Illegal Downloads

Google+ Pinterest LinkedIn Tumblr +

When you download a file from the Internet, you leave a ‘calling card’.  It is fairly easy to find you.  Even a non hacker can get your I.P. number, (the Internet Protocol…the numerical identification and logical address that is associated with the server you are using).  

Every I.P. address corresponds to a specific server; i.e. Bell South, American Movil, etc.  And it is pretty simple to find out from that server who connected to the computer on which the download was gained.

For example, if at 9:03 someone connected to from the service you use, a subpoena served on your provider will reveal it was … YOU.

As you can see, an illegal download becomes on par with robbing a bank and leaving your address with the teller.

Hence, you have to use a proxy server.

There are googals of proxy servers all over the world. Pick the one that catches your fancy and use it when you are visiting a place you don’t have a right to be.

Many proxies are located in places like Romania so that kind of misdirects the investigators, for there isn’t much chance the proxy keeps much record or would reveal them.

When you download illegal stuff, you should really put it on a spare hard drive, not on the one in your computer.  If you have made some illegal downloads onto your C drive, there are ways to clean it up.

Firstly, you should have created a different user account which does this kind of stuff so that as Administrator or as Root you can destroy the entire account and erase all content with a keystroke.

Secondly, you want to do a disk clean up, using whatever tools you have or have down loaded, a defragmenter, and then, download a legal item,
to obliterate your previous download.  This legal download will also be
deleted, cleaned up and the hard drive defragged.

If you have lots of illegal stuff you might want to fully wipe your hard drive.

Many companies offer such software to protect those who are selling or giving away used computers to prevent identity theft. Usually an F Disk and reload are not complete enough.

Often, doing an F disk, loading a flavour of Linux is pretty useful.  What you want to do is make it as near impossible for anyone to be able to find anything on your computer which in anyway connects you to illegal downloads.

That means killing history, cookies, whatever it takes; often, the entire operating system when you’ve really been busy.

If you’ve kept everything off your hard drive, downloading to a spare, and have used proxies, destroyed your history, It is not going to be easy to uncover your illegal activity.

When you perform illegal activities you have to think like a prosecutor. You have to gather the evidence against you. If you can destroy the evidence before it can be gathered then you won’t be successfully prosecuted.


About Author

Leave A Reply