{Absolution} |6 Layer Anonymity|KillSwitch|Anti-Fingerprint|DNS Leak|PortForward {ONLY $10}

Discussion in 'Software Sales' started by NoodleBot, Aug 4, 2016.

{Absolution} |6 Layer Anonymity|KillSwitch|Anti-Fingerprint|DNS Leak|PortForward {ONLY $10}
  1. Unread #1 - Aug 4, 2016 at 5:05 PM
  2. NoodleBot
    Joined:
    Aug 4, 2016
    Posts:
    5
    Referrals:
    0
    Sythe Gold:
    6

    NoodleBot Newcomer

    {Absolution} |6 Layer Anonymity|KillSwitch|Anti-Fingerprint|DNS Leak|PortForward {ONLY $10}

    Purchase at Absolution
    Purchase at Absolution
    Purchase at Absolution

    - Optimized for Windows XP/Vista/7 -
    Do you have a VPN or proxy but still don't feel secure?
    Accessing Tor?
    Downloading torrents?
    Travel a lot?
    Accessing public Wi-Fi?
    Absolution will deliver where all are lacking.


    Users wishing to pay with Perfect Money may contact me to complete this transaction.

    SafeHaven Software™ :: Home
    -
    SafeHaven Software™ Proudly Presents...

    Note: Pay with Bitcoin, Litecoin or Perfect Money to preserve on privacy and security.
    [​IMG] [​IMG] [​IMG]
    Note: Pay with Bitcoin, Litecoin or Perfect Money to preserve on privacy and security.



    [​IMG]

    [​IMG]

    [​IMG]

    [​IMG]

    [​IMG]

    [​IMG]

    [​IMG]



    Frequently Asked Questions

    ---------
    Q: How does the kill switch function? Why does this help?


    A: Applications added here will be automatically closed during a VPN or general network failure. This will attempt to stop any leakage of your DNS by communicating software and other services, acting as a superior first line of defense.


    ---------
    Q: Why is my MAC address important?


    A: Virtually every OS on the market today is capable of communicating over Ethernet networks and has the ability to set the MAC address of its NIC. The default MAC address of a NIC, in most cases, is “burned” into the card, but that address can be overridden by software. It is unfortunately not known or common knowledge that your MAC address can be changed or set. Many users are using the manufacturer's hard-coded MAC address by default, never having changed it.

    Q: Why do you need to change your MAC address?


    A: Well, a very important reason is privacy. Just like an IP address is your ID on the internet, a MAC address is your ID on the local Ethernet network. Recently, as the rise of mobile networks, with Wi-Fi & Bluetooth hotspots everywhere, the privacy implications of MAC address tracking have been the subject of increasing debate.
    You can visit the following links for more information;

    Edward Snowden: The Untold Story

    Why & How to Change MAC Address - DestroyADWare.com

    ---------
    Q: Why is my Hostname important?

    A: This name, just like your computer name are given to you by your computer manufacturer or set by yourself during installation of your OS. This information can be personally revealing, as most people like to personally name their computers to make it all the more your own. Unfortunately, a computer name such as John-PC or Mike-Home can narrow down an attackers search, or enlighten them to further attack such as blackmail or being 'doxed'.

    You may visit the following links for more information;

    What is a Hostname?



    ---------
    Q: Why is my Computer name important?

    A: For the same reason as your Hostname, privacy is of the essence here. There are numerous exploits and normal everyday functions on the web today that will attempt to grab your computer name or hostname's to personalize their content towards you, possibly even greeting you by the name of your computer on your next return. These bits of personally identifiable information can add up quickly and assist attackers or marketing and advertisement firms from building a digital fingerprint of your computer and the user using it.



    ---------
    Q: Why is my NetBIOS important?


    A: A computer's NetBIOS name is more often than not, the exact same as the computer's Hostname, though it does not by any means have to. When a computer is started, various services (such as the server service or the workstation service) register a unique NetBIOS name based on the computer name. As with the hostname, this information can be supplemented to assist in building a computer's digital fingerprint.

    NetBIOS Names

    ---------
    Q: What is the VPN Detection option for?


    A: This will simply check for connected VPN adapters on your network to identify whether you are connected to a VPN or not. This process will aid in serving you content such as DNS servers, adding websites to your exclusion lists, and more. You may also find a ping function to allow you to test the speed of how long your network takes to communicate between a website.



    ---------
    Q: What is the VPN Bypass option for?


    A: Frequently I have seen it asked online; "How can I visit 'x' site whilst connected to a VPN, but using my regular IP address instead?"
    This is a very handy feature that allows for users to visit a website that they may be blocked or banned from accessing on their VPN server. With this feature, Websites get resolved to their IP addresses, and then are simply re-routed from your VPN IP address towards your main connection IP address instead.




    ---------
    Q: What is the DNS Leak Fix option for?


    A: Your ISP provides you with a DNS server that is automatically configured on your router, which in turn applies this ISP owned DNS server to any device connected to your network. Your ISP's DNS server can be restored at any time by logging into your authorized router or modem device.


    This feature will grant you access to 5 premium DNS servers that have been included with the software to offer greater diversity and functionality. You may also choose to set your own DNS servers. Using DNS servers has many different reasons and their own set of pro's and con's, but the main purpose is that they can ultimately serve different uses. Some DNS servers are set up specifically to help block spam or ads, while others may block pornography and other gray-areas of the web entirely! Depending on the DNS servers used, generally network speeds can increase or decrease, with or without added functionality.



    ---------
    Q: What is the Quick Repair option for?


    A: Quick Repair will, as it says, quickly use the Windows based diagnostic tools in the background to reset and flush your network connection. This can be used to troubleshoot problems such as a DNS server failure, VPN server failure, or a temporary weakness or drop in signal.




    ---------
    Q: What's with the Install/Uninstall Win TAP?!


    A: Don't be alarmed. These drivers are essential when connecting to most VPN's using the OpenVPN protocol - so you might even have this already. You will not need to use these options unless something seems to be wrong with your VPN client or configuration files. This can happen for a number of reasons, including recently installed software and updates. Whilst this option will provide you with the latest TAP drivers, it is often best to do a complete uninstall, removing traces of the OpenVPN software and rebooting before proceeding to reinstall OpenVPN.


    ---------
    Q: What is the Disable WebRTC option for?


    A: WebRTC is a designed protocol online that has served to provide support for real-time and browser-to-browser applications for voice calling, video chat, P2P file sharing and other services. Specifically, when behind a VPN service, WebRTC has a habit of revealing the users actual IP address. A quick-fix solution, WebRTC block will take effect on as many browsers as possible.


    ---------
    Q: What is the Clear System Logs option for?


    A: These are logs that are created by your system for diagnostic, administrative and security purposes. Most machines will never have cleared this information, leaving logs back from day 1 of installation, or your purchase date. In establishing a digital fingerprint, these logs would prove that you installed specific software, performed actions, experienced software or network crashes, BSOD's, error codes and other information. For what exactly can determined from these logs, feel free to check out your
    "Event Viewer".



    ---------
    Q: What are the main settings for?


    A: This page will allow you to use the Machine tab automatically, every time your computer starts. This will ensure that you have the most secure possible experience, by using a new ID (Hostname, Computer name, NetBIOS and MAC) to give the user the anonymity they deserve.




    ---------
    Q: What is the chart for, and what is it monitoring?


    A: This graph has been designed to display and monitor the bandwidth flow through your connected network. With monitoring, you are able to determine how much data is being used up each day, week or month. This is particularly useful for customers with ISP's that restrict their bandwidth to a monthly limit, monitoring their bandwidth will allow the user to pace themselves or keep from going over - and spending more money on their bill then they need to.



    ---------
    Q: What are the Main Settings for?


    A: These settings will allow the user to automate their task, having a new computer ID (MAC address, Hostname, Computer name, and NetBIOS) randomized each time the computer
    starts up, giving you a superb line of defense by changing this vital and private information. Your computer ID is extremely important to privacy; and security. Wi-Fi attackers will need your MAC address and other information to perform their attacks correctly and efficiently. This combination of security improvements makes it a lot harder, if not impossible, to efficiently gain access to your network or machine.

    ---------
    Q: What are the 6 layers of anonymity?

    A:
    1'st Layer: The Kill Switch will eliminate any processes and communication services that are leaking or revealing unspecified or unintentional information, acting as a superior first line of defence.

    2'nd Layer: Consider it this way, "No MAC, no communications". With the MAC address module you have the ability to set a specific address, or to completely randomize it instead.

    3'rd Layer: A host name is a Fully Qualified Domain Name (FQDN) which provides your computer with a unique name. Through various advanced HTTPS exploits and Man-in-the-Middle (MITM) attacks, your computer's hostname can be left exposed to attackers or eavesdroppers, allowing them to establish your digital-fingerprint.
    With HTTPS, what information would a MitM attacker be able to glean?

    4'th Layer: Your computer name is just that; a computer name. You most likely named it "John", "Work", "Home" or something similar when first setting up your computer. Many various services and websites gather this data to personalize services and cater advertisements towards you. Not to mention any sneaky malware is another reason to keep a strong computer name, as an attacker could only have to look at their list of victims to identify you by name.

    5'th Layer: NetBIOS was designed in the early 1980's to allow specific applications to have the capability to communicate over a network. NetBIOS provides support for the following services; Network name registration and verification, Session establishment and termination, Reliable connection-oriented session data transfer, Unreliable connectionless datagram data transfer, and protocol and adapter monitoring management.

    6'th Layer: A good DNS server supports both high performance and reliability. Especially on high-traffic networks, DNS servers must handle a significant load of name and address look-ups to support Web browsing, email and other usages. They can include more specific uses such as filtering spam, blocking specific websites or just trying to get the best speeds possible from your network.


    Purchase at Absolution
    Purchase at Absolution
    Purchase at Absolution
     
    Last edited: Sep 1, 2016
  3. Unread #2 - Aug 10, 2016 at 1:27 AM
  4. NoodleBot
    Joined:
    Aug 4, 2016
    Posts:
    5
    Referrals:
    0
    Sythe Gold:
    6

    NoodleBot Newcomer

    {Absolution} |6 Layer Anonymity|KillSwitch|Anti-Fingerprint|DNS Leak|PortForward {ONLY $10}

    This product is still for sale. Please purchase by clicking on the link at Purchase at Absolution or by messaging me.
    Do not hesitate to post with any questions, comments or concerns. Or feel free to message them to me.
     
  5. Unread #3 - Aug 19, 2016 at 8:54 PM
  6. NoodleBot
    Joined:
    Aug 4, 2016
    Posts:
    5
    Referrals:
    0
    Sythe Gold:
    6

    NoodleBot Newcomer

    {Absolution} |6 Layer Anonymity|KillSwitch|Anti-Fingerprint|DNS Leak|PortForward {ONLY $10}

    Please click anywhere on the graphics to be taken to the purchase page!
    Start protecting your privacy online today. With Absolution, you are guaranteed a fresh digital fingerprint every time your computer is turned on, saving loads of time and without the need to configure complicated software!
     
  7. Unread #4 - Sep 1, 2016 at 10:44 PM
  8. NoodleBot
    Joined:
    Aug 4, 2016
    Posts:
    5
    Referrals:
    0
    Sythe Gold:
    6

    NoodleBot Newcomer

    {Absolution} |6 Layer Anonymity|KillSwitch|Anti-Fingerprint|DNS Leak|PortForward {ONLY $10}

    There is a sale on Absolution this month - we are currently 50% off. Apply the discount code HF50 at checkout to get absolution for just $14.99
     
< Selling Websites - Semi Proffessional - Wordpress and custom - FIRST TO PM ON SKYPE GETS ONE FOR 75$ | WINDOWS 10 PRO 32/64BIT LICENSE KEY - LIFETIME ACTIVATION CODE - GENUINE >

Users viewing this thread
1 guest


 
 
Adblock breaks this site