Moldable epoxy (this can be purchased at any hardware store or Wal-Mart).Let's assume that you only use this OS for legal bidding, shall we? Requirements
Today's Byte demonstrates how you can take some household items and rip them apart to conceal your hacking OS inside. With a hacker's OS and all of their favorite tools on a tiny little thumb drive, the hacker's next precaution might be to conceal the thumb drive in some way, so the drive itself would look inconspicuous to authorities if they were ever somehow caught in a raid. With a little tunneling and MAC spoofing, a decent hacker can easily go undetected and even make it look like someone else did the hack job. We have TOR for anonymity online, we have SSDs to protect and securely delete our data-we can even boot an OS from a thumb drive or SD card. Technology in computers these days are very favorable to the semi-knowledgeable hacker.