About Merozey aka TypoGuy
A White Hat hacker whose truly passionate about the art of exploitation, social engineering & anonymity, among others. PM if you need anything.
Merozey aka TypoGuy's Latest Posts
How To: Keeping Your Hacking Identity Secret: How to Become a Ghost Hacker #4
Coding with Typo: Structured Query Language: (SQL) Part 2: Getting the Essentials
Forum Thread : TypoGuy Opening Up
I have been quite active recently as many of you might know, and right now it's hard for me to keep up with everything because of some personal stuff im dealing with. I hope you can understand and I will likely need some time to process this, before I get back on my grind. It ...more
How To: Gathering Sensitive Information: Scouting Media Profiles for Target Information
Coding with Typo: Structured Query Language (SQL) Part 1: What Is SQL?
Coding with Typo: Structured Query Language (SQL) - Yes/No?
How To: Gathering Sensitive Information: Using Advanced Search Queries
Advice from Typo: Mastering CMD Like a Real Hacker, Part 1 (Colors)
A Hackers Advice & Tip: Choosing Your Path. Knowing Where to Learn & How to Learn It **Newbies Please Read**
How To: Keeping Your Hacking Identity Secret: How to Become a Ghost Hacker #3
Forum Thread : Any IT-Experts? !
I have now gathered information on my router which has been provided by my ISP. I know that my ISP does not offer help with port forwarding, which means, that if their customers wants to port forward their router, they will have to do it themselves, and their ISP wont provide ...more
Forum Thread : Any IT-Experts Here?
I have changed ISP and come to realize they do not offer Port Forwarding. I spoke to support staff at my ISP and was told I would need an additional router, and any other options would need to be advised by an IT-expert. Since that is beyond their knowledge. I was hoping you h ...more
How To: Gathering Sensitive Information: How a Hacker Doesn't Get DoXed
How To: Gathering Sensitive Information: Basics & Fundamentals of DoXing
TypoGuy Explaining Anonymity: Staying Hidden from the NSA
How To: Keeping Your Hacking Identity Secret - #2
Forum Thread : What Will Typo Teach You in 2016?
2016 is days away, and I want to enlighten you on what I will be teaching you in the upcoming year. Looking Back: Looking at my older articles, I have taught you some well important things if I do say so myself. I haven't really put my focus on the technical stuff as a hacke ...more
TypoGuy Explaining Anonymity: Secure Browsing Habits
TypoGuy Explaining Anonymity: Choosing a Good VPN
Typo Explaining: Using Null Byte Properly
TypoGuy Explaining Anonymity: Who Is Anonymous?
News: Anonymous vs ISIS
How To: Deleting Your Files Completely
Forum Thread : Configuring Persistence in Kali 2.0
yeah, I need to configure persistence and for some reason my drivers won't appear when I type ; fdisk -l I did all the previous steps with partioning and making the drive bootable, now I need to configure it in kali but it doesnt say /dev/sda & /dev/sda2 it says instead; /dev ...more
Forum Thread : Kali Linux 2.0 (Sana)
I had to re-install kali linux 2.0 and now when I download the .iso 64bit from kali.org/downloads & offensive security I dont have a .iso file in the downloaded folder. I cant find a solution to this problem, so I hope some of you can help me. I also tried 32 bit it was the s ...more
TypoGuy Explaining Anonymity: A Hackers Mindset
News: ProntonMail under DDoS Attack
TypoGuy Explaining Anonymity: Your Real Identity
Forum Thread : Who Is TypoGuy? Let Me Tell You!
TypoGuy? I'd like to introduce myself because I like this community. Who Am I? I am a grey hat hacker if I would have to put myself in one of the 3 categories of ; black hat, white hat and grey hat. All though grey hat sometimes do unethical hacks, it is not as serious as b ...more
News: Signal - the Encryption App That Keeps NSA & Governments Away!
News: Hackers Claim 1$ Million Bounty for Security Flaw in iOS 9
How To: Keeping Your Hacking Identity Secret
Sites
- Hot
- Latest
-
You're Being Tracked: How Google Inc. Spies on Your Every Digital Move
-
How To: Keeping Your Hacking Identity Secret: How to Become a Ghost Hacker #4
-
Coding with Typo: Structured Query Language: (SQL) Part 2: Getting the Essentials
-
Forum Thread: TypoGuy Opening Up 5 Replies
8 yrs ago -
How To: Gathering Sensitive Information: Scouting Media Profiles for Target Information
-
Coding with Typo: Structured Query Language (SQL) Part 1: What Is SQL?
-
Coding with Typo: Structured Query Language (SQL) - Yes/No?
-
How To: Gathering Sensitive Information: Using Advanced Search Queries
-
Advice from Typo: Mastering CMD Like a Real Hacker, Part 1 (Colors)
-
A Hackers Advice & Tip: Choosing Your Path. Knowing Where to Learn & How to Learn It **Newbies Please Read**
-
How To: Keeping Your Hacking Identity Secret: How to Become a Ghost Hacker #3
-
Forum Thread: Any IT-Experts? ! 14 Replies
8 yrs ago -
Forum Thread: Any IT-Experts Here? 7 Replies
7 yrs ago -
How To: Gathering Sensitive Information: How a Hacker Doesn't Get DoXed
-
How To: Gathering Sensitive Information: Basics & Fundamentals of DoXing
-
TypoGuy Explaining Anonymity: Staying Hidden from the NSA
-
How To: Keeping Your Hacking Identity Secret - #2
-
Forum Thread: What Will Typo Teach You in 2016? 0 Replies
8 yrs ago -
TypoGuy Explaining Anonymity: Secure Browsing Habits
-
TypoGuy Explaining Anonymity: Choosing a Good VPN
-
How To: Keeping Your Hacking Identity Secret: How to Become a Ghost Hacker #3
-
How To: Gathering Sensitive Information: Basics & Fundamentals of DoXing
-
TypoGuy Explaining Anonymity: Who Is Anonymous?
-
How To: Gathering Sensitive Information: Using Advanced Search Queries
-
How To: Keeping Your Hacking Identity Secret - #2
-
News: Anonymous vs ISIS
-
News: Hackers Claim 1$ Million Bounty for Security Flaw in iOS 9
-
You're Being Tracked: How Google Inc. Spies on Your Every Digital Move
-
How To: Keeping Your Hacking Identity Secret: How to Become a Ghost Hacker #4
-
Coding with Typo: Structured Query Language: (SQL) Part 2: Getting the Essentials
-
Forum Thread: TypoGuy Opening Up 5 Replies
8 yrs ago -
How To: Gathering Sensitive Information: Scouting Media Profiles for Target Information
-
Coding with Typo: Structured Query Language (SQL) Part 1: What Is SQL?
-
Coding with Typo: Structured Query Language (SQL) - Yes/No?
-
Advice from Typo: Mastering CMD Like a Real Hacker, Part 1 (Colors)
-
A Hackers Advice & Tip: Choosing Your Path. Knowing Where to Learn & How to Learn It **Newbies Please Read**
-
Forum Thread: Any IT-Experts? ! 14 Replies
8 yrs ago -
Forum Thread: Any IT-Experts Here? 7 Replies
7 yrs ago -
How To: Gathering Sensitive Information: How a Hacker Doesn't Get DoXed
-
TypoGuy Explaining Anonymity: Staying Hidden from the NSA
-
Forum Thread: What Will Typo Teach You in 2016? 0 Replies
8 yrs ago -
TypoGuy Explaining Anonymity: Secure Browsing Habits
-
TypoGuy Explaining Anonymity: Choosing a Good VPN
-
Typo Explaining: Using Null Byte Properly
-
How To: Deleting Your Files Completely
-
Forum Thread: Configuring Persistence in Kali 2.0 0 Replies
8 yrs ago -
Forum Thread: Kali Linux 2.0 (Sana) 2 Replies
9 yrs ago -
TypoGuy Explaining Anonymity: A Hackers Mindset
-
News: ProntonMail under DDoS Attack
-
TypoGuy Explaining Anonymity: Your Real Identity
-
Forum Thread: Who Is TypoGuy? Let Me Tell You! 10 Replies
9 yrs ago -
News: Signal - the Encryption App That Keeps NSA & Governments Away!
-
How To: Keeping Your Hacking Identity Secret