TOR was originally only used for military purposes only and in the end in the know by the networking community
TOR (The
Onion Router) is
a network of virtual tunnels that allows the
user submitted data disseminated first to
the many computers in a network of TOR at
random and encrypted so it
is difficult to trace in the middle of the
journey from which source. In summary, the
data is
never a direct route but turnover occurs in the TOR network server computer involving three ormore asa relayer but great each relay "don't know" to any computer information because the data orwarded immediately removed. Trackit takestime and any tracer will be over whelmed and eventually gave
up.
Principle Works!
Forexample Mr. Ahas aweb browser toinstall TOR in his possession and he wants to find information on awebsite X is forbidden. When Mr. A do Information Gathering using TOR so Mr. A will be difficult for the detection. because TOR find away to create a route to the TOR network relays involving hundreds to thousands of relays,TOR intelligently choose the path ofefficient but still difficult to
trace. It may take several minutes to establish this connection that in the early stages of the
route search. Web browsing X on the conditions will beslowly. ToR onlysecure "your internet journey".
Who is using TOR?
1. Journalists who want to protect the source.
2. Human Rights Activist
3. Political activists in the countries of authoritarian and repressive.
4. People who speak out for truth (Whistleblower like Paidjo)
5. The researchers who developed a collaborative project remotely via the Internet
6. Police officers in covert operations.
7. The victims of rape, victims of violence, dying of AIDS.
8. The simple2 course: send a personal letter of opinion, which may be contrary topolicy office, 9. but had to be done using the office computer .. Or a more simple again, quietly browsing the 10. new job applications using the internet office. Some companiesforbid such things and 11.actually monitor Internet traffic that happens to productivity.
How to Setting on Mozilla ??
this only for my friends in i..c who have finished install their T O R
open your browser
1. edit + prefences
2. Advanced + Network + Setting
3. look at this picture
4. http://torcheck.xenobite.eu/ for look at your position now :)
Now i'm in Luar Negri hehehehee
GOOD LUCK
1. Journalists who want to protect the source.
2. Human Rights Activist
3. Political activists in the countries of authoritarian and repressive.
4. People who speak out for truth (Whistleblower like Paidjo)
5. The researchers who developed a collaborative project remotely via the Internet
6. Police officers in covert operations.
7. The victims of rape, victims of violence, dying of AIDS.
8. The simple2 course: send a personal letter of opinion, which may be contrary topolicy office, 9. but had to be done using the office computer .. Or a more simple again, quietly browsing the 10. new job applications using the internet office. Some companiesforbid such things and 11.actually monitor Internet traffic that happens to productivity.
How to Setting on Mozilla ??
this only for my friends in i..c who have finished install their T O R
open your browser
1. edit + prefences
2. Advanced + Network + Setting
3. look at this picture
4. http://torcheck.xenobite.eu/ for look at your position now :)
Now i'm in Luar Negri hehehehee
GOOD LUCK
Tidak ada komentar:
Posting Komentar