Welcome to NethinGoez

Greetings to all guests. You have been required to change your password. Please click 'Forgot Your Password' link on the login page and follow the necessary steps to change your password. If you're having issues resetting your password, please E-Mail futomntg@gmail.com

Search the Community

Showing results for tags 'vpn'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • NeThinGoez
    • Announcements
    • NeThinGoez Donations
    • General
    • Help
    • Raffle Zone
    • Archived Reports
  • Monetizing
    • Monetizing Techniques
    • Crypto-Currency Talk
    • Leak Guides and Tutorials
    • CPA / PPD Money
    • Investment Strategies and Markets
    • Shopping Deals
  • Hacks, Exploits, and Various Discussions
  • RedRope
  • Cracking
    • Cracking Discussions
    • Tools
    • Public Configuration Files
    • Tutorials
    • Cracking Lists
    • Requests
  • Account Tosses
    • Free Account Tosses
    • Premium Account Tosses


  • Scanning Tools
  • Cracking Tools
  • Proxy Tools
  • User Made Tools

Found 25 results

  1. x1 Surfeasy VPN

  2. Best VPN for speed

    I have about 110 mbs Ethernet speed and I am using cybergost which is degrading my speed.
  3. The advantages of RSocks: High quality services. Working with RSocks, you achieve maximum efficiency of the workflow; 24-hour technical support. Simply choose the convenient communication channel for you: Jabber, Skype, Telegram, ICQ, ticket system and convenient Live chat on our site; Attention to details. Individual approach to solving your problems; Payments on the referral system are made within 24 hours; Guarantee of anonymity, absence of logging; Refunds are made within 24 hours (except for daily packages); Free hour of testing our services for new users. The RSocks team operates on the principle of "one IP address - in one hand". This is what guarantees an individual approach to your tasks and quality work for the entire period of subscription to the service. Advantages in using VPN from RSocks: Maximum safety. The service creates a special encryption tunnel, through which all your personal information will be transmitted; __________ Lack of logs. Our system does not provide for the maintenance of statistics and does not create records by which the user could be identified; __________ Support for Torrent, P2P, VoIP. Having installed our VPN, you get a unique opportunity to download unlimited volumes of video and audio, as well as share your content with other users; __________ Unlimited bandwidth. Using VPN from RSocks, you can watch streaming video, chat with friends on video chat and use other features of the global network; __________ Versatile use. Our VPN service works on all devices, including game consoles and Smart-TVs with an Internet connection. __________ Own applications for Windows, macOS, Android, iOS. Servers are located in the following countries: USA, Great Britain, Ukraine, Switzerland, Sweden, Spain, Russia, Romania, Poland, Netherlands, Luxembourg, Italy, Israel, Isle of Man, Hong Kong, Germany, France, Estonia, Belgium, Austria and others. At the moment, the number of countries is more than 30, and this figure is increasing daily. We offer you the possibility of a quick start to the business of selling our proxy services under your brand, based on the White Label model. White Label definition on Wikipedia Read more about this offer on RSocks White Label All requests and suggestions will be received on the mail wl@rsocks.net A link to download RSocks proxy checker you can find on the main page, and IP-Changer - in your personal account. Jabber: support@rsocks.net PHONE:+1 518 555 0176 Telegram: @RSocks Skype: rsocks.net QQ: 3307018252 WeChat: rsocks ICQ: 560335 www.rsocks.net
  4. Ikev2 or OpenVPN

    I was wondering which method most people preferred. I personally have used both and do love the simplicity of openvpn. I recently switched to using strongswan to setup an ikev2 server on my tomatousb flashed router. The performance and speed of ikev2 is pretty astounding. It is significantly faster than openvpn in my current setup.
  5. Express VPN Serial keys

    Give me some propz if you like the post
  6. VPN providers often advertise their products as a method of surfing the web anonymously, claiming they never store logs of user activity, but a recent criminal case shows that at least some, do store user activity logs. The case in question is of Ryan Lin, a 24-year-old man from Newton, Massachusetts, arrested on Thursday, October 5, on charges of cyberstalking. According to an FBI affidavit published by the US Department of Justice, Lin is accused of harassing and cyberstalking an unnamed 24-year-old woman — referred to under the generic name of Jennifer Smith — between April 2016 and up until his arrest. It all started with a Craigslist ad The two met after Lin answered a Craigslist ad and moved in with Smith and her two other roommates. The FBI says that soon after Lin moved in with Smith, she was the victim of multiple hacking, harassing, and cyberstalking incidents. Investigators believe that Lin got access to passwords of some of Smith's online profiles because Smith didn't have a lock on her room door, and didn't password-protect her computer. Authorities say that Lin allegedly accessed Smit's Apple iCloud account from where he downloaded personal photos, and also her Google Drive account from where he took her private journal. Smith was the victim of a wide range of harassment campaigns According to the affidavit, Lin is the prime suspect behind a multi-faceted and unyielding harassment campaign that spanned months. In no particular order, below are some of the FBI's accusations: ⧐ The suspect allegedly created a collage of Smith's personal photos and non-related sexually explicit images and sent it to Smith's friends, classmates, teachers, co-workers, roommates, and family friends (including a minor). The emails were spoofed to make them appear as coming from Smith's email address. ⧐ The suspect allegedly sent excerpts of Smith's private journal to other persons, revealing personal details such as a past medical, psychological, and sexual history. ⧐ The suspect allegedly created online accounts in Smith's name on adult portals asking people to show up at her house to enact BDSM, gangbang, rape, and other sexual fantasies. At least three people showed up. ⧐ The suspect allegedly harrassed Smith using SMS messages sent via an anonymous text messaging service (textnow.com). ⧐ The suspect allegedly spoofed Smith's identity to send bomb and other threats to nearby schools and lone individuals. ⧐ The suspect allegedly sent threatening communications to Smith's friends, associates, and family (including a minor), urging Smith to commit suicide, or threatening to kill and rape Smith and associates. ⧐ The suspect allegedly bombarded Smith with friend requests on Facebook, even after getting blocked. ⧐ The suspect allegedly hacked Smith Rover.com account (pet sitting service) and told pet owners that Smith intentionally killed one of their pets, resulting in the pet owners sending police officers to their house to deal with Smith. ⧐ The suspect brought up the fact that Smith had an abortion, even if the suspect did not tell anyone about it, and only recorded the event in her private journal. Smith told authorities the abusive behavior began soon after Lin moved in, and continued even if she moved out two months later, scared by his actions. Lin's abusive behavior was then redirected to the other two roommates, and following complaints to the landlord and police, Lin was kicked out from the shared apartment in August 2016. The cyberstalking and harassing behavior continued, again, mainly directed at Smith. Suspect hid behind VPNs, Tor, ProtonMail For all of these actions, the suspect used ProtonMail, VPN clients, and Tor to hide his identity. After local police investigated all the victim's complaints for almost a year, they called in the FBI to help. The FBI found their first evidence at one of Lin's former employers. The company had reinstalled Lin's work computer after he left, but the FBI was able to find various artifacts in the hard drive's unallocated disk space. Evidence includes: ⧐ Google Chrome artifacts that Lin had read about the bomb threats against local schools. ⧐ Google Chrome artifacts that Lin had an account on textnow.com ⧐ Google Chrome artifacts that Lin had an account on ProtonMail ⧐ Google Chrome artifacts that Lin had visited Rover.com ⧐ Google Chrome artifacts that Lin had visited the Smith's Spotify profile, but also the profiles of Smith's brother and one of her best friends. ⧐ PureVPN artifacts suggesting Lin was using the company's VPN client. VPN activity logs tie Lin to Smith's harassment Yet, the most conclusive evidence came after the FBI managed to obtain logs from two VPN providers — PureVPN and WANSecurity. The logs showed how within the span of minutes the same VPN IP address had logged into Lin's real Gmail address, another Gmail address used for some of the threats, and a Rover.com account Lin created to discover Smith's real phone number. PureVPN was later able to link the stalking activity with Lin's home and work IPs. Ironically, FBI agents also found tweets in which Lin was warning other users that VPN providers store activity logs, advice he didn't follow himself. Investigators became sure they identified the right man after they interviewed some of Lin's past classmates, who recounted a similar pattern of harassment and cyberstalking from a man they described as a computer "genius." "As alleged, Mr. Lin orchestrated an extensive, multi-faceted campaign of computer hacking and online harassment that caused a huge amount of angst, alarm, and unnecessary expenditure of limited law enforcement resources," said FBI Special Agent in Charge Shaw. "This kind of behavior is not a prank, and it isn’t harmless. He allegedly scared innocent people, and disrupted their daily lives, because he was blinded by his obsession," the agent added. "No one should feel unsafe in their own home, school, or workplace, and the FBI and our law enforcement partners hope today’s arrest will deter others from engaging in similar criminal conduct." Source: https://www.bleepingcomputer.com/news/security/cyberstalking-suspect-arrested-after-vpn-providers-shared-logs-with-the-fbi/
  7. Hi all, Im glad to offer this Config made for me. Please dont leech. Proxyless: 35 Bots (Dont rape the login ) Write something and enjoy!
  8. Metodo HMA: Please dont be a leecher Give me loves . Leechers will be reported Take care
  9. sentry mba proxyless 5VPN.net + Balance Capture

    Combo :- Email:Password Bots :- Maximum 5 As Per Me Proxy :- No Need Of Proxies Pure Proxyless + Super-Fast Checking Made By Me ! Proof :-
  10. Site: Mudfish.net Combo: User/Pass Proxy: No, well I tried till 5k hits and debugged the config was still working. If bans then use Proxy. 1 - 4 Bots if Pless, 30 - 50 if Proxy. Capture: Yes
  11. surfeasy.com x3

    Starter vpn accs. All accs have devices left on them.
  12. free VPN hidemyass free account maker hit the REP plz
  13. hitman GOLDENFROG.COM

    use:Email combo use proxy:yes ,check it fist bots:80-100 bots capture:yes Proof.
  14. sentry mba Hide.me (capture)

    Combo: user-pass Proxy: Yes (Good ssl Proxies For Faster Cracking) Bots : 30 Capture : pan, expiration date Add info : If you hit premium account, please inbox me so that I can edit this config to premium only, thank you. P.s : Thank you @Xander for helping complete this config.
  15. sentry mba Golden Frog Vpn

    Combo:Email Pass Proxy: Yes (Good ssl Proxies For Faster Cracking) Bots : 90 Cature : Premium; Expiration Date
  16. member.hide.me [capture]

    Category: VPN Combo: user : pass Proxy: Yes. Bots: 100 Config:
  17. hitman AIRVPN.ORG

    Combo Type: Email/User Combo Proxy: Yes Bots: 80-100 Capture : days until expire Proof.