How To Use Cookies Tut
How To Use Cookies Tut
How To Use Cookies Tut
Cookies
More FREE Downloads For You
Learn How To Make $500+ Daily With Botnets
Learn How To Spam And Get Your Own Logs (Bank, Credit Cards...)
Shopwithscrip Cashout Method
Worldremit Cashout Method
Coinbase Wellsfargo Cashout Method 2023
2023 COINBASE TUTORIAL updated
Bank Drop Opening Tutorial
CC2BTC cashout 2023
Plus So Much More Guides You Will Get For FREE. Just Follow The Instructions
Below
https://t.me/+MwzP8p4A5eNlNjEx
Please Note:
• These are blackhat/Fraud Methods
• These are for educational Purposes
Once You Join, You Will Get A Message From A Bot Named
>>> Channel Help <<<
Open The Message for the FREE Download Link
Do not leave the channel as I share updates Daily
Enjoy
Table of content
1. System configuration
2. Sock 5 Providers
3. Cookie Quick Manager
4. How to install and insert cookie into browser
5. User agent switcher
6. Contact
System configuration
The system configuration and information play an important role in cashing out your hacked
PayPal account, but wait! Why is it so important? because it provides a unique information about
any computer, with this in mind, all our products includes the victim system
configuration/information which will aid you in configuring your system to represent as the
owner of the account with the system information provided, below is an example of a hacked
PayPal system information.
Figure 1.1
Therefore, the first thing we must do before or after we purchased our PayPal hacked account is
to either format our system or clean it up with bleachbit or ccleaner this is to make sure we don’t
1
leave any trace of our PC past activities, in preparation for setting up our system to represent as
the victim of the hacked PayPal account,
Note: PayPal carding is quite adventurous, know the basics surrounding carding before
coming into this game : )
Okay, let’s continue, once you’re done with cleaning up the PC, the next is to make sure you
change your MAC address with the help of Tmac, wait! Why did we change our mac address?
We changed it because it is used to identify our system once we’re connected to the internet,
Immediately we’re done with the above steps, next is to look into fig 1.1, that’s the system
information that accompanies our purchase of the hacked PayPal account, now, things we need
to take account of in the system information are:
1. Machine ID
2. Username
3. Computer name
4. System time
5. Screen resolution
6. Language settings
Machine ID
Machine id is unique to each computer, and below illustrate how to change your machine id to
the victims machine id value in Microsoft windows.
Step 1
Click the Windows "Start" button. Type "regedit" into the text box in the pop-up menu.
Press "Enter" to open your Windows registry editor.
Step 2
Navigate to "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SQMClient" in the
registry. This contains the keys to identify your computer, right click on Machine id and modify
it.
Step 3
Reboot the computer. Changes to the registry do not take effect until you reboot.
Username
A username is a name that uniquely identifies someone on a computer system, and below
illustrate how to create a username account in Microsoft windows, (Please remember to write the
name of the victim username as provided in the system information)
Step 1
2
Select the Start button, select Settings > Accounts and then select Family & other users.
(In some editions of Windows you'll see Other users.)
Step 2
Select Add someone else to this PC.
Step 3
Select I don't have this person's sign-in information, and on the next page, select Add a
user without a Microsoft account.
Step 4
Enter a username, password, password hint or choose security questions, and then select
Next.
Step 5
Finish.
Computer name
A computer name is a unique identifier that is given to each computer and is used by ITS to
locate and connect to a computer, below illustrate how to change your computer name to the
victim’s computer name in Microsoft windows 7, 8 or 10.
Step 1
Hit Start, type “sysdm.cpl,” and then click the “sysdm.cpl” entry.
Figure 1.2
Step 2
3
In the “System Properties” window, on the “Computer Name” tab, click the “Change” button.
Figure 1.3
Step 3
In the “Computer Name/Domain Changes” window, type the victim computer name into the
“Computer name” box.
Figure 1.4
Step 4
4
Windows will now need to restart, so save any files you have open, and then click “OK.”
Figure 1.5
System time
Computer system time basically represent a computer geographic time, therefore for optimal
system configuration, we have to make sure we set our time to reflect the geographical time of
the victim, below illustrate how to change a computer system time.
Step 1
Right-click the Date/Time display on the taskbar and then choose Adjust Date/Time from
the shortcut menu, The Date and Time dialog box appears.
Step 2
Click the Change Date and Time button, The Date and Time Settings dialog box appears.
Step 3
Enter a new time in the Time field. You can also use the up and down arrows next to that field
to change the time.
Step 4
Click the Change Time Zone button, choose another option from the Time Zone drop-
down list, and click OK.
If you don’t want your computer to adjust for Daylight Saving Time, click Change Time Zone
and click the Automatically Adjust Clock for Daylight Saving Time check box to turn this
feature off.
Step 5
Click OK again. Clicking OK the second time applies the new settings and closes the dialog
box.
5
Screen resolution
Screen resolution refers to the clarity of the text and images displayed on your screen, therefore,
it’s very important you set your screen resolution to the victim’s screen resolution, as is also used
for identification purpose, below illustrate how to change your screen resolution.
Step 1
Open Screen Resolution by clicking the Start button , clicking Control Panel, and then,
under Appearance and Personalization, clicking Adjust screen resolution.
Step 2
Click the drop-down list next to Resolution, move the slider to the resolution you want, and
then click Apply.
Step 3
Click Keep to use the new resolution, or click Revert to go back to the previous resolution.
Language settings
Computer language configuration, represents the language the victim reads, writes and
understands, therefore, endeavor to make sure your language is set to the victim language
preference, (in other to minimize the page numbers, I presume you can change the language of
your PC, but if you can’t, please contact us above or below)
SOCK 5 Providers
SOCKS is an Internet protocol that exchanges network packets between a client and server
through a proxy server, therefore, to change our location to that of the victim geographic IP
address provided in the system information, we need a good and reliable paid sock 5, below is a
short list of recommended sock 5 providers.
1. https://922proxy.com
2. https://premsocks.com/
3. https://luxsocks.ru
4. https://faceless.cc/
(Note: to have a good knowledge and experience on how the above sock providers work,
take some time to go through their website to learn more and patronize them)
6
Cookie Quick Manager
Cookies are most commonly used to track website activity. When you visit some sites, the server
gives you a cookie that acts as your identification card. Upon each return visit to that site, your
browser passes that cookie back to the server, while cookie quick manager is a web extension
add on that manages the import and export of a cookie.
Installation process
Step 1
Click on open menu at the top right Conner of Mozilla Firefox browser
Figure 2.0
Step 2
Click on Add-ons
7
Figure 2.1
Step 3
Search for “cookies manager”
Figure 2.2
Step 4
Click on “cookie quick manager”
8
Figure 2.3
Step 5
Click on “add to Firefox”
9
Figure 2.4
Step 6
Click on “add”
10
Figure 2.5
Step 7
Click on “Okay got it”
11
Figure 2.6
Insertion of cookie
Step 1
Click on the cookie quick manager icon, and select manage cookies
12
Figure 3.0
Step 2
Click on export/import menu and select restore cookies from file
13
Figure 3.1
(Note! make sure you delete any previous cookie in the browser before importing another
cookie)
Step 3
Select your cookie file and click open
14
Figure 3.2
Step 4
Your cookies have been imported and inserted :-)
15
Figure 3.3
16