BREAKING NEWS

Bloggers Talk

Tools

Download

9/17/10

Tor: defend network threatens

As the official website says Tor defend against a form of network surveillance that threatens personal freedom and privacy. If your activities look confidential business and need to keep security, want to analys traffic then Tor is perfect tool for you.
Tor internet securityMany kind or internet users use Tor to protect their privacy. Tor can help you stay safe online.
Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol.
This valuable software is also available in Linux too. Also available for Mac and Windows.

But Tor is not a magical thing, which protect you automatically. If you just install it and do nothing then Tor can not do anything. You need to configure some information to work it properly. There is a read first section in download page. That means you should read it before download Tor.

Warning: Want Tor to really work?

...then please don't just install it and go on. You need to change some of your habits, and reconfigure your software! Tor by itself is NOT all you need to maintain your anonymity. There are several major pitfalls to watch out for:

  1. Tor only protects Internet applications that are configured to send their traffic through Tor — it doesn't magically anonymize all your traffic just because you install it. We recommend you use Firefox with the Torbutton extension.
  2. Torbutton blocks browser plugins such as Java, Flash, ActiveX, RealPlayer, Quicktime, Adobe's PDF plugin, and others: they can be manipulated into revealing your IP address. For example, that means Youtube is disabled. If you really need your Youtube, you can reconfigure Torbutton to allow it; but be aware that you're opening yourself up to potential attack. Also, extensions like Google toolbar look up more information about the websites you type in: they may bypass Tor and/or broadcast sensitive information. Some people prefer using two browsers (one for Tor, one for unsafe browsing).
  3. Beware of cookies: if you ever browse without Tor and a site gives you a cookie, that cookie could identify you even when you start using Tor again. Torbutton tries to handle your cookies safely. CookieCuller can help protect any cookies you do not want to lose.
  4. Tor anonymizes the origin of your traffic, and it encrypts everything between you and the Tor network and everything inside the Tor network, but it can't encrypt your traffic between the Tor network and its final destination. If you are communicating sensitive information, you should use as much care as you would on the normal scary Internet — use HTTPS or other end-to-end encryption and authentication.
  5. While Tor blocks attackers on your local network from discovering or influencing your destination, it opens new risks: malicious or misconfigured Tor exit nodes can send you the wrong page, or even send you embedded Java applets disguised as domains you trust. Be careful opening documents or applications you download through Tor, unless you've verified their integrity.
There are many people and company around world use Tor to protect themself. International Broadcasting Bureau (http://www.ibb.gov/), Reporters without borders (http://www.rsf.org/) using it. Militaries, Journalists, Business person, Bloggers, Law enforce officers use Tor. Read 'Who Use Tor' page for details.

To download Tor visit this Download page.
For various kind of Linux installer please visit Download Unix

Post a Comment

Please help me to improve my English. Please Email me or comment below. Thanks...

 
Copyright © 2018 Net Gator
Powered byBlogger