Tor

Tor is free software for enabling anonymous communication. Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than seven thousand relays to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis. Routing is implemented by encryption in the application layer of a communication protocol stack, nested like the layers of an onion. Tor encrypts the data, including the destination IP address, multiple times and sends it through a virtual circuit comprising successive, randomly selected Tor relays.

Hello, I am in need of a way to be 100% anonymous online, I have heard a bit little of everything, but I REALLY need an expert to tell me DEFINITELY HOW TO DO IT and what is the correct way, just to let you know I don't want to use TOR, I know there is Tails and Whonix but I need decent internet speed to use, and even if Tails and Whonix are very powerful in questions of hide your real IP seems like both use Tor which is very lag for me, anybody who say there is no way to be 100% anonymous online isn't correct, yes there is, hackers have been doing a great work and never being caught in their acts, of course some of them really get caught but some of them really know what they are doing and never get caught by lets say: FBI, NSA. All I wish is talk to a really expert that understand the discussion here and know how to REALLY DO IT, without promote any VPN, Tor and their exit nodes and its amazing lag and etc. I am right now more focused on RDP, since it give you a far VPS to manage, and also a new IP address, my only questions is if RDP is good for hide yourself since it connects you to another computer and gives you a new IP address, I heard Windows keeps logs of the real IP address behind the RDP and maybe the site you bought the RDP will have access to these logs or anything like that, or even the site who you bought the RDP can see your real IP address easily, I REALLY need someone who understand the discussion and advanced networking and security. I REALLY care about my …
0
Hello,

I have found myself in serious problems with the police as I have been accused of hacking my ex partners internet - I can categorically say I have not.

I received an Android Manifest from my ex - which I accepted out of ignorance. The next day Spybot and Droidsheep appeared on my system and there was a Google takeout that appeared on my machine from her g-mail account - the same day.

The police are saying that I initiated this and I cannot prove otherwise! They say the have contacted Andreas Koch - the inventor of Droidsheep and he said it could only be downloaded by the owner of the phone/computer - numerous articles I have read on the net say it can be downloaded through many sources without my consent.

Since the Spybot and Droidsheep/W32 download, I have been hacked over 30 times and have even got a Brutus cracker which has appeared and they say I was trying to crack her password - I dont even know where this has come from!

Could you please, if you can, clarify Droidsheep and Spybot can be introduced onto my system, through the acceptance of an Android Manifest accepted request and can it activate programmes such as Brutus!

I would be prepared to pay for an official report. It is me who has had money stolen from my bank - along with the 30 hacks, accused of hacking - which I do not have the technical knowledge to defend. In my opinion, it was the acceptance of the Android Manifest request that has caused all this - but again I do not have the …
0
I'm seeing something in a SIEM that I can't seem to wrap my head around. I have an internet facing ASA that is configured to deny spoofed IP addresses (I don't manage these devices). Shortly after feeding syslog events from this device into the SIEM, I started seeing "Traffic from Tor Exit Node" and "Deny IP Spoof" events in the SIEM. I bring up both items as I'm not sure if they're related.

Anyway, when I look at "Traffic from Tor Exit Node" events where the source IP is the known Tor exit node (most of them), there is no corresponding destination IP address or destination port. I've crafted a few stories in my head involving nmap scans through Tor but I can't convince myself of anything I've come up with. Anyone have a plausible explanation?

Thanks,
TR
0
Just over two weeks ago, a client of mine had a Cryptowall 3.0 infection, starting from a workstation. It was quickly contained, and we restored from backup, and all is well now. One residual side effect caught me completely off guard, however.

Every Windows workstation on the domain began having the help_decrypt files launch at startup. We found those files in the startup folders on the local C drives of the workstations, as well as in many other folders on C. No files on any of those computers were encrypted, however.

I have never seen nor heard of a crypto variant showing this behavior. Did it find the C$ shares on the network?
0

Tor

Tor is free software for enabling anonymous communication. Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than seven thousand relays to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis. Routing is implemented by encryption in the application layer of a communication protocol stack, nested like the layers of an onion. Tor encrypts the data, including the destination IP address, multiple times and sends it through a virtual circuit comprising successive, randomly selected Tor relays.

Top Experts In
Tor
<
Monthly
>