These days, gaining access to a botnet (a large collection of infected computers) is insanely easy. For anyone with a functioning brain, finding a way to DDoS someone offline is as easy as Googling a few of the right words and paying $15/month for access to a shell booter site. Here is a simple to follow guide on how you would set yourself up to DDoS someone, including links to many well known and reputable booters – sites that will allow you to “rent” their botnet for brief DDoS attacks against your chosen victim.
With it being incredibly easy these days for any computer-savvy individual to launch these attacks, it is necessary to take precautions.
My goal in writing this is to give everyone the perfect guide to protect their Skypes from leaking their IP addresses to the public. I am very picky about my recommendations to people, and I have four very strict guidelines for any method I recommend when it comes to security and technology.
It should be simple.
- This means it should be easy to set-up and hard (or impossible) to screw up. Nothing complicated, nothing requiring previous extensive technical knowledge. Just something easy to set up.
It should be elegant.
- The solution should require as few steps as possible, and omit any extraneous programs or steps that aren’t absolutely necessary.
It should be reliable.
- Whatever we set up should work the maximum amount of time, conditions permitting.
It should be secure.
- There should be no “half-measures” taken to secure yourself, ever. If you’re going to cut corners, don’t bother.
I have extensive experience with the method and program that I will suggest using in the following pages. I currently use this very method to protect myself while I stream and it has never, ever failed me. I have exhaustively considered various options at every single stage of what I’m going to recommend in this guide, but I will assure you that everything I suggest is the most time-efficient and cost-effective option that I have come across.
I’m not being paid for or sponsored by any of the programs I am going to recommend.
I have seen dozens of other anti-DDoS guides on the internet, the reason I am writing mine is because most of those are garbage. I have seen guides where people will spout off an impressive list of qualifications and then go on to spew misinformation. I am using the exact method to protect my IP that I will outline in the following pages, and to this date I have had a 100% success rate in thwarting people who wish to harm my connection.
I will not tell you to route your Skype traffic through some unknown proxy from a random SOCKS5 list. I won’t tell you to download mysterious batch files and pray that they alter the correct registry settings. I won’t tell you to route all of your traffic through a VPN, hurting your game performance. And I won’t tell you to “uninstall Skype” because people who function in this realm know that’s just not possible.
I am going to do this write-up in two parts. The first part is going to be a step-by-step analysis of every bit of information and software I’m talking about. Everyone should strive to understand these relatively simple concepts, especially if you’re going to be taking advantage of any of the software that I mention later on. It’ll give you a greater appreciation and understanding of everything you are about to do, and it’ll be a life-enriching process in to aid you in your never-ending, unquenchable thirst for knowledge. The second part will simply be the instructions necessary to install and set-up the programs required to ensure a safe experience on programs that can release your IP address into the wilderness of the internet.