Looksmax - Men's Self Improvement Forum

Welcome to the ultimate men’s self-improvement community where like-minded individuals come together to level up every aspect of their lives. Whether it’s building confidence, improving your mindset, optimizing health, or mastering aesthetics, this is the place to become the best version of yourself. Join the hood and start your transformation today.

Guide Guide to CyberSecurity (2 Viewers)

Guide Guide to CyberSecurity

Child of Shadows

Shadow Slave, Sunless
Joined
Jan 29, 2026
Posts
55
Reputation
720
SURVIVAL PROTOCOL: CYBERSECURITY A Practical Guide to Protecting Your Digital Existence


⚠️ DISCLAIMER: DEFENSIVE USE ONLY This guide is for educational purposes. Protecting your systems is your right. Attacking others is a crime. Do not cross the line.


I. THE FIRST LINE OF DEFENSE: IDENTITY Your accounts are your digital life. If they fall, you fall. Secure them now.

  • Password Hygiene: Never reuse passwords. If one site leaks, all your accounts are at risk. Action: Use a Password Manager (Bitwarden, 1Password, KeePass). Generate 16+ character random strings. Multi-Factor Authentication (MFA): This is non-negotiable. SMS is okay, but an Authenticator App (Authy, Google Authenticator) or Hardware Key (YubiKey) is better. Action: Enable MFA on Email, Banking, and Social Media immediately.
  • Recovery Options: Ensure your recovery email and phone number are secure. If an attacker changes these, they own you.




II. HARDENING THE DEVICE Your computer and phone are your gates. Keep them locked.
Code:
 // SECURITY CHECKLIST [ ] OS Updated? [ ] Antivirus Active? [ ] Firewall On? [ ] Unknown Apps Removed?

  • Updates: When an update comes, install it. It patches holes attackers use. Action: Enable Automatic Updates for OS and Browser. Antivirus/Anti-malware: You need a sentinel. Windows Defender is sufficient for most, but third-party tools exist. Action: Run a full scan weekly. Do not download "cracked" software.
  • Permissions: Apps don't need access to everything. Action: Revoke camera, mic, and location access for apps that don't need it.




III. NAVIGATING THE WEB SAFELY The internet is a minefield. Walk carefully.

  • Phishing Awareness: Emails asking for urgency are lies. Action: Hover over links to see the real URL. Check the sender address carefully. Downloads: Only get software from official stores or vendor sites. Action: Avoid torrent sites and "free" premium software. Public Wi-Fi: Coffee shops and airports are dangerous. Action: Use a VPN or Mobile Hotspot for sensitive tasks. Never log into banking on public Wi-Fi. Browser Hygiene: Clear cookies. Use privacy-focused extensions (uBlock Origin, Privacy Badger).




IV. DATA BACKUP & RECOVERY If the worst happens, you need a way back. Ransomware doesn't care about your feelings.

  • The 3-2-1 Rule: 3 copies of data, 2 different media types, 1 offsite. Action: External Hard Drive + Cloud Storage (Backblaze, Google Drive, OneDrive). Offline Backups: Keep one backup disconnected from the network. Action: Unplug your backup drive after syncing. Ransomware can't reach it if it's offline.
  • Test Your Backups: A backup you can't restore is useless. Action: Try restoring a file once a month to ensure it works.




V. PRIVACY & DIGITAL FOOTPRINT The more you reveal, the more you can be targeted. Minimize your exposure.

  • Social Media: Don't post your location in real-time. Don't post photos of your ID or mail. Action: Lock down profiles. Limit who can see your friends list and posts. Data Brokers: Companies sell your info. You can opt-out. Action: Use services like DeleteMe or manually request removal from data broker sites.
  • Email Security: Use aliases for sign-ups. Action: Use services like SimpleLogin or AnonAddy to hide your real email address.




VI. WHAT TO DO IF COMPROMISED If you suspect a breach, act fast. Time is the enemy.

  • Disconnect: Unplug from the internet immediately to stop data exfiltration. Change Passwords: Start with email and banking. Use a clean device if possible. Scan: Run a full malware scan. Monitor: Check bank statements and credit reports for suspicious activity.




Made by Child Of Shadows

© 2026 Cybersecurity Education Initiative. Stay Vigilant. Stay Safe.
 

NoBONES

LOW IQ JESTER
Joined
Nov 29, 2025
Posts
842
Reputation
2,429
SURVIVAL PROTOCOL: CYBERSECURITY A Practical Guide to Protecting Your Digital Existence


⚠️ DISCLAIMER: DEFENSIVE USE ONLY This guide is for educational purposes. Protecting your systems is your right. Attacking others is a crime. Do not cross the line.


I. THE FIRST LINE OF DEFENSE: IDENTITY Your accounts are your digital life. If they fall, you fall. Secure them now.

  • []Password Hygiene: Never reuse passwords. If one site leaks, all your accounts are at risk. Action: Use a Password Manager (Bitwarden, 1Password, KeePass). Generate 16+ character random strings. []Multi-Factor Authentication (MFA): This is non-negotiable. SMS is okay, but an Authenticator App (Authy, Google Authenticator) or Hardware Key (YubiKey) is better. Action: Enable MFA on Email, Banking, and Social Media immediately.
  • Recovery Options: Ensure your recovery email and phone number are secure. If an attacker changes these, they own you.




II. HARDENING THE DEVICE Your computer and phone are your gates. Keep them locked.
Code:
 // SECURITY CHECKLIST [ ] OS Updated? [ ] Antivirus Active? [ ] Firewall On? [ ] Unknown Apps Removed?

  • []Updates: When an update comes, install it. It patches holes attackers use. Action: Enable Automatic Updates for OS and Browser. []Antivirus/Anti-malware: You need a sentinel. Windows Defender is sufficient for most, but third-party tools exist. Action: Run a full scan weekly. Do not download "cracked" software.
  • Permissions: Apps don't need access to everything. Action: Revoke camera, mic, and location access for apps that don't need it.




III. NAVIGATING THE WEB SAFELY The internet is a minefield. Walk carefully.

  • []Phishing Awareness: Emails asking for urgency are lies. Action: Hover over links to see the real URL. Check the sender address carefully. []Downloads: Only get software from official stores or vendor sites. Action: Avoid torrent sites and "free" premium software. []Public Wi-Fi: Coffee shops and airports are dangerous. Action: Use a VPN or Mobile Hotspot for sensitive tasks. Never log into banking on public Wi-Fi. []Browser Hygiene: Clear cookies. Use privacy-focused extensions (uBlock Origin, Privacy Badger).




IV. DATA BACKUP & RECOVERY If the worst happens, you need a way back. Ransomware doesn't care about your feelings.

  • []The 3-2-1 Rule: 3 copies of data, 2 different media types, 1 offsite. Action: External Hard Drive + Cloud Storage (Backblaze, Google Drive, OneDrive). []Offline Backups: Keep one backup disconnected from the network. Action: Unplug your backup drive after syncing. Ransomware can't reach it if it's offline.
  • Test Your Backups: A backup you can't restore is useless. Action: Try restoring a file once a month to ensure it works.




V. PRIVACY & DIGITAL FOOTPRINT The more you reveal, the more you can be targeted. Minimize your exposure.

  • []Social Media: Don't post your location in real-time. Don't post photos of your ID or mail. Action: Lock down profiles. Limit who can see your friends list and posts. []Data Brokers: Companies sell your info. You can opt-out. Action: Use services like DeleteMe or manually request removal from data broker sites.
  • Email Security: Use aliases for sign-ups. Action: Use services like SimpleLogin or AnonAddy to hide your real email address.




VI. WHAT TO DO IF COMPROMISED If you suspect a breach, act fast. Time is the enemy.

  • []Disconnect: Unplug from the internet immediately to stop data exfiltration. []Change Passwords: Start with email and banking. Use a clean device if possible. []Scan: Run a full malware scan. []Monitor: Check bank statements and credit reports for suspicious activity.




Made by Child Of Shadows

© 2023 Cybersecurity Education Initiative. Stay Vigilant. Stay Safe.
DNR watching gay porn on a site rn
Marta 3 km away is waiting for me Gotta go
 

determinism

@determinisnn on tiktok
Joined
Nov 9, 2025
Posts
2,037
Reputation
4,493
Link me to it
download tor, go to fashfront.st, go into the technology sub-forum and its one of the stickied threads

USE TOR WHEN GOING ONTO THIS WEBSITE OR YOU MIGHT GET INTO LEGAL TROUBLE, I FORGOT TO USE TOR AND I DID GET INTO LEGAL TROUBLE
 

determinism

@determinisnn on tiktok
Joined
Nov 9, 2025
Posts
2,037
Reputation
4,493
Do u think i'd be posting this guide and not use tor for an unknown website?
I wasn't telling you specifically, I was putting that there for others who may be intrigued and go onto the website.

Also:
1773240380815.png
1773240420717.png
1773240495171.png
 

Child of Shadows

Shadow Slave, Sunless
Joined
Jan 29, 2026
Posts
55
Reputation
720

Lord of Crime

A heart of ice and a will of fire
Joined
Jan 22, 2026
Posts
9
Reputation
3,224

Child of Shadows

Shadow Slave, Sunless
Joined
Jan 29, 2026
Posts
55
Reputation
720
determinism determinism read the guide u were talking about, it indeed does have more info than mine, could be better aswell..

and it made me realize i missed quite a lot of simple stuff, like mails

Lord of Crime Lord of Crime nice vip

also, there (was) SOME misinfo in that guide, briar is not anonymous
 

determinism

@determinisnn on tiktok
Joined
Nov 9, 2025
Posts
2,037
Reputation
4,493
This post will add on everything that I think Child of Shadows Child of Shadows may have missed, although its a good thread besides some spotty bits in the information. Kudos to you Child of Shadows.



I. THE FIRST LINE OF DEFENSE: IDENTITY Your accounts are your digital life. If they fall, you fall. Secure them now.

  • Password Hygiene: Never reuse passwords. If one site leaks, all your accounts are at risk. Action: Use a Password Manager (Bitwarden, 1Password, KeePass). Generate 16+ character random strings. Multi-Factor Authentication (MFA): This is non-negotiable. SMS is okay, but an Authenticator App (Authy, Google Authenticator) or Hardware Key (YubiKey) is better. Action: Enable MFA on Email, Banking, and Social Media immediately.
  • Recovery Options: Ensure your recovery email and phone number are secure. If an attacker changes these, they own you.
I agree with the first bit with never reuse passwords, but the MFA part has me on the fence. I'd rather trust a Hardware Key than Google Authenticator or Authy, they could easily be breached or lost. Recovery email SHOULD be a fake email address such as altaddress.org.

II. HARDENING THE DEVICE Your computer and phone are your gates. Keep them locked.
Code:
// SECURITY CHECKLIST [ ] OS Updated? [ ] Antivirus Active? [ ] Firewall On? [ ] Unknown Apps Removed?
  • Updates: When an update comes, install it. It patches holes attackers use. Action: Enable Automatic Updates for OS and Browser. Antivirus/Anti-malware: You need a sentinel. Windows Defender is sufficient for most, but third-party tools exist. Action: Run a full scan weekly. Do not download "cracked" software.
  • Permissions: Apps don't need access to everything. Action: Revoke camera, mic, and location access for apps that don't need it.
If you are really keen on updating your OS, switch your OS to Tails or a Linux OS. Windows updates are known for adding more backdoors to your device, further compromising your privacy. I agree with the permissions, try and restrict app permissions as much as you can, if you need to use camera then enable and disable it immediately after, same goes for mic, location, etc.

III. NAVIGATING THE WEB SAFELY The internet is a minefield. Walk carefully.

  • Phishing Awareness: Emails asking for urgency are lies. Action: Hover over links to see the real URL. Check the sender address carefully. Downloads: Only get software from official stores or vendor sites. Action: Avoid torrent sites and "free" premium software. Public Wi-Fi: Coffee shops and airports are dangerous. Action: Use a VPN or Mobile Hotspot for sensitive tasks. Never log into banking on public Wi-Fi. Browser Hygiene: Clear cookies. Use privacy-focused extensions (uBlock Origin, Privacy Badger).
Surely we've all seen that one clip from Mr Robot where Elliot finds that pajeet runs a website for 400k people which is just CP, that was hosted by a Public Wi-Fi. NEVER trust a public wi-fi for anything that may be considered "illegal", or anything private. Use a VPN such as Mullvad, it is the best as they are known for their policy on keeping logs (they don't keep them, google it). Use a browser such as Brave, Mullvad Browser, or TOR Browser when doing stuff you want private. Other browsers may be DuckDuckGo - it has a feature to wipe the browser of all data (search history, cookies, passwords, etc), Firefox Focus - it doesn't save anything except for stuff you want to save, you will be given an option for that.

IV. DATA BACKUP & RECOVERY If the worst happens, you need a way back. Ransomware doesn't care about your feelings.

  • The 3-2-1 Rule: 3 copies of data, 2 different media types, 1 offsite. Action: External Hard Drive + Cloud Storage (Backblaze, Google Drive, OneDrive). Offline Backups: Keep one backup disconnected from the network. Action: Unplug your backup drive after syncing. Ransomware can't reach it if it's offline.
  • Test Your Backups: A backup you can't restore is useless. Action: Try restoring a file once a month to ensure it works.
There are 3 types of backup's, full, incremental and differential. Here's a graph on the three over a week.

1773241124078.png


Full backups should occur once a week, I suggest looking up a YouTube video to understand it better.

V. PRIVACY & DIGITAL FOOTPRINT The more you reveal, the more you can be targeted. Minimize your exposure.

  • Social Media: Don't post your location in real-time. Don't post photos of your ID or mail. Action: Lock down profiles. Limit who can see your friends list and posts. Data Brokers: Companies sell your info. You can opt-out. Action: Use services like DeleteMe or manually request removal from data broker sites.
  • Email Security: Use aliases for sign-ups. Action: Use services like SimpleLogin or AnonAddy to hide your real email address.
NEVER post your ID or email on social media. Only a business email should be posted if you are a famous person. You can pay services to remove your information from data broker sites as stated above, some will also tell you where your information has been leaked or how and what was compromised. They can be a bit pricey sometimes.

VI. WHAT TO DO IF COMPROMISED If you suspect a breach, act fast. Time is the enemy.

  • Disconnect: Unplug from the internet immediately to stop data exfiltration. Change Passwords: Start with email and banking. Use a clean device if possible. Scan: Run a full malware scan. Monitor: Check bank statements and credit reports for suspicious activity.
If you were compromised by a virus, then unplugging from the internet is the first thing you should do. Unplug all your external hard drives, passwords should be saved on a different device like a USB stick with Kleopatra/TailsOS encryption. You should monitor everything that may have been compromised, bank statements, credit reports, website activity, etc.



Despite this being mostly written by AI and/or paraphrased by AI, it 's a pretty good guide. I can find links to PDF files that will further inform you on how to keep yourself safe online, if you are curious then DM me. Other than that, good thread. I recommend taking some of this information on board such as the encryption, browsers, VPNs, etc.

Never trust anyone online with your personal details, no matter who they are.
 

Child of Shadows

Shadow Slave, Sunless
Joined
Jan 29, 2026
Posts
55
Reputation
720
Thanks for expanding further on my guide, can't edit it anymore and i was too lazy so this helps a lot

all info from determinism determinism is true, and as said here
Surely we've all seen that one clip from Mr Robot where Elliot finds that pajeet runs a website for 400k people which is just CP, that was hosted by a Public Wi-Fi. NEVER trust a public wi-fi for anything that may be considered "illegal", or anything private. Use a VPN such as Mullvad, it is the best as they are known for their policy on keeping logs (they don't keep them, google it). Use a browser such as Brave, Mullvad Browser, or TOR Browser when doing stuff you want private. Other browsers may be DuckDuckGo - it has a feature to wipe the browser of all data (search history, cookies, passwords, etc), Firefox Focus - it doesn't save anything except for stuff you want to save, you will be given an option for that.
this is a VERY common issue with most people, they think there's no harm in using a public internet, but most keep track of your info, also probably 100 out of 1,000 public Wi-Fi services are breached, and it's much more common than you think, probably even on the bus you're on...

you're better off investing into mobile data
 

Users who are viewing this thread

Similar threads

Replies
17
Views
179
Godveil Heir
  • Biomaxx
  • Off Topic
Replies
15
Views
196
shape1
shape2
shape3
shape4
shape5
shape6
Top