slack[ads1 adsenselinks=""]

Thursday, February 25, 2016

steganography use it to hide a text file on a image

Now Iam going to teach you a very easy way to hide a text document inside an image file.
This process is called steganography. I already talked about it in this previous post LINK but I did not give any tutorial.
Iam making one now with step by step instructions and some visual help :)
The best part about this, is that you do not need any special software to do it! a simple comand line under Windows will do the trick.

Lets Start the Instructions:


For this tutorial I am going to hide a text file inside a jpg image.
step11- Choose an image and a text document
1.2- Create a new folder on your hard drive, in my case I named my folder "a"
1.3- copy the text and the image file inside the folder, to make it easier in further steps you can rename the files with short names like 1 for the image and 2 for the text.

Ok step one is done, now you should have something on your computer similar to the image on the left.

 

 

 




Step 22-
Open a Command Prompt window. To do this go to the start menu and write cmd, then just click on the Command Prompt icon (I suggest you press CTRL+SHIFT and click the icon to run as an administrator)
If a new window with letters appeared then you are almost done! (Image on the right).

 

 

3- To proceed we need to locate and access the folder where we have our files. To navigate through the command prompt you need to use the cd command. Write cd\ and press the enter key.
3.1- Continue and write cd a (if a is the name of the folder you created on the first step)
3.2- You are inside the folder a. But just to make sure everything is in place write dir and press enter.
3.3- You are going to see the name of the image and the text document. If you renamed them as I said, you got 1.jpg and 2.txt
insert the following command: copy /b 1.jpg + 2.txt hiddentext.jpg
Press enter

 

Wednesday, February 24, 2016

VPN service What is it?

VPN serviceA VPN service is a must have to remain anonymous on the Internet .
Altough it is far far away from being enough to be anonymous, it is a vital step for security reasons.

Not only for shady reasons like if you are trying to hack or card some website, but because a good VPN service provider can guarantee you that your real IP is hiden from every user that attempts to locate you.

What is a VPN service?


For a start I recomend you take a look at Wikipedia in this LINK

If you are not in the mood to read right now, what it says in a nutshell is that a Virtual Private Network (VPN) is a service that extends your local network across a public network. Not following?
I will make it easier for the reader.
When you connect your PC at home to the Internet you are creating a "private network" in this case the network can be a single computer (your's)
After you connect to the Internet, to be able to browse websites, chat, skype whatever you need to use the TCP/IP protocol. And you need to share your IP with the other person/computer/service to be able to use it.
When you share your IP address people can find a lot of information about you, just like sharing your home address, that is why search engines like Google automatically load in the right language for you.
What a VPN service provider does is: It connects to the Internet on the USA, logically it gets an US IP address. Then the service allows you to connect directly to him, and when you make anything online the information travels through the VPN service instead of your own Private Network, that way your real IP is kept hidden and websites don't know where you really are.

I will approach this topic with much more detail later on, right now Iam going to leave you with several VPN Links, you can also read the information on their websites, check the prices, and choose the best one to fit your needs.

Tuesday, February 23, 2016

IRC for tor. How to Setup and configure

How to set up IRC for Tor using Pidgin as a client. pidgin for tor

On this post I will approach the IRC. IRC stands for Internet Relay Chat and basically is an online chat room. Very popular during the 90's it started to die slowly when msn came out, then ICQ and social websites killed it completely.

But IRC is still a great tool to learn stuff and meeting new people.

Groups like Anonymous frequently use IRC services to organize and exchange ideas, you can read more about Anonymous HERE.

Offcourse this kind of groups catch the interest of the authorities, so using irc with tor was one of the ways to keep them self's away  from harm.

After this brief introduction I will give you step by step instructions on how to set up IRC for tor.

 



1. Download your IRC client. Personally, I use Pidgin. The link is provided for you:

Sunday, February 21, 2016

.onion domain what is it and how to enter it?

onionIf you find a website ending in .onion and after you clicked the link an error page appeared.
That happened because you probably do not have the Tor browser installed on your system.
you can read how to install the Tor browser in this post:
http://www.securityfreak.info/security/using-and-testing-tor-browser-for-the-first-time
With everything installed and running, now you can open you .onion link on your Tor browser.

But .onion domain what exactly is this?
A .onion is a top level domain just as .com or .net, with the difference it is not spread through the regular Internet dns system, instead it uses the Tor proxy to protect the privacy from both the publishers and it's users!
You can read all the details in the wikipedia link: https://en.wikipedia.org/wiki/.onion

but there is not much more to it. .onion domain in a nutshell, is a top level domain allocated in the Tor network that must be accessed through the Tor network.
You can find 10 good .onion websites in this post http://www.securityfreak.info/tips/10-deepweb-pages-and-its-description-onion-link/ with topics ranging from Cat trivia to hired assassination services :)

We also offer you several .onion links on the right panel of your browser from posts that I already made on this blog.
I hope I was clear with this post, any questions do not hesitate to leave as a comment, thanks.

Monday, February 15, 2016

Start with Carding

OK, so you want to card, eh? You see that Mac portable that's $5000, and know you could handle one.

You don't have to save up for 3 years to get it either.
The answer is CREDIT CARD FRAUD. It's a multi-million dollar a year fraudulent scheme for those who know how to do it.
All you need to do is invest 2 minutes of you time to get ANYTHING that you want.

Saturday, February 13, 2016

Setting up TrueCrypt, Encrypted Hidden Volumes

If you save anything on your computer, it is likely that you do not want just anyone to be able to see what you have saved. You want a way to protect that information so that you can access it, and absolutely no one else except those you trust. Therefore, it makes sense to set up a system which protects your information and safeguards it against prying eyes.
The best such system for this is called "True Crypt". "True Crypt" is an encryption software program which allows you to store many files and directories inside of a single file on your harddrive.
Further, this file is encrypted and no one can actually see what you have saved there unless they know your password.
This sounds extremely high tech, but it is actually very easy to set up. We are going to do so, right now:

1. Go to http://www.truecrypt.org/downloads (or go to www.truecrypt.org, and click on "Downloads")
2. Under "Latest Stable Version", under "Windows 7/Vista/XP/2000", click "Download"
3. The file will be called "True Crypt Setup 7.0a.exe" or something similar. Run this file.
4. If prompted that a program needs your permission to continue, click "Continue".
5. Check "I accept and agree to be bound by these license terms"
6. Click "Accept"
7. Ensure that "Install" is selected, and click "Next"
8. click "Install"
9. You will see a dialog stating "TrueCrypt has been successfully installed." Click "Ok"
10. Click "No" when asked if you wish to view the tutorial/user's guide.
11. Click "Finish"
At this point, TrueCrypt is now installed. Now we will set up truecrypt so that we can begin using it to store sensitive information.

1. Click the "Windows Logo"/"Start" button on the lower left corner of your screen.
2. Click "All Programs"
3. Click "TrueCrypt"
4. Click the "TrueCrypt" application

And now we can begin:
1. click the button "Create Volume"
2. Ensuring that "Create an encrypted file container" is selected, click "Next"
3. Select "Hidden TrueCrypt volume" and click "Next".
4. Ensuring that "Normal mode" is selected, click "Next"
5. Click on "Select File"
Note which directory you are in on your computer. Look at the top of the dialog that has opened and you will see the path you are in, most likely the home directory for your username. An input box is provided with a flashing cursor asking you to type in a file name. Here, you will type in the following filename:
random.txt
You may of course replace random.txt with anything you like. This file is going to be created and will be used to store many other files inside.
Do NOT use a filename for a file that already exists. The idea here is that you are creating an entirely new file.
It is also recommended though not required that you "hide" this file somewhere less obvious. If it is in your home directory, then someone who has access to your computer may find it easier. You can also choose to put this file on any other media, it doesn't have to be your hard disk. You could for example save your truecrypt file to a usb flash drive, an sd card, or some other media. It is up to you.
6. Once you have typed in the file name, click "Save"
7. Make sure "Never save history" is checked.
8. Click "Next"
9. On the "Outer Volume" screen, click "Next" again.
10. The default Encryption Algorithm and Hash Algorithm are fine. Click "Next"
11. Choose a file size.
In order to benefit the most from this guide, you should have at least 10 gigabytes of free disk space. If not, then it is worth it for you to purchase some form of media (such as a removable harddrive, a large sd card, etc.) in order to proceed. TrueCrypt can be used on all forms of digital media not just your hard
disk.
If you choose to proceed without obtaining at least ten gigabytes of disk space, then select a size that you are comfortable with (such as 100 MB).
Ideally, you want to choose enough space to work with. I recommend 20 GB at least. Remember that if you do need more space later, you can always create additional TrueCrypt volumes using exactly these same steps.

12. Now you are prompted for a password. THIS IS VERY IMPORTANT. READ THIS CAREFULLY
*** READ THIS SECTION CAREFULLY ***

The password you choose here is a decoy password. That means, this is the password you would give to someone under duress. Suppose that someone suspects that you were accessing sensitive information and they threaten to beat you or worse if you do not reveal the password.
THIS is the password that you give to them.
When you give someone this password, it will be nearly impossible for them to
prove that it is not the RIGHT password.
Further, they cannot even know that there is a second password.

Here are some tips for your password:

A. Choose a password you will NEVER forget. It may be ten years from now that you need it.
Make it simple, like your birthday repeated three times.

B. Make sure it seems reasonable, that it appears to be a real password. If the password is something stupid like "123" then they may not believe you.
C. Remember that this is a password that you would give to someone if forced. It is *NOT* your actual password.
D. Do not make this password too similar to what you plan to really use. You do not want someone to guess your main password from this one.
And with all of this in mind, choose your password. When you have typed it in twice, click "Next".

13. "Large Files", here you are asked whether or not you plan to store files larger than 4 GIGABYTES.
Choose "No" and click "Next"
14. "Outer Volume Format", here you will notice some random numbers and letters next to where it says "Random Pool". Go ahead and move your mouse around for a bit. This will increase the randomness and give you better encryption. After about ten seconds of this, click "Format".
15. Depending on the file size you selected, it will take some time to finish formatting.
"What is happening?"
TrueCrypt is creating the file you asked it to, such as "random.txt". It is building a file system contained entirely within that one file.
This file system can be used to store files, directories, and more.
Further, it is encrypting this file system in such a way that without the right password it will be impossible for anyone to access it.
To *anyone* other than you, this file will appear to be just a mess of random characters. No one will even know that it is a truecrypt volume.
16. "Outer Volume Contents", click on the button called, "Open Outer Volume"
An empty folder has opened up. This is empty because you have yet to put any files into your truecrypt volume.

*** *** DO NOT PUT ANY SENSITIVE CONTENT HERE *** ***

This is the "Decoy". This is what someone would see if you gave them the password you used in the previous step. This is NOT where you are going to store your sensitive data. If you have been forced into a situation where you had to reveal your password to some individual, then that individual will see whatever is in this folder. You need to have data in this folder that appears to be sensitive enough to be protected by truecrypt in order to fool them. Here are some important tips to keep in mind:

A. Do NOT use porn. Adult models can sometimes appear to be underaged, and this can cause you
to
incriminate yourself unintentionally.
B. Do NOT use drawings/renderings/writings of porn. In many jurisdictions, these are just as illegal
as
photographs.
C. Good choices for what to put here include: backups of documents, emails, financial documents,
etc.
D. Once you have placed files into this folder, *NEVER* place any more files in the future. Doing so may damage your hidden content.
Generally, you want to store innocent data where some individual looking at it would find no cause against you, and yet at the same time they would understand why you used TrueCrypt to secure that data.
Now, go ahead and find files and store them in this folder. Be sure that you leave at least ten gigabytes free. The more the better.
When you are all done copying files into this folder, close the folder by clicking the "x" in the top right corner.
17. click "Next"
18. If prompted that "A program needs your permission to continue", click "Continue"
19. "Hidden Volume", click "Next"
20. The default encryption and hash algorithms are fine, click "Next"
21. "Hidden Volume Size", the maximum available space is indicated in bold below the text box.
Round
down to the nearest full unit. For example, if 19.97 GB
is available, select 19 GB. If 12.0 GB are available, select 11 GB.
22. If a warning dialog comes up, asking "Are you sure you wish to continue", select "Yes"
23. "Hidden Volume Password"

*** IMPORTANT READ THIS ***
Here you are going to select the REAL password. This is the password you will NEVER reveal to ANYONE else under any circumstances. Only you will know it. No one will be able to figure it out or even know that there is a second password. Be aware that an individual intent on obtaining your sensitive information may lie to you and claim to be able to figure this out. They cannot.
It is HIGHLY recommended that you choose a 64 character password here. If it is difficult to remember a 64 character password, choose an 8 character password and simply repeat it 8 times. A date naturally has exactly 8 numbers, and a significant date in your life repeated 8 times would do just fine.
24. Type in your password twice, and click "Next"
25. "Large Files", select "Yes" and click "Next".
26. "Hidden Volume Format", as before move your mouse around for about ten seconds randomly,
and
tehn click "Format".
27. If prompted "A program needs your permission to continue", select "Continue"
28. A dialog will come up telling you that the hidden TrueCrypt volume has been successfully
created.
Click "Ok"
29. Click "Exit"
Congratulations! You have just set up an encrypted file container on your hard drive. Anything you store here will be inaccessible to anyone except you.
Further, you have protected this content with TWO passwords. One that you will give to someone under threat, and one that only you will know. Keep your real password well protected and never write it down or give it to anyone else for any reason.
Now, we should test BOTH passwords.

disable your swap space on Windows 7

*This instructions are recommended for advanced users only. If you are not comfortable doing this, you may
safely skip this step.*
Instructions are less verbose than usual, as these steps are intended for advanced users only. If you do not fully understand these instructions, skip this step.
1. From Control Panel, go to "System and Security".
2. Click on "System", and then choose "Advanced system settings" in the left-most menu.
3. Under the "Advanced" tab, under "Performance", click "Settings".
4. Under this "Advanced" tab, under "Virtual Memory", click "Change"
5. Uncheck "Automatically manage paging file sizes for all drives"
6. Select "No paging file"
7. Save, reboot, and follow these same first 5 steps to confirm that "No paging file" is still selected.
This means that you have successfully disabled your swap. This means that *nothing* from RAM will be inadvertently saved to your harddrive.
To resume using SWAP again, simply click "Automatically manage paging file size for all drives."
You can switch between these two modes as you desire.
Generally speaking, your computer will run fine without a swap file, provided you have enough RAM.