It’s about time one of the IM encryption methods became the de-facto standard.” buy fullz with id

It’s about time one of the IM encryption methods was chosen as the de facto standard.

Purpose: To motivate people to use something single, simple. Optional: An article on setting up SimpLite.

.

My choice is SimpLite!

It is no secret that the most popular IM-client among us is ICQ, which does not have built-in encryption methods. There are clients with built-in encryption, such as sst (server is down at the moment), jabber and miranda with plugins, but it often happens that people don’t have time to understand interface of new IM-client or it is installed and always off-line due to its unpopularity. I bring to the fact that ICQ many familiar, and the encryption method that I want to tell about works with ICQ (and with all IM-clients working in the ICQ network: QIP, miranda, RQ, etc.), AIM, MSN, Yahoo! Messenger, Jabber/Google. Agree a great choice, and besides the program is free. All you need to do is to install program and set up your IM-client via SimpLite. I even encourage you to do it. Firstly, it will not interfere with your other methods of encrypted communication, because we will all communicate via an encrypted channel. Who better than us to take care of our own security? You can even ask the forum administration to attach this topic with the status of importance.

Program characteristics.

Name: SimpLite Developer: Secway License: Freeware Networking: ICQ, AIM, MSN, Yahoo, Jabber, Google. Encryption method: RSA keys up to 2048 bits. Encryption is done using the following algorithms: AES (up to 128 bits) or Twofish. Environment: Windows 95/98/Me/NT4/2000/XP Website: http://www.secway.fr/ Download-page: http://www.secway.fr/us/products/simim/getsimp.php

Setting up SimLite with ICQ network, with ICQ 2003b client, QIP, Miranda, RQ. (With other clients I think there will be no problems, configuration is similar)

Download the program:

http://download.secway.com/public/prM-2_2_2-en.msi

if the direct link does not download, here is the download-page:

http://www.secway.fr/us/products/simim/getsimp.php

Next double click on the downloaded file. Standard installation procedure: [Next ] – [I agree] – [Next ] – [Next ] – [Next ] – [Next ] – [Next ] – [Close]. Then after installation wizard starts automatically [Next ], choose if warning window will pop up on encrypted/unencrypted communication (can be enabled/disabled later). I choose to turn off the pop-up warnings, as they will pop up a lot, for each person in the contact list. Next, select the connection to the network, in my case direct connect (direct), then put a tick on the icon Unlisted ICQ / IM client. Next comes the wizard to create a key [Next ] – [Next] think up and enter the password twice, [Next] randomly move the mouse =), to randomly generate the numbers, [Next] – [Next] – [Finish] key created. Make sure that your key is Loaded, and that settings File – Configure – [IM clients] check the box Other ICQ / IM clients and select the method direct only. That’s it, SimpLite is configured, do not forget to set your key password (by default SimpLite is loaded with system automatically and minimized to tray)

.

Now you need to redirect your ICQ-client instead of login.icq.com server to your computer, ie type 127.0.0.1 and leave the same port (5190).

.

Press [Settings] button in ICQ and type in Host: 127.0.0.1 and press OK. (If the account loads automatically when ICQ starts, then the [Settings] button needs to be logged in: Main – Switch User (Log Off) ).

In QIP, before entering the account password, click the [Server / Proxy] button and type in OSCAR Server: 127.0.0.1 and press Ok

.

В Miranda [M] – Options [-] Network – ICQ: Login server: 127.0.0.1 port: 5190 – Ok

RQ [RQ] – Preferences – Connection – Server host: 127.0.0.1 port 5190 – Ok

In other clients, the actions will be similar.

Now when you will meet people with SimpLite ICQ, SimpLite will convert from Unencrypted to Ecrypted and you will be prompted to Accept the key (one-time).

Всё!

PS: I do not want to hear comments like, SimpLite is shit, code is closed, mittm etc. Use jabber pgp or miranda with SecureIM plugin or NDC, all these methods are good too, maybe even better, and I do not agitate them to change, just SimpLite allows you to use the usual and popular clients, and put it will not stop anyone. I wish it were not like this: one uses jabber with pgp, the other uses miranda with secure plugin, and people continue to use plain techtom due to incompatibility and laziness. With proper advertising of free and easy to use message encryption product, we can create a unified system as popular as ICQ among us.

PS2: The writing of this post was affected by the week-long failure of sst servers.

The rights to this article belong to the author. Reprinting, using parts of it, etc. for personal purposes on other resources is only permitted with the author’s verbal agreement.

Copyright (C) 2006 What specially for https://ver.sc

buy fullz with id

” dumps with pin review

Discusses tools and techniques used by hobbyists and professionals in computer espionage, as well as countermeasures designed to combat them. General concepts and techniques suitable for use on any computer system are given, so users of Windows, Linux, OpenBSD, and MacOs will find the book useful. For personal computer users, system administrators, and anyone who intends to protect their computers from possible intruders.

dumps with pin review

Adalt. Step-by-step instructions for beginners.” atm dumps

I want to dedicate this article to beginners. As a rule, when you get into the carding business, you don’t know where to rush. At first it seems to be easy and simple, but when you start to get into it and understand it, you lose your zeal. The mistake most newbies make is that they try to jump over their heads: they are attracted by large sums of money appearing in topics about gambling, racketeering, real money, etc. I want to say this, all in good time. You have to start with simple things that don’t require a lot of money.

The old scheme of laundering $ from ss (CreditCard) through porn sites is still relevant. I started with it myself a long time ago. I’ll try to outline it in some detail.

So, let’s get started.

1. First and most important is security! You have to configure the operating system for your Amer. On forums, this topic is full of information. Therefore, I will not focus my attention on this.

.

2. And now on the subject. First, you need to find a Sponsor (or Payer), i.e. a site that sells pornographic material (you should look for them on adult forums). The sponsor, moreover, should be an overseas one, aimed at selling porno materials (content) for the foreign audience. There is a huge number of sponsors that make payments in the methods available to us. Registration on Sponsors is simple and available to everyone, so I won’t go into details here.

3. We need your site, that will advertise Sponsor.It is not necessary to create something huge, it is usually 1 page with lots of links, banners and content (by the way sponsor provide free content) leading to Sponsor’s site (you will get the link after registration). See examples of sites, you can on the same adalt forums.

4. Now you need to host your site on the web. Some Sponsors provide free hosting, if not it is not a problem. Take cs, google.com and search for paid hosting, makes no difference, if only it was not Russian and supports payment by credit card. Found hosting, choose a domain (site name, for example xxx.com) and then pay for hosting according to the proposed scheme for the max period (1 year). All done? Now upload our site there.

5. The last step of site preparation is buying traffic. The sellers of traffic we find there, on Adalt forums, actually it does not make any difference what kind of traffic we will pour, but there are some nuances of our own. If we drive ru traffic, we will have low clickability and more suspicions from partner side. In other words, we need our site as much as possible to have more people click on the banners and go to the Sponsor’s site, because there is maintenance of statistics. You will agree that it will be strange if all the traffic will be ru and the purchases will be from the USA cardboard. Also, if you click on 300 people per week and you make 5 sales, you will receive 1:60 average, which is not good! (The normal ratio of clicks to sales is 1:500-600) So, try to pour more traffic and adhere to this proportion! My advise is to use target traffic from USA or Europe, in this case clickability will be high and palaver from affiliate side will be min. Of course this is everyone’s business and who has what size purse. Traffic cost varies from 1 to 4$ for 1000 visitors.

.

If you have passed all the stages, you are left with the easiest and nicest job! Go to our site, click the banner, you will be redirected to the Sponsor’s page, click something like Join us now and you will be redirected to the billing system page. There and then enter the data cards! There is different billing systems working with Sponsors, some accept cards without problems and others do not like it. So when you choose Sponsor, do not hesitate to type in your card. Otherwise, it’s better to find another Sponsor with another billing system in order to avoid unnecessary problems.

The most important thing is to follow the propotion I gave in paragraph (5), otherwise your account will be banned for cheating! Sponsor makes payments 2 times a month, you get 50% of sales.

Well, that’s it! If you have any questions, post in the thread, I’ll try to answer them.

The rights to this article belong to the author. Reprinting, using parts of it, etc. for personal purposes on other resources is only permitted with the author’s verbal agreement.

Copyright (C) 2008 Brugman specially for https://ver.sc

atm dumps

Safety in carding” best dark web sites for cc

As a rule the most important thing in carding is safety, so I will tell you how to keep yourself safe. This article won’t necessarily help you in carding, it’ll just help you to stay anonymous on the internet or make some other people believe that you’re some foreigner or something.

What should the OS be?

In general, if you really want the shop to believe that you are a true American and the cardboard you will enter yours, it is better to have a Microsoft Windows XP, and preferably the English version, but if you do not have, it is possible to find another way out. What we need is , change the date, change the time zone of the country (in this case, we’ll use the United States), and change the language we speak.

Change all this like this: Language change: Start = Settings = Control Panel = Language and regional standards http://netsec.ru/uploads/raspolozhenie.JPG

Date and time: Start = Settings = Control Panel = Date and time http://netsec.ru/uploads/poyas.JPG

Browser

The next step is to choose a browser, in my opinion and most carders use Mozilla Firefox also English version, in rare case Opera also English version. you ask what the difference? Yes practically not in what, that in Mozille Firefox, that in Opere it is possible to delete cookies and so on. In general here I will not be focused.

Doot, time, language have changed, the browser seems to be chosen too, something is forgotten, right, the most important thing to focus on is the VPN and SOCKS.

What are VPN, PROXY and SOCKS?

VPN (Virtual Private Network) is a kind of a separate encrypted channel, which gives us high security of transmitted information through this channel by using special encryption algorithms, i.e. our information and data cannot be intercepted.

PROXY or PROXY-server (proxy-server), i.e. a separate computer which mediates between you and the Internet. What is it for? In our case, we need it for anonymity, also with the help of proxy-server you can enter chats or anywhere else if you’re blocked by IP, and as I said for anonymity, and for many other purposes.

SOCKS or SOCKS proxy is a type of proxy that simply supports any TCP/IP protocol (FTP, Gopher, News, POP3, SMTP, etc.), not just HTTP. They also hide your real IP. There are 2 types of socks, these are socks 4 and socks 5. The difference is that socks 5 works not only on TCP protocol, but also on UDP protocol. Among all types of proxy socks proxy has the highest level of anonymity, so it is best to use them. There is one more disadvantage of socks proxy, it cannot be used in browser. You need special programs to work with them, such as: FreeCap and SocksCap.

How to wear SOCKS?

Let’s consider 2 programs, these are FreeCap and SocksCap. I almost do not see any differences in these programs, except one, in FreeCape you can make a chain of socks, as far as I know in SocksCape you cannot do it, but functions are the same. How to configure the program and put on the socks? Yes, everything is very simple. Run the program FreeCap itself, then go to: File = Options = Options Proxy In line SERVER enter box itself socks, well, in line PORT therefore the port socks. Put a dot where it says SOCKS v5 http://netsec.ru/uploads/nastroyki.JPG

Now for the chain of socks.

To chain proxies File = Settings = Proxy Chain

http://netsec.ru/uploads/cepochka.JPG

Click add and ADD. Again, enter the server address and port, put a dot where the last time. Please note!!! If at least one sock will not work, consequently, our whole chain will not work.

CCTools what is it and what is it for?

I will not describe in detail, I will only describe the main functions of this program. This program is designed specifically to hide or change computer data, such as: =1=S/NKey Windows =2=Soit changes computer name and company name. =3=Makesfake processor name =4=Hostname =5=And S/N ID Internet Explolera . I think I don’t need to explain how to configure this utility. This is easy, just press generate button and that’s it. http://netsec.ru/uploads/sss55.JPG

Conclusion.

Providing yourself with this anonymity you will not be able to make real money, but you will be able to secure your identity and pretend to be a foreigner (if you will need it). With this anonymity can skardat a domain and hosting, but usually all this long does not live. Good luck!!!

P.S. I may have repeated myself, but look how beautiful the pictures are, I think newcomers will understand everything

.

The rights to this article belong to the author. Reprinting, using parts of it, etc. for personal purposes on other resources is only permitted with the author’s verbal agreement.

Copyright (C) 2006 ONYX specially for https://ver.sc

best dark web sites for cc

A guilty plea.” websites without cvv

Kuzemko Vladimir Valerianovich.

SOME NUANCES OF OPERATIVE ART. From the notes of the district opera.

Part One. Violence. Part two. Agents. Part three. Witnesses. Part four. Suspects. Part five. The turnout. Part six.

[DATENCODE]I’M IN A C A S P O W E R .

1. IF HE CONFESSES, HE GOES TO JAIL…

No matter how much the perestroika press ridiculed the words of Vyshinsky: “Confession is the queen of evidence!”, but in today’s practice it is so. In a number of cases the situation is as follows: if the “client” confesses to his guilt, begins to cooperate with the investigation, demonstrates the whole process of the crime on film, specifies the places where he hid the crime weapon and the booty, or names the persons to whom he sold it, and he goes to jail. If he doesn’t confess, because there’s no serious evidence, he’ll have to go free. In other words, if there is already a criminal case, it is up to us, the operatives and the investigator, to convince the person to go to jail. As you understand, it is not easy to do, because, strange as it may seem, no one wants to be deprived of their will…

You say, “Well, look for evidence!” Well, that’s the point, in some cases there isn’t and can’t be… Don’t you get it?… Then here is a concrete example for illustration…

In the evening, in front of the arch at 34 Grimm Brothers Street, a man in a jacket and sneakers stopped the 17-year-old Smithlitskaya hurrying home, and, pressing the rough steel of a blade to her delicate throat, demanded to give him the most expensive… No, it was not her unsullied conscience that he had in mind, nor her maiden honour, nor the passport of a full citizen of her Fatherland, but something else entirely – he roughly took a gold ring from her finger, and removed the small gold earrings from her ears. Why he did not rape the young beauty – I can not guess, but I think he hurt her strong by it. And when the busty-ass girl rushed to the police station with a complaint against the robber, the motive of her complaint against the scoundrel, who avoided the banging, was distinctly perceptible, if not in her words, then in her intonation … (I assume that the villain has decided this way to humiliate her once again, saying: I do not care about you, so I will not even fuck you!

They love young, pretty, and criminally offended girls in the police department. On the contrary, we hastily brought and put on the table in front of her several albums with photos of former prisoners living in our district, and – oh joy! Among other faces, faces and faces she was able to identify one as belonging to her offender – it was Petrenko Ernest Nikolaevich, 28, who in his middle-aged years had already made two trips to the “zone” for “grievous bodily harm” and “robbery”. The eagles, the operas of Ernest Nikolaevich (colloquially nicknamed “Girya”), grabbed him by the gills at the address of his roommate, Verka Tarasova, nicknamed “Columbine”, and dragged him to the victim’s room. “It’s him, all right! I recognized him!” happily pointed her finger at the victim, naively believing that her words alone would be enough to have the bandit sentenced to eternal imprisonment, with his genitals sawed off with a blunt hacksaw. But alas, to her and to our chagrin Smithlicka’s words are only her words, to which citizen Petrenko countered with his own, no less convincing: “I don’t know this nipple, I’ve never robbed her, and in general I gave up my criminal past long ago… The fact that I don’t work anywhere is only temporary; tomorrow I was going to go to the housing maintenance department and get a job as a janitor…”

There were no witnesses to incriminate Girya and corroborate the victim, the “steel blade” she described was not found during the search, he had probably already sold the gold at the market to some “unidentified person”, and when asked: “What were you doing at the time of the crime?” Giria answered calmly and forcefully: “I was at home, I was making Columbine a cuckoo!”, no doubt about it…

If we look at the Code of Criminal Procedure, the absence of evidence of a suspect’s guilt is the strongest proof of his innocence, it is an axiom. So according to all the rules and instructions, if within 3 days citizen Petrenko himself does not state under the protocol: “It was I who committed this shameful act, raising my hand on the safety and personal property of a defenseless girl, and therefore I strongly demand to punish me to the fullest extent of our most humane laws, taking into account the previous convictions I have!If he is a “guilty man”, he should be set free, with apologies, a shrug of the leg, and an obliging goodbye to the door… And if Smithlicka, with her firm bust, keeps insisting on identifying him, she could be mistaken or she could be lying… She lost her hand in cards, gave it to some Casanova, or trustingly gave it to gypsies in the street, and didn’t dare to confess it to her parents, so she made up a version about “robbery”.And the photogenic face of Ernest Nikolayevich in the album for the role of a thug appealed to her most of all, so she “identified” him… This is – from the point of view of the law.

We, the opera, from our point of view clearly saw that he, Girya, had stolen the gold from the girl, and we have to put him in jail, he’s a rotten little man… If the next “gop” he could easily slash his throat with a knife, so that nobody would be able to identify him…

And that dead body would be on our police conscience!

It’s easy to judge someone from the outside until you find yourself in the same situation and see it from the inside. “It’s better to let ten guilty men out than to convict one innocent man in vain!” you’ve probably heard that many times, right? Well, I would have signed my hand to this story if I hadn’t known that those “ten guilty ones” released from prison would go on stealing, robbing, raping and killing those very “innocent” people, in the name of protecting their interests. So the real question is this: either I will throw behind the bars, in addition to the ten real criminals, one honest person, or several dozen of those very honest people will be robbed, looted, raped and murdered by the scum I have released for “lack of evidence”… Your choice?

I will be told, “punishment should be given to ALL who are guilty, but – in strict accordance with the law!” Sounds convincing, but it is exactly “sounds”. Behind these beautiful words is weakness of laws and, often, powerlessness of their defenders. We cannot, simply cannot punish not only “all” criminals (this is an unattainable ideal for any country), but at least punish a large enough share of criminals, from the society’s point of view, without violating one or another of our laws and norms of morality every day and everywhere… I emphasize I am referring only to those cases when the operative is absolutely convinced (if not by 100%, then at least by 98%) in the guilt of his “client”, but is unable to prove it by legal and highly moral means, and in this case there is no choice: either to neutralise the bandit by any means, including anti-legal and immoral ones, or to silently allow him to continue depriving people of their property, health and life…

…So, I have three days, 72 hours to induce Giroux to “confess” and “turn himself in.”

2. WORK WITH THE YOUNG.

It would not have been difficult to work with Petrenko if he had been a “pioneer,” a trustingly naive young man with no experience with cops. I would have smiled broadly at him as a brother-in-law and opened wide my hospitable soul to him, and then he would have seen the heart that was beating in my chest, the heart that loved Girou, which knew no falsehood and could not lie…

So I would tell him, and he would almost believe me, but with a touch of uncertainty about my rightness, which he would utter in a thin baritone, bleeding snot and tears of pity for himself, priceless: “But my cellmate, Pasha Medvedev, says differently… Don’t confess to anything… They say that only for theft, if it is the first and the stolen goods are returned, they can give you a suspended sentence, and for armed robbery you will get at least four years if you confess… And if you don’t confess, you might get out of the article somehow…”

My indignation knows no bounds. “He told you shit like that?! ” I would ask him derisively, laughing loudly at Pasha Medvedev who had stuck his nose into his own business (Pashka would have turned green with horror on hearing what my laughter meant to him personally). And then I would prove to Gira that the law is like a weather vane, which way we and the investigator will turn it, the wind will blow, it is clear, what other doubts there could be…? Sign the “confession” and walk free with a clear conscience… Maybe not from tomorrow morning, but the day after the trial – for sure!

And still he wouldn’t want to put his signature on my papers for fear of a catch… He’s sneaky himself, and he expects a trick from others, the bastard!..! But I am not obtrusive… I would go away for a couple of hours (“I’ll go and get some cigarettes, and you talk to my colleague!”)…

…After seeing a couple of sex addicts and having had time to get a glass of beer and taranka at the beer house around the corner, I would return to my office. My colleague, steaming like he’d been in a sauna, with the sleeves of his shirt rolled up to the elbow and a feeling of accomplishment, would have been pleased to see me: “Oh, finally! It’s time for my lunch…” And would run away, having whispered that I owe him a bottle… Well, we’ll see what he has managed to achieve…

I look at Ernest Nikolaevich lurking on the stool… Why is the kid’s eyes so bulging these days? I asked him what happened and then, frightened by the lowing of his voice and looking back at the door, he excitedly told me the incredible and unheard of thing: he had been tortured in the Criminal Investigation Department! Yes, yes, in a very real way, like in fascist movies, and even more painfully… And not once, not twice, but many-many times… For two hours of my absence Ernestik received such nasty things that even I do not understand how he survived it, my poor man … I am aghast and groaning, from the eyes touched by my sympathy poor man drips suspiciously on my chest, I wipe away his tears with a dustpan taken from a trash bin, and actively solidarity with his angry thirst for retribution. The behaviour of my colleague seems to me unheard of and unforgivably cruel. But then I remember that last week the bandits captured and brutally abused my colleague’s children, wife and mother-in-law… Here he is, apparently enraged by the atrocities of criminality, and he overdid it…!

And in general, I carefully develop the topic further, not only angels serve in the police, not all of them are well-bred gentlemen like me, there are cadres and more dull… And in order to be able to defend Ernest Nikolayevich from their ill-manneredness and intemperance in future (too many of my colleagues have had their families uprooted by bandits, Ernest Nikolayevich will still have an opportunity to communicate personally with my criminals eager to take revenge), he must help me, prove with all his behavior: “I’m a good man, there’s no need to beat me brutally, I’ll tell everything myself!”

And I helpfully put my breast under the cheek of the simpleton who was bursting with joy, and I put a ballpoint pen in his hand, and he signs the report I had long ago prepared with incriminating confessions, at the same time telling me where the knife and the loot were… And he goes to “the zone” if not for all “six with a trailer”, then at least for four full years of isolation from all the pleasures of free life… This is how fools usually raise their first term from the floor because of their youth and yellow-hairedness. If he had had the strength of character, if he had been able to resist all persuasions, he would have been free in three days…

3. WORK WITH AN EXPERIENCED…

But I repeat, our Girya is a twisted scientist, he knows all the moves and exits, he knows the cops’ tricks firsthand… Prison has taught him three truths: don’t believe, don’t be afraid, don’t ask!.. Girya knows perfectly well how important it is to be able to keep silent and how unshakable his position is until he gets entangled in the “confession” and hangs the “confession” around his neck like a poodle stone… It is difficult to break horns like that…

…But – you can! Even the most hardened recidivist is just an ordinary person, often not too clever, and even necessarily not too clever, who is more intelligent – they teach in universities, they write sensible books, at the very least they preside in banks, and not engage in street gopop… It is possible to r e v e r a t i o n , though it is difficult… But it is possible, and necessary…

I have a lot of advantages. He is alone, and there are many of us, restless and industrious operatives, we are awake and tireless, and after the forcer is waiting for our wife and a hearty dinner… While he is exhausted by endless interrogations, after which a smelly cell awaits him, and he will not be given anything to eat for three days (they do not have to give him food in the cell!) He’s totally dependent on me, and for a time I get all sorts of power over him and can do a great deal for him, but I get nothing from him. Finally, he’s fighting only for his own selfish interests, so that he can continue to drink vodka, fuck women, and rob passersby, while I defend the common good and justice. Society does not want to see Giroux go unpunished, and I do what society wants, and push Giroux with every means at my disposal… (At the same time, I should clarify that my colleagues are scouring the area, trying to find witnesses and buyers of the crime, and the knife described by the victim, with possible fingerprints, which would be enough to put Giru on trial for possession of edged weapons, even if he manages to get away from the robbery itself. But nothing… nothing!)

And here the bandit sits on the stool in front of me, the clock on the wall is ticking, counting down the 72 hours allowed by the law, I pull one by one all the threads leading to Gira, tracing his reactions, the play of his facial muscles and gesticulation features, I let through my mind every word he uttered, every thought I guessed, every look, every breath, every sneeze…

His task is to resist, to hold on to his ironclad: “I don’t know anything, I haven’t done anything, you can’t prove anything!” Mine is to get him off balance, to stimulate him to act, to try to somehow maneuver and clarify his position; at that, sooner or later he will make a mistake, and then he is mine! But not before…

…I must put him away, I must do it! There’s a certain animal strength and fearlessness of a cornered wolf in him, he’s really dangerous, and from the fight with me, if he could win it, he would come out even more dangerous and confident in his own invulnerability…

As an experienced fighter, I start with moral pressure.

“Asshole, bastard, fucking trench coat, faggot, faggot, bitch, what did you do?! Who did you put your hand on a little girl, almost half a child?! The whole district office is outraged! You idiot, did you really think you could get away with this?! We’re going to kill you all over, you’re going to bleed to death, you rotten, toothless pussy, you’re dead, you understand me, bitch?!”

And so on for two hours, until my voice is hoarse. With the obligatory slaps, slaps, light and not-so-light slaps, so the words always sound more convincing…

But he does not respond to my insults, my inquisitiveness just makes him crinkle, and when I ask him questions he answers monotonously the same thing: “I do not know… I did not do it… you cannot prove it…”

Girya does not sympathise with my efforts in his own favour and is not going to let the defender I have picked up for him come within pistol-shot distance of him, because he realises he’d have to really try hard not to go to prison with that lawyer… He does not need one at all in his unassailable position: “I don’t know… I didn’t take part… you can’t prove it!

And again from kindly I become angry, without counting I slap, overpoweringly drip on psyche… By the way I remembered that Smitlitskaya was not variedly fucked by Girey in all notches and hollows, I press inquisitively: “Listen, aren’t you impotent by any chance?! Maybe you’re only getting it up for 9-year-old girls these days… Ha-ha-ha! How do you satisfy Verka, your lover, with your tongue? She’s filthy, isn’t it disgusting? We should whisper to the guys in your cell, what a licker you are, ha-ha-ha-ha!… “And so on, in the same vein, with the same intonations, and the same kind of mumbling in his face… Girija was supposed to get angry, yell at me, or better yet, punch me in the face, tear my clothes slightly… But he didn’t, the bastard wasn’t indignant, he wasn’t shouting, he wasn’t tearing my jacket that had been torn up in fights with crime, he was muttering like a man in a rut: “I don’t know anything… I wasn’t involved in anything… you can’t prove anything!..» The only thing he allowed himself was a couple of wolfish looks in my direction, saying, “I understand, it’s my job… But why are you trying so hard?!”

.

At this stage of our communication I began to think about the question: should I not subject citizen Petrenko to the cruelest and most brutal torture…? Many will wonder: “He’s still thinking! “They beat the soul out of the interrogated for mere suspicion, but here it’s God forbid!” But it’s not that simple.

This is if you break Giroux by torture and make him cooperate with the investigation. But he won’t break, he’s not that kind of man. He’s been beaten many times in the past without any effect, so what should I expect from him now? On the contrary, we should not torture him for real, he is quite capable of drawing a “confession”, he will allegedly start “confessing”, I will believe him, I will relax, and he will tell everything in general terms when playing it back, cheat somewhere else, and it will come out in court with some very unpleasant comments for me… Every obscurity in the case will be portrayed by Girya in court as a result of my malicious falsification of case materials, and if he gets into the stream of some campaign “for the purity of the police ranks”, he will be exposed as a “werewolf in uniform” (me, that is), and in gratitude he will be released right in the courtroom… No, we must break Girya thoroughly and fundamentally, with a full guarantee that he will not make any tricks in the future… And this cannot be achieved by beating him!

And I continue to stare at the prisoner, pale with anticipation of his future suffering. Inwardly he is ready for the pain, waiting for it, another argument for not torturing him, but for thinking…

Two days of my 72 hours allowed by law have already passed, I haven’t achieved anything, and why…? I thought it was bad, that’s it! I should make an operative combination, and not a simple one, but with an ingenuity, with a twist, so that my stroke would sting me in the most sacred place, so that Girya would be firmly on my hook…

/DATAENCODE

I’m beginning to vaguely wish Columbine had been pregnant with Giri when she was eight or nine months old. Then it’s easy, then I’m on a roll. They would have put her on a chair opposite her flatmate and started to poke her lightly in the belly with a cudgel… Not me, for God’s sake! I wouldn’t lay a hand on a pregnant woman for any price… There’ll be others, they can handle such a simple case…! The soft but insistent tremors of my helpers would gurgle in her belly, they would become more and more violent, the poor woman would scream in pain and fear, Girya, handcuffed to a chair, would shriek violently, the unborn child would scream in her belly with terror, and I would watch them in sad detachment, remembering to remind them every minute how one can break it all easily: “Confess!… “Tell me… Sign…” (If he had thought to retract his words the next day, the procedure could be repeated all over again)… Wouldn’t Daddy’s heart waver, wouldn’t he understand that all his so-called “benefits” from silence weren’t worth one tear of his innocent child’s tears? He will… No matter how brave and evil you are, when they torture your unborn child you sign everything, and you confess in everything, no matter how strong you are… The instinct of self-preservation is strong, and the instinct of reproduction is a hundred times stronger!

But Columbine is not pregnant, that’s the trick, and in general she is a hollow woman… According to operative data (one of the sexpots slept with her some time ago) she had an illness in her childhood, and since then she cannot give birth… A pity!.. Beating her in front of his own eyes was like slapping himself, he had half a district full of people like her…

Giri’s parents are dead now… No sisters or brothers, I think… Wait – wait… what do you mean no… There is a brother, an older one!.. I rustle with papers and find the necessary one… Exactly, there is a brother Petrenko Fedor Nikolaevich, 52 years old, widower, he lives in that place, works as a carpenter in housing administration, he is characterized positively at his workplace and place of residence, he does not drink or smoke, let alone drugs, no data about the female sex, but his wife was, died two years ago, so he is not a pervert… He loves him. He’s been taking care of him since childhood… When he was in jail both times, he regularly sent him parcels and even visited him… That’s it!.. The moment of truth is near, very near to me…

I sent Giryu back to his cell (“Sit a bit longer, my dear, and think it over, and if you don’t start shooting up, you’ll be in trouble…”), while I myself began to prepare a combination…

.

4.

That same evening the doorbell rang at the door of Fyodor Petrenko’s modest bachelor abode – unobtrusively and begrudgingly, as a well-mannered person should do. He opened (there was no door chain, he did not ask “Who is it?”, the weirdo…) and saw his district officer at the threshold, and together with him – me and two other citizens with faces of freshly minted s i n j a k e s . “A passport control check! the policeman cheerfully informed me. I know and respect you, Nikolaich, but you know the service! And Fyodor Nikolayevich was happy – he was lonely, any guest was a gift from fate, you did not know how to welcome him, an invaluable guest… He let us into his house, he was naive… He knew nothing of life, his mind was not excessive, he had never had much contact with the police before… Father, you mustn’t be so naïve at your age. Evil reigns in the world, and those who haven’t learned how to defend themselves against it are doomed…

The furnishings at the address are modest, “a la – proletarian mid-70s”, that is, the furniture was bought back then, and had time to wear out… Carpets, crystal, gold, foreign currency, and other extravagances obviously have not slept here, but it is neat, cozy by bachelor standards. On the wall, there is a photo of an ugly woman in a self-made “mourning” frame, and a single shabby chair in the corner… I settle there and the policeman sits down on a chair (he spent the day there, happy to give his tiring legs a rest!), and the stiff-eyed citizens are left at the threshold, their business is small, they are still sitting…

[Fyodor Nikolayevich didn’t know what to offer us, timidly offered tea with croutons (surely there is nothing else tasty in the house), it would be nice to have some tea, but time waits, “sorry, we can’t – duty! It seemed ok, without any torn pages and smudged stamps or crooked photo… But he did not hurry to return the passport, he held it in his hands and asked some minor questions, and smiling, sincerely, homely, almost family-like… It was then that I, forgotten by everyone and casting glances around, suddenly exclaimed: “Oh, what’s that?” And – quickly pulled out from – under the chair lying there a bag with a substance resembling a narcotic. I hold it up to my nose, sniff it like a piece of ham, I say to the people around me: “I think it’s cannabis…” My lower jaw fell off in utter amazement and fell to the floor with a deafening thud. The policeman sniffs too, and though his nose is stuffy as a result of a chronic runny nose – authoritatively confirms: “Yes, it seems… that’s it…!”. And the citizens at the threshold do not say anything, but keep their eyes open, they are “witnesses”…

.

“Wait, what cannabis? Half an hour ago I swept the room and there was nothing under the chair!” with his hands pulling his jaw back to its original position, with the pathetic smile of a man caught in years of cannibalism tried to explain something to us, vaguely hoping that it was a joke…a funny police prank! Now we’ll say that we were joking, and we’ll all laugh together…

But we’re not in the mood for practical jokes. The dangerous bandit Girya must go to jail… The policeman kept lulling his master’s vigilance with soothing mutterings: “Come on, Nikolaich, come on… I understand that it was an accident… Let’s go to the police station and sort it all out there…”, while he was already scribbling on a protocol: “On the 12th of this month at this address in the presence of witnesses we confiscated…”. The witnesses were entering their signatures and data from the passports they happened to have with them into the protocol, and Fyodor Nikolayevich’s feeble attempts to evade promptly proceeding to the police station were cut short gently but firmly; a UAZ vehicle was already waiting for us in the yard outside the door (because of the importance of the operation the head of the threat ordered it be given to me), so we were leaving…

… Forty minutes later in my cramped office I was already hovering over Fyodor Nikolayevich, huddled on a stool, frightened and shrieking with a beastly face: “Tell me, you pussy, where did the drugs come from?! Who are the suppliers?! Addresses, addresses, names of couriers – answer me, you anal pistol, or I’ll get angry…!” He mumbles something indistinctly, then I painfully slap his ears with my hands, jab my finger in his eye, smash my fist under his ribs… He cries out, mumbling a pathetic excuse, but why should I need it…? I’m not listening… My goal is to bring him to the right condition, he must look like a man at the bottom of despair, and to look like that you have to become…

A person born in our country has all chances to grow old and die without realizing that he is nothing here, a shmako-dog nobody wants, they will trample him at any moment and there is nobody to call for help… And if it happens otherwise, and suddenly this fatal reality emerges how to live with it and whether you should live at all, knowing that you are a worm under the feet of the strong… When your whole life the cheerful and deceitful propaganda calls you the master of the country and the officials – your servants, and then one day or one evening you are dragged into the office of one of your “servants”, and he “master” at first flogs you and then sends you to rot innocently in a prison cell… Scary!.. They, tortured by me, mature to the idea that I am a fierce beast, but even this is an illusion… The truth is scarier. If they knew how to behave, if they had money and connections, they could expose me and punish me, but what is the use? Am I to blame?! Are my superiors or my superiors’ superiors to blame? No, everyone is guilty, from top to bottom, all of us, each and every one of us…! Including this “crystal honest”… Wasn’t he silent when he should have been shouting at the top of his voice… Isn’t it his indifferent passivity that sanctifies the evil that many others have done? I have not made this world as it is, I have not invented its wolfish laws, and not me to change them … If you do not want to be done this way change your life, and change with it. No one should do THAT, only then you can be calm for yourself…

…And let pain and horror splash in your pupils, father, I’m sorry, it’s necessary… It’s your own fault. You’ve lived honestly, but you haven’t lived honestly enough, you have to pay for everything in the end, so you pay…

…After a smoke break at the window, I go back to Petrenko and start the next run: “How is it that you don’t know where the drugs came from?! You don’t mean to say we planted it on you, bitch?! Oh, you don’t want to… Thanks a lot… Motherfucker!… Here… Here… Here… Bastard! “Fucking crooked, tell the truth before I kill you like a mammoth!” And I shove, I shove in his face the protocol of seizure of cannabis at his address, as they say, the fact is obvious, I didn’t make it up, the drugs came from somewhere in the apartment of citizen Petrenko F.N…! Either let the bitch convincingly explain their origin, or – the investigation, “stand up, the court is coming!”, a harsh sentence, and the convoy leading him away to grief and dishonour… That’s what I believe, and I could convince him of my rightness, but I cannot tell him the truth, the game rules require conspiracy, so I get a little angry at his moans and tears, why burden my nervous system?! It’s hard enough for me without his moaning…

Through his pained sobbing comes “I… don’t understand… where they came from…” He doesn’t understand, you see… He’s a jerk…

…Half an hour later, when the stool was no longer a respectable member of society, but a hunched, quietly moaning lump of pain and despair, Giru was brought into the office. My task: he must see his older brother and be able to have a few words with him to comprehend the situation, but their communication must not be long, lest he should have time to advise or suggest something to his brother…

“Fedya, you!” ahhed Girya on the threshold, unable to believe his eyes. At the sight of the native face Fyodor Nikolayevich’s hope awakened, he rushed to him with a joyful howl, hugged and clung to him, swearing tearfully that he had not kept any drugs at home, and himself could not understand where they had come from… “The drugs were seized under the protocol…? In front of witnesses?!” quickly interrogated the wizened Giria, and the brother nodded, not understanding the significance of this circumstance. He was immediately led away by the convoy, I instructed him to put him in a cell with not the most violent ones, he played his part and there was no need to torture him unnecessarily …

“Take him to the third cell!” I shout demonstratively. (In fact, they take him to the second cell). Girya flinched: “But there are only tuberculosis patients in there!” I shook my hands: “So what?! And the other cells are overcrowded…” Picture!

I’m skipping a bit here for the sake of brevity. About, for example, how an enraged Girya tried to punch me in the face, and as a result he got it in the jaw… And then, handcuffed to a stool, he swore at me so masterly that I wanted to write down some of his expressions and then quote them at friendly parties with my colleagues…

…But after a couple of hours we switched from shouting and swearing to a smooth, businesslike tone of the high negotiating parties. I’m not an enemy of Gira, I really need it, but it’s just that in this situation his place is in prison, and he understands it himself, nothing personal…

…My terms: Girya gives an “admission of guilt” and goes to jail for 6 years (there’s no way the court can give less, given his criminal record), and I immediately release his brother “clean”. If Gira refused, they would immediately release him because of “lack of evidence”, while his brother would be sent to a pre-trial detention facility and await trial, which could take place in three months or six months or a year… (With a laugh I told Gira how one small gangster I “closed” had been waiting in jail for three whole years!) In court, with a competent defense, the drug possession case will most likely fall apart, and Fyodor Petrenko will be released, but in what condition, that is the question…? A year in a cell among the dregs of society… AIDS carriers, tuberculosis patients, syphilitics… among other beasts willing to abuse a defenseless man… Not a little… and even a lot for the psyche of the elder Petrenko!.. He will never recover, a year in prison will crush him for the rest of his life…

… Gira has nowhere to go!… His brother’s the only thing he’s got. If he goes to prison again (sooner or later, it’s inevitable!), who’ll send him the gear?!

And Girya surrendered. He signed a confession about Smithlicka: “I robbed… Weapon there… I sold the gold to someone…”

…I MADE IT.

And while I was writing down his testimony, Girya was looking at me with a bad squint… His eyes were very keen… Oh, I don’t care!.. I don’t need to be afraid of criminal scum. It’s too much of an honour. I’m a cop, and my cause is just, while he’s a bandit, a bastard, a bastard, to crush them like lice, how many good people he’s saved!… In fact, he set his brother up… “Brother of a recidivist” is neither honourable nor safe…

…And when Girya is released in six years (if he is released!), he will think not about revenge, but about where he can get money for medicine to improve his health damaged by imprisonment…

.

“When will my brother be released?” asked Girya, rising from his stool. Well done for reminding me, I’d forgotten all about Fyodor Nikolayevich… “Immediately!” I answered with a light heart. (It’s dangerous to lie here, he would find out after a while anyway…). And Giroux was taken away.

Having admired the bandit’s testimony so hard, I ordered Petrenko senior to be brought in. A few minutes later he was brought into the office. We haven’t seen each other for three hours, but he’s changed. He shook like a leaf, trembled at the slightest rustle… His eyes were anxiously searching for any escape… The hunted figure had a doom look… Only 180 minutes in the worst of our cells and what an effect!.. What if it had been 15 days of in-cell treatment in the TDF? What if it had been five years in the “zone”? …

“So, you son of a bitch…” I started with a menacing look, but immediately I got up (wrong situation, wrong tone!), ran out from the table, hurried to him with outstretched hand to shake hands in a friendly way. He recoiled, clearly fearing that I would hit him in the eyes again, but I manage to catch his hand, shake it firmly, joyfully exclaiming: “Well, Fyodor Nikolayevich, we’ve got it all figured out, and it turns out that you’re innocent…”

“I’m innocent?!” he jumped on the spot in surprise, and stared at me as if he had slaughtered a thousand people before, and now he was told that they had just all been resurrected! …..

I willingly confirm: “Not guilty, not at all!… We submitted the substance found in your possession for examination, and the expert has just concluded that the bag does not contain a drug at all, but just… harmless dried grass… You were detained by mistake, dear Fyodor Nikolayevich! In this regard, on behalf of myself and the management, I want to offer you our sincere apologies!.. Forgive us, we won’t do it again…” and with this life-affirming promise I shook his hand firmly.

“But where did I get it from?” he almost sobbed out. “Probably hooligans threw it out the window!” I suggested smilingly…

He smiled faintly, suspecting me of another trick. Now I’m going to stop being nice, and I’m going to hit him in the kidneys with my truncheon, I’m going to punch him in the solar plexus, right now…… But I wouldn’t dream of it…

Let the ringing-voiced journalists who don’t want to know the real life accuse the cops of anything, but we ourselves understand that in the final analysis we try to do this so that such decent people will have fewer chances in life to run into any kind of evil… It is their interests we defend, it is their peace we fight for… And sometimes we have to insult them inadvertently in the interest of the cause, so forgive us, dear ones!.. We cannot do otherwise…

“What about the protocol?” still couldn’t believe his happiness, Fyodor Nikolayevich. I silently took out the ill-fated protocol from the folder lying on the table, defiantly tore it into a thousand little pieces, tossed it up. The bits of paper, swirling, fell to the floor, followed by Petrenko’s bewildered gaze. (The papers had played their part and were no longer needed. This was not to say that I had not made sure, in case Girya, thinking of replaying the game, would give a shout, I had stuffed two cartridges from a TT pistol in the upholstery of the chair in Fyodor Nikolayevich’s apartment. If necessary, during the next search they will be “found” in front of witnesses, we draw up “ammunition possession”, and throw Petrenko Sr. into pre-trial detention under this article of the Criminal Code…)

“So I can… leave…?” still doesn’t understand my guest. I nod happily. Thank you for taking the time to visit us, you are always welcome if you want to come again…

.

How easy it is to make our man happy… Arrest him for nothing, mock him in every way, abuse him, let him feel the depth of your powerlessness and grief, and then – report with joy that a small misunderstanding has occurred and he can roll on all four!

And they also say that our people are wise… Yeah… I can see their wisdom just sprouting out of every crevice…

I assured Fyodor Nikolayevich that he was absolutely and unconditionally free, he could go home, go to work, or fly abroad (if he could find the money for a plane ticket)… His face came alive, he suddenly started laughing loudly, joking around, shook my hand (the same hand I had shaken his), invited me to visit, “if you happen to be passing by…”.”I am not offended, let … this is not familiarity, just a nervous discharge need man … Even praises me for something, funny story from his life, I chuckled politely, imperceptibly (but so that he noticed), looking at the clock. He nods, he understands everything, my time is priceless and belongs to the state. Not all the bandits have been caught yet, and not all the decent but confused people have been beaten up yet, how many giant cases are piling up on my starlet shoulders…

Hesitating, he asked quietly: “Ah – the brother…? What about him…? Will they let him go?” I assured him that I would deal with my brother carefully and objectively – a little later, by tonight or tomorrow morning… “We have dealt with you, as you see… And he will be all right!

He is satisfied, and again at the peak of bliss, at the parting he even tried to hug and kiss me. But here I am on my guard, fleetingly dodging the touching hickeys… I don’t know what kind of disease he has managed to catch in the cell during these hours… I don’t need to catch it from him yet…

We shook hands again, and finally he was leaving. I watched him at the window, as in a couple of minutes he walked out of the ROVD building, escorted, as a sign of respect, by the officer on duty himself. Fyodor Nikolayevich shook his hand and was honored with a pat on the back, then quickly walked away. When I followed him, I could see him looking over his shoulder, for sure he was afraid that now a gang of musclemen with truncheons would run out of the police station and follow him, shouting: “Stop! You’ve been released by mistake!” And he walks, visibly looping, consciously or unconsciously, but – preventing some imaginary sniper from aiming at his back, should he dare to aim at him now.

And as hardened as I am in battles with crime, my heart is painfully clenched too… Inadvertently bruised a good man!..

… Oh, Dad, you shouldn’t do that… We’re not the Gestapo, we’re the police…

… We don’t put honest people in jail…

5. AT ALL COSTS…

This is how we break, how we bend the force that opposes us. Some of them this way, others that way… No one can predict in advance where exactly this type will break. Some of them would withstand the hardest things, and then from trifles bang and crack with a crash…

I remember a case like this… We once caught a “janitor” breaking windows and breaking into apartments… We charged him with three “native” thefts and started “loading” him up further, so that he could take on five more, but he refused: “What the hell do I need someone else’s stuff?! He was 22 years old, and he had already served 7 years, since he was 14… Daddy was a drunkard, no mother, he didn’t need his older sister, but he also had a younger sister that he loved and looked after since childhood, she was 11… I began to ‘stress’ him out at the interrogation. Like, if you are not going to arrest me now, we are going to raid your house (yet another raid!), and this time we will raid and take away all the children’s belongings, including the little sister’s favourite toys, and even hers. We shall keep her in the police station till evening, we shall torture her with questions, we shall yell at her… At this age she does not need to be tormented for hours by malicious cops…

.

“You have no right!” he shouts. And I’m pushing the Code of Criminal Procedure: “Yes, we do!… I can lock her up in the police station for up to three days… We won’t beat her because she is too young, but will she have a good time in the cell?”

.

He yelled at me, I yelled at him, but he didn’t get away from me, and he took on three “left” thefts… Already a victory!.. I could have charged him more, but I understand that the SIZO’s operatives also need to fulfill their disclosure plan, so let them have something left over…

In short, because of a little snotty girl, because of such a trifle man against his will did according to ours, and otherwise we could beat him until he was blue in the face out of a bare principle, and he would not agree with us by any means…

.

That’s it – and with everyone. Find the vulnerability, and hit it first, skillfully, precisely, in the right force for this particular case.

…What I’m afraid of is making a mistake. I’ll get a “confession” from a totally innocent man, and I’ll put him in jail. Because when your gut says, “He’s the one,” and you press him, sooner or later you cross the line, after which you can’t back down. Either he admits his guilt and goes to trial and into the ‘zone’, or he does not confess, I am forced to release him and immediately he files complaints to all the authorities, and the bosses freak out and give me up in a flash, ‘abuse of power’, ‘forgery of criminal cases’… ‘The zone’ is for me! But if, without stopping, I will press all imaginable and unimaginable ways, sooner or later almost ANYONE will confess, and when you competently furnish a confession from all sides with evidence, it is impossible to escape from it… Then I am saved, and an innocent person will rot in prison…

…We are professionals. In an environment where our work can only be done badly, we are obliged to do it exceptionally well. Sometimes the target of our special methods is chosen incorrectly, but we cannot give an answer to . If you have been caught, you have to go all the way. Either he is a criminal, or I am, I don’t want to go to jail… Therefore, he is the criminal…

…There are far fewer serious blunders in police work than one might think at first glance, but they do happen…

Last year there was such a thing in the neighboring “territory”… Two drug addict brothers were stabbed to death in their apartment by unknown persons. It’s clear who was suspected in the first place by the same drug addicts, presumably good friends of the brothers.

We detained a guy and a girl from among those who regularly shouted at that address, and began to investigate them. There was not much evidence, in fact there wasn’t any at all. One agent whispered to his handler that: “I think it’s them,” but the whisper is not true…

.

The suspects’ identities were inspiring. The kid was twice convicted, and on “strong” articles for robbery and extortion. Who wouldn’t kill someone like that? Plus, he was in a fight with his bros… They got him by proxy, beat him up, and he confessed. But when they brought him to the prosecutor for authorization of arrest, he was flatly refused: “I didn’t kill him, I testified under duress!” So the prosecutor didn’t sanction it, he said, “Something doesn’t add up!” Again we talked to the boy, and again the prosecutor rejected it… This happened three times!..

The chick did not confess to anything at all, because they did not dare to beat her (“young… pretty… and the murdered ones are such scum that you should thank the one who finished them off!”); words alone would not make her stop, she was not of that kind… Her character was rocky, she would not let herself be hurt. She got hooked on needles, and she stole dough from suckers, but she had her own pride, and some meaningful goals in life… Could such a person kill? Run! She had a twin sister, who was a complete scum, the kind that could only be kicked out of the yard and sent to a crematorium with her firewood… Her sister stole her boyfriend’s Adidas sweatpants and would not admit her crimes. Then she tied the twin with a rope to “Moskvich” neighbor, and as she gave the highway at sixty kilometers! So judge, what kind of dude and dude were those two … Our guys were 98% sure: they killed the brothers!.. But there was still 2% doubt: the kid was stubbornly rebuffing, and there was no convincing evidence against him, which was alarming…

6.

Everyone has the right to make a mistake, and the professional solidarity of operatives is manifested in the fact that we help each other to disguise the consequences of our punctures, safely hiding the ends in water…

.

Recently, for example, the guys from the neighboring department almost got into trouble. Such a hullabaloo happened there… A young lad came to our town from the village, he had just finished his demobilization. He settled in the flat of a girl he knew, got a job as a security guard in a firm, began to prepare for admission to university, whether agricultural or construction… Was it love with the girl, or so – a tender and ardent friendship, but he had it, and a roof over his head, and free breakfast and dinner… But one evening he proposed her once again to rock the bunk with merry debauchery, and she refused: he insisted, she got angry, the quarrel flared up, at some stage she called him a moron or a pig, a city girl has something to say to a hot country boy!.. He was offended and raped her, and not just like that, but also with perversions that he had never used before… And she was offended!.. Ran to the police an hour later and said that she had just been raped by so-and-so… The guy was already on duty at his firm, our guys came to see him at work and offered to “come in for a minute”. He, being a disciplined guard, did not want to go anywhere, but without waiting for his agreement they grabbed him by the arms and dragged him to the police station. There he acted brazenly too, spitting at the cops, shouting: “I demand a lawyer immediately!”, in general he was showing off…

If he had behaved like a human being, he would have got over it, but they beat him with rubber sticks for two hours without stopping, they got tired… The typical thing: he became like a silk, no lawyer was needed, he confessed to everything, signed everything, and only asked, shaking his whole body: “Please don’t hit me anymore! Why should we hit him if he’s already broken…? We weren’t going to…

Well, during the interrogation our guys saw a small bruise on his shoulder, like a hickey mark, and decided to take him to the forensic expert, let him record traces of resistance on the part of the rape victim, one more piece of evidence for the court…. I was assigned to escort him, those cops were driven to another criminal corpse, and I was relatively free…

[He brought me to the expert, an experienced man, who always draws in his papers what the police need… He started examining the boy, and I was sitting on a chair at the threshold, flipping through a newspaper. I hear the doctor calling me: “Can I talk to you for a minute?” I walked up to the prisoner stripped down to his underwear, the expert showed me his body, I looked… Holy shit!… What kind of hickeys, what kind of “resistance from the victim”… There were stains all over the body: purple-red on the lower back, above the kidneys, and blue-black on the calves of the legs…! The opera’s been doing a lot of damage with their little sticks. Yeah… hot and inexperienced young people…

The expert took me into the next room, closed the door tightly, and said: “Of course, I’m sorry, but I can’t hide this, I have no right… He can hire a qualified lawyer, who will demand an independent expertise, and then not only you, but me too, will be brought to court…”. I turned pale, understanding his righteousness, but I decided to put a firm end to the panic. I said: “Wait here, I’ll talk to him!” I went to the asshole, who had no idea how many cool kids could burn because of him, the jerk, I asked him severely: “How did you get the bruises on your body?” He was surprised: “How come…? “Yours just now…” I kicked him hard in the windpipe, he pissed himself, and I corrected him: “It wasn’t ‘just now’, it was yesterday. “You were beaten up in the street by complete strangers… Do you get it, or should I say it again?” and with a Freddy Krueger look on his face. “Oh, no need to repeat it, I got it, I’ll say it!” he waved his hands in fright. I called an expert, and he wrote down on the report “traces of beatings inflicted yesterday in the street, according to the subject, by unknown persons”, and took the boy back to the police station. They did a little more work on him, (“Why didn’t you tell me you had such sensitive skin, you bastard?! Here’s for that!”), and with some anxious doubts in his soul, he was handed over to the investigator.

They were worried about the lawyer: what if the boy’s parents would pay and hire an experienced professional? But luckily his relatives didn’t have any money for a paid lawyer… Those who are provided by our state as free defence attorneys are only good for a sanitation service, they come to your cell and say: “You are accused of this and that, you can get from so much to so much…”, and that’s it!.. “What am I supposed to do?” asks the victim of his vices and the woes of the social structure, who doesn’t know the law. “Do what you want, do what you want…”

such a woeful advocate will throw up his hands.

And they gave that kid a pretty big sentence in the end. Had he had a smart lawyer and a qualified refusal to convict him (which requires great strength of character in prison conditions), no court would have convicted him… In fact the only proof of guilt was his confession and the testimony of the victim. Moreover, he would have easily thrown all the officers who questioned him onto the prison wards! Our superiors wouldn’t have forgiven such a gross miscarriage of duty. In such delicate matters as torture of civilians (and the guy was not a bandit or a drug addict), you should never be caught in the act…

.

But lucky us…

The story of a criminal investigator who wished to remain nameless was recorded by Vladimir Kuzemko.

P.S. Thanks to Supah for the link to the article.

websites without cvv

SSH Tunelling” tires plus cc login

Many are wondering how to do SSH encryption and thereby protect yourself from uninvited others?

.

As I am using the program entunnel, I will write using its example.

.

What we will need: 1) Entunnel 2) Hosting with Shell (ssh/ssh2) access 3) PSD (Permeo Security Driver)

First we need hosting with SSH Access is a penny, for example, I buy this hosting for $ 10 a month. It’s better if the hosting is purchased and not charged, agree it’s not pleasant if your hosting will fall while you shop.

So, PSD downloaded Entunnel too, first thing to configure PSD, you need to go to the properties check the In office (means that all programs that will burst into the Internet will intercept PSD). Then press Edit and write the local address 127.0.0.1 and port 1080

Here we need to go to Applications tab, check Proxy all, click Exclude list and put the program entunnel there, it is done to prevent PSD from intercepting the traffic coming from Entunnel

.

PSD is now going to set up Entunnel The first thing I recommend is to set up socks in Entunnel settings so that you can connect to a server even via socks, this is done because your dark stuff will stay on the hosting. Go to Global options (right click on the tray icon), go to the Firewall tab, select Type socks 4 and fill in the socks and its port.

Next, create a new connection in Entunnel, type in Hostname: ip address of your hosting you will get it Port: leave 22 Username: Username, you also get it from the hoster And put a tick next to USE FIREWALL TO CONNECT (otherwise you will not connect to the server via socket)

Go to the Port Forwarding tab, click Add, put a checkmark in Manually select local IP address on which to allow connections and fill in the local address 127.0.0.1 and port 1080 (i.e. this will tell the entunnel to listen to the local address) Check the Destionation host is different from the SSH server and put in another working socket

All then click ok? Press connect and enter Username (if not already entered) and password. Go check on _http://www.leader.ru/secure/who.html to get the sock address.

If you gentlemen something does not work, then your hands are not much crooked, in my opinion I have described everything very clearly

.

The rights to this article belong to the author. Reprinting, using parts of it, etc. for personal purposes on other resources is only permitted with the author’s verbal agreement.

Copyright (C) 2005 Thick

tires plus cc login

Canaan Balsam” card dump sites

A great article by undisputed information security authority Bruce Schneier on questionable cryptographic products and a good way to increase the sensitivity of your hack detector.

Canaan balm

“Encryptor 4.0 uses a unique incremental base shift algorithm of its own design. Decryption is almost impossible; even if someone decompiles our program and finds out the algorithm, decryption of the file depends on precise knowledge of the password (encryption key). Even if someone picks up the encryption key, the file will be decrypted correctly only if the encryption key is 100% the same as the original one. Read theIMPORTANT WARNING on our website.”

I looked at their website; the chance that this product represents even minimal value is zero. Earlier I talked about building robust defenses, using proven mathematical methods, and conservative ways of thinking. Here I want to talk about some common symptoms that characterize Canaan balm, and how you can get an idea of a product from its advertising. These symptoms are not absolute truths, but allow you to form a fairly accurate opinion.

Symptom #1: Pseudo-mathematical clucking In the above quote, note the “unique incremental base shift algorithm of its own design”. Does anyone understand what this means? Are there any scientific papers discussing this algorithm? Lots of clever words in a row doesn’t mean reliable protection at all. Meganet has the following perl on its website:

“The VME is based on a virtual matrix, a binary matrix whose size is theoretically infinite and thus has no redundancy. The encrypted data is compared with the data in the virtual matrix. Once a match is found, a set of pointers is created to show how to find that location in the virtual matrix. This set of pointers (which carries no information if the corresponding virtual matrix is unknown) is then encrypted by many different algorithms at different stages to achieve an avalanche effect. The result is an encrypted file that, even if decrypted, would not contain real information but only a set of pointers. Given that each VME session has a unique, different virtual matrix from the previous ones, and that the arrangement of data within the virtual matrix is completely random and non-redundant, there is no way to determine the original information from the pointer set.”

It doesn’t even make sense to an expert. US Data Security has another pearl: “Mathematically, the TTM algorithm is intuitive and less burdensome to use than methods based on number theory.” SuperKrypt tries to impress with an acronym: “SuperKrypt products use the DNGT bulk encryption method,” whatever that means. And Cennoid just doesn’t understand what he’s talking about: “Since the key length and key structure change, and since the encryption mechanism doesn’t use any mathematical algorithms, the original data recovery is impossible, and so is the picking.” The point is that, like medicine, cryptography is a science. Cryptography has some body of knowledge, and scientists are constantly adding to it: developing new and cracking existing cryptographic methods, creating theoretical foundations, etc. Anyone who is clearly not fluent in the language of cryptography will not be able to make sense of the existing cryptographic literature, and is very unlikely to invent anything worthwhile. It looks about the same as if your doctor suddenly starts talking about “energy waves and healing vibrations”. You should be worried.

Symptom #2: New Mathematical Methods Every couple of years, there is a mathematician who looks at cryptography and says something like, “Oh, that’s very simple,” and creates an encryption algorithm right out of what he is currently working on. Such algorithms invariably end up with holes. Beware of cryptographic methods based on new areas of mathematics: chaos theory, neural networks, coding theory, zeta functions. Cryptography is complex, and the chances that anyone without the slightest experience in the field can revolutionize it are very small. Even if someone succeeds, give the academic community a few years to understand and evaluate this method before buying products based on it.

Symptom #3: Closed Cryptography I promise not to give another speech about the problems associated with cryptographic methods that their developers keep secret. I just consider it one of the warning signs. So when a company like GenioUSA refuses to tell you what algorithm they use (they claim it’s a “world class symmetric encryption algorithm” whatever that is), you should think twice before using their product (by the way, it’s currently fully cracked). Another company, Crypt-o-Text, promises “a sophisticated encryption algorithm of its own design”, and that “there is absolutely no way to know which password was used by examining the ciphertext”. It was fully cracked in a review by InfoWorld. It’s not just small companies that are different. Axent once tried slipping in XOR as an encryption algorithm. The trick worked until someone analyzed the compiled code and that’s when it was discovered Any company that doesn’t want to openly discuss its algorithms and protocols has something to hide. There can be no other reason. (And don’t take their claims that the technology is patented seriously – from the moment they apply for a patent, they can open up the technology. And if they aren’t ready to apply for a patent yet, send them away until they can publish it.)

Symptom #4: Exceptional ignorance Some companies make such terrible claims that it becomes obvious that they simply don’t understand anything about the field. TriStrata claims about their encryption algorithm, “Because TriStrata’s cryptographic scheme is very simple and has very low computational complexity, the client side can be hosted on a wide variety of systems, from servers to laptops.” Do they realize that almost any encryption algorithm requires very few resources and can fit on a laptop, that DES, RSA and SHA can be implemented in 8-bit smart cards, that some AES candidates require only 17 CPU cycles per byte and can be implemented in hardware using a few thousand fans? GenioUSA explains why they don’t use public key cryptosystems in their product:

“Public key encryption means that you are not alone in generating, enforcing the integrity of, and protecting all keys and passwords used to encrypt your emails, documents, and files. Public key encryption is a great technology to share information with those who you can’t trust your secret keys to and/or can’t exchange secret keys with. We will quote one sentence from a well-known web page: “All known public key cryptosystems, however, are vulnerable to certain types of attacks and thus must use keys dozens of times longer than those previously discussed in order to achieve the same level of security.”

What are the conclusions? This company just didn’t get the point.

Symptom #5: Ridiculous key lengths Jaws Technology boasts: “Thanks to the statistically unbreakable 4096-bit key of the JAWS L5 algorithm, you can be sure that your most valuable files are secure. Meganet went even further, “Symmetric keys are 1 million bits long – competitors only offer 40-160 bits!!!” The longer the key, the better, but only up to a certain limit. AES will support keys of 128, 192 and 256 bits in length. That’s a lot more than we’ll need for the foreseeable future. As a matter of fact, we cannot even imagine a world in which it is possible to completely brute force all keys of 256-bit length. This would require some fundamental discoveries in physics and in our understanding of the universe. Public key cryptosystems have an analogous property to keys 2048 bit long: longer keys make no sense. This should be seen as a special case of Symptom #4: do you want to entrust the development of a cryptographic tool to a company that does not understand what the key length means?

Symptom #6: Disposable notepads Disposable notepads are completely useless for commercial cryptography. They’re good for spies armed only with pencil and paper, they’re good for a telegraph hotline between the US and Russia, but they’re completely useless for you. The vast majority of companies claiming they are implementing a disposable notepad are wrong. What they are actually implementing is something that they believe is a disposable notepad. A true disposable notepad can be proven to be absolutely secure (against certain types of attacks), but it’s also completely impractical. Elementrix, now defunct, announced a product implementing a disposable notepad several years ago, and refused to comment when it was shown that no disposable notepad was in its product. Ciphile Software is simply trying to mislead: “Original Absolute Privacy – Level3 is an automated pseudo disposable notepad generator with very advanced and powerful additional features.” What would that mean? TriStrata later jumped onto the global crypto bandwagon by announcing that it had implemented a disposable notepad. After that, she was kicked around by anyone with a modicum of cryptographic common sense, and she eventually removed the phrase from the website. That’s a good thing: at the very least, she demonstrated the ability to learn. Ultimate Privacy may indeed be using a one-time pad (although they claim to use Blowfish as well, which makes me wary):

“One-time pad is a symmetric key encryption method, and it requires secure and reliable transmission of the cryptographic notepad itself, which in our solution plays the role of the key. The degree of protection of the key must be at least as high as the degree of protection you want to achieve – for exchanging information with only one correspondent, we recommend a personal hand-to-hand transfer of the cipherpad.”

Remember that you need to pass from hand to hand a cipher notebook of the same size as all the messages you want to pass, otherwise it won’t be a disposable notebook anymore.

Symptom #8: Defense Proofs There are two varieties of quack proofs. The first are real mathematical proofs, which, however, have nothing to do with the real level of security. The second are fake proofs. Meganet claims that there is proof that their VME algorithm has the same persistence as a one-time pad. Their “proof” is an explanation of how the disposable notepad works, the magic spell “VME has similar empirical patterns of behavior that prove it is just as persistent and unbreakable as the disposable notepad” and some statistical test results. That doesn’t even remotely resemble proof. A more subtle issue is systems whose security can be proven for real. Such exist. In the summer of 1998, IBM made a big fuss in the press about their provable secure system, which they claimed could revolutionize the world of cryptography. (You can find the discussion here.) You haven’t heard anything about that system since then. It was really great scientific work, but unfortunately the mathematical proof has little to do with the security of specific products.

Symptom #9: The hack prize I wrote on this topic in December 1998. Suffice it to say here that announcing a prize for breaking a security system does not at all guarantee that it is unbreakable, and usually means that the developers do not understand what should be done to show that the system is well protected. Conclusion: What is ‘good’ and what is ‘bad’ These symptoms, which warn of quack tools, cannot be seen as criteria to distinguish a good cryptographic tool from a Canaan balm. A highly vulnerable product can bypass all of these warning signs, and just as a perfectly good product can look very similar to a Canaan balm. But most people don’t have enough time, patience and knowledge to do the analysis required to make an informed choice on their own. In the absence of a body that controls cryptographic products (like food and medicines), the only thing a sensible user can do is to pay attention to these or similar warning signs.

Bruce Schneier

card dump sites

How to protect yourself from scams” dumps plus pin

I would like to open a topic on the issue of protection against scams. To begin with, I will post an article I once wrote. Add something of your own.

Everything written will help you avoid unpleasant situations with dishonest people. The topic remains. I’m very interested in your opinions and additions. This is the main one, continuation follows

Author: DreAmeRz ICQ: 817312

The rights to this article belong to the author. Reprinting, using parts of it, etc. for personal purposes on other resources is only permitted with the author’s verbal agreement.

Copyright (C) 2005 DreAmeRz

dumps plus pin

Serious Online Security” buy company fullz

This article is not another step-by-step instruction for beginners. While I am not arguing against the usefulness of such instructions, I think that serious security goes beyond that and requires a different approach. This article is a report on a near perfect (imho) security system. The first part is a description of the ideas behind the system. The second part is dedicated to some technical aspects which may seem non-trivial. I want to tell you right away that all the ideas that will be described here have already been mentioned (mostly not in circum-carding literature). That’s why I don’t pretend to be a pioneer, I’ve just tried to combine known solutions, discarding unnecessary things to get the system maximum suitable for people who are seriously engaged in karding. How much I succeeded in it, you’re the judge.

I. Idea. A reasonable question is what properties should a security system have? I formulate them as follows:

1. Masking system should look like a typical American (European) 2. Total anonymity practical impossibility _any_ action inside or outside the system set our ip (this property also implies running in the system programs such as casino-clients or wm keeper, which can find ip referring, for example, to ipconfig) So, in fact, the system _ itself should not know your real ip_ 3. Compatible with most programs. 4. Mobility The system must be writable and not leave any traces on the machine. 5. Ability to remove all unnecessary data (history, cookies, icq logs, etc). 6. Ability to encrypt and store needed data on removable media.

So here’s the gist: A clean operating system is being installed on the machine. I used FreeBSD, though I suppose it’s possible to use any *nix or even windows 2k/nt/xp.

vmware is installed on it. (For those who don’t know: software for creating and using virtual machines. Details: www.vmware.com) The role of operating system on the virtual machine for obvious reasons, it is advisable to use win98 Eng (with further Russification of course). In this case win98 should (for the reasons given below) be trimmed to the minimum size.

.

The disk and the configuration file of the virtual machine are written to removable media (I used cd-rw 8mm). At each startup a ram disk virtual disk is organized all the data on which is actually stored in RAM. To this disk I copy disk and configuration file for vmware and start virtual machine from there. This avoids writing any compromised information to the disk. In order not to load the RAM and the mentioned windows trimming is needed. For me to run a virtual machine I need only 150 mb of disk space. So with 256 mb ram or more (I think most can afford it) you won’t have any problems with starting.

Internet access is organized by organizing a VLAN between a real machine and a virtual machine. The real machine is used as a Gateway and does NAT Network Address Translation. This allows the virtual machine to know our real ip address.

II. Some technical points.

Hash = 07388498-76ef1144-25514544-a5a93d5e-5053cb2d ============END============

02. Installing a stripped down win98 eng. This is where the excellent program 98lite(www.98lite.net) comes in. From my point of view 150mb is optimal vmware virtual disk space. There is one little problem: 98lite needs to copy all the win98 files, that won’t fit on the 150mb drive. The solution is also quite trivial: you create 2 disks: working (150mb) and temporary (600mb just for fun). On the second disk 98lite is installed, distributive files are copied. After installing win98 it can be removed. Also a word of caution: When choosing a shell option I would choose CHUBBY since sockschain will not work in MICRO.

03. Russification win98 In order not to wear out the people around you with transliteration, it is necessary to be russified. To do this: Start-Settings-Control Panel-Keyboad-Language-Add-Russian-OK Next you need to download and install fonts. You can download them, for example from ftp.robertsonblums.ru/pub/win/rus/fonts.zip Further they are unpacked and in msdos mode are placed in c:windowsfonts Then in file C:windowswin.ini section [FontSubstitutes] add following lines: ===========START=========== System,0=System,204 Fixedsys,0=Fixedsys,204 MS Sans Serif,0=MS Sans Serif,204 MS Serif,0=MS Serif,204 Arial,0=Arial,204 Courier,0=Courier New,204 Courier New,0=Courier New,204 Times New Roman,0=Times New Roman,204 Arial Cyr,0=Arial,204 Arial Cyr,204=Arial,204 Courier New Cyr,0=Courier New,204 Courier New Cyr,204=Courier New,204 Times New Roman Cyr,0=Times New Roman,204 Times New Roman Cyr,204=Times New Roman,204 ============END============

04. Configuring NAT I will describe how to configure address translation using the natd daemon. The settings need to be changed on both the virtual machine and the real machine. Let’s start with the virtual one: Start-Settings-Control Panel-Network-TCP/IP-Properties-IP Address: set the ip address from the same subnet as the ip address of the vmnet1 interface of the real machine (192.168.254.* by default). We will start with 192.168.254.100. In the Gateway tab enter the address of the interface (192.168.254.1 by default). In DNS Configuration we specify the DNS address of our ISP. All done with virtual machine. On the real machine we need support for ipfw. To do so you need to rebuild kernel with options: options IPFIREWALL options IPDIVERT options IPFIREWALL_DEFAULT_TO_ACCEPT You need to add following parameters to /etc/rc.conf file: gateway_enable=YES firewall_enable=YES After rebooting your machine you can run following command /sbin/ipfw add divert natd all from any to any via name_external_interface Before each vmware startup, start the natd daemon: natd -n name_external_interface Now the real machine will act as gateway, redirecting packets from the VLAN (192.168.254.*) to the external network. This avoids setting your real ip address on the virtual machine by limiting it to the dummy 192.168.254.100.

05. Creating a ram dysk. The configuration file and virtual disk of the configured system are overwritten onto removable media. The following steps are taken at each startup: a. Mounts Memory File System: mount_mfs -s xxxx /dev/ad1s1b /mnt where /dev/ad1s1b is your swap device, /mnt mount point, xxxx ramdiska size in sectors (corresponds to 2048*yyyy, where yyyyy is ramdiska size in mb) b. The configuration file and the virtual disk of the virtual machine are copied from the removable device to Ramdisk. c. The vmware itself is launched. d. After work unmount ramdisk: umount /mnt (/mnt is still the mount point)

This is what my attempt to present some ideas on how to build a serious security system looks like. If I made any inaccuracies, I will be glad to receive constructive criticism. I would also be very grateful for any additions.

Copyright (C) 2004 dworkin

buy company fullz

Get your own VPN” best cc website for carding

In this article, I will discuss one way to set up your VPN, using OpenVPN as an example, as the most popular (and convenient) server on FreeBSD. A dedicated server is needed for the installation, since VPS has problems with kldloading.

1) Download the distribution and library: cd /usr/local/src fetch http://_openvpn.net/release/openvpn-2.0.tar.gz fetch http://www._oberhumer.com/opensourcezo-1.08.tar.gz

2) Install lzo first, because OpenVPN will not build without it: tar zxf lzo-1.08.tar.gz cd lzo-1.08/ ./configure make make install

3) Build the actual daemon sorts: tar zxf openvpn-2.0.tar.gz cd ../openvpn-2.0/ ./configure with-lzo-headers=/usr/local/include/ with-lzo-lib=/usr/local/lib/ make install

4) Configure Create a directory to hold the configs, startup scripts, .pid files and the key: mkdir /usr/local/etc/openvpn/1/

Generate static key: /usr/local/sbin/openvpn genkey secret /usr/local/etc/openvpn/1/key

Next, create the main config: cat /usr/local/etc/openvpn/1/openvpn-tcp.conf dev tap proto tcp-server ifconfig 10.1.1.1 255.255.255.252 secret /usr/local/etc/openvpn/1/key port 5001 daemon port user nobody group nobody comp-lzo enable traffic compression. ping 15 ping-restart 45 ping-timer-rem persist-key verb 3 CTRL C

Give the script run permissions: chmod 755 /etc/fire.sh

chmod 755 /usr/local/etc/openvpn/1/openvpn-tcp-start.sh

Add the following lines to rc.conf: gateway_enable=YES

sysctl net.inet.ip.forwarding=1 (to allow to be gateway without rebooting)

Add our config paths to /etc/rc.local to run at startup: /etc/fire.sh /usr/local/etc/openvpn/1/openvpn-tcp-start.sh kill -9 `cat /usr/local/etc/openvpn/1/openvpn-tcp-start.pid`

5) Now configure the Windows client part: Download the client http://_openvpn.net/release/openvpn-2.0-install.exe This will store the startup scripts and the key: C:Program FilesOpenVPNconfigdir

Правим конфиг клиентской части(win-openvpn-tcp.conf): remote 1й_IP_сервера port 5001 proto tcp-client dev tap ifconfig 10.1.1.2 255.255.255.252 ifconfig-nowarn tun-mtu 1500 secret key ping-restart 60 ping-timer-rem persist-key resolv-retry 86400 ping 10 comp-lzo verb 4 mute 20 route-gateway 10.1.1.1 redirect-gateway

Next, put the key we generated (/usr/local/etc/openvpn/1/key 4th item) into C:Program FilesOpenVPNconfigdirkey

And startup: C:Program FilesOpenVPNbinopenvpn redirect-gateway(so that all traffic goes through our VPN) config c:\Program FilesOpenVPNconfigdirwin-openvpn-tcp.conf To exit F4

If everything went without errors then your protection is absolute! You now have a masking IP.

P.S Article is written on the principle that the entire installation can be performed by a trivial Copy-Paste, ie, install the VPN can even beginners =)

The rights to this article belong to the author. Reprinting, using parts of it, etc. for personal purposes on other resources is only permitted with the author’s verbal agreement.

Copyright (C) 2005 Transmutagen specially for https://ver.sc

best cc website for carding

verified cc shop