Prevent somebody watching your Internet activity… (You r not Safe )

Now a days Hackingis on peak. Sometimes people who have a little bit knowledge of networking and pleased to call themselves hacker sometimes trace your IP Address and then analyse your all system configuration and Network Details which they can use against you and can stuck u in any fraud.It is not a big deal if your nabour is waching your internet activity or in college wi-fi network administrator waching your all linkns and activity. So here i am going to give you a magical stick with the help of that you can Defend yourself against network surveillance and traffic analysis.

Here i Will introduce you with tor …

 
 


 

 
Now What is Tor?

Tor was originally designed, implemented, and deployed as a third-generation onion routing project of the U.S. Naval Research Laboratory. It was originally developed with the U.S. Navy in mind, for the primary purpose of protecting government communications. Today, it is used every day for a wide variety of purposes by normal people, the military, journalists, law enforcement officers, activists, and many others.

 
 


 

 

Why we should use this

Individuals use Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet providers. Tor’s hidden services let users publish web sites and other services without needing to reveal the location of the site. Individuals also use Tor for socially sensitive communication: chat rooms and web forums for rape and abuse survivors, or people with illnesses.

 

If you like post and interested in this type of article just  press Subscribe Button Dont Forget Like Our Facebook Page so that you could be aware with every trick and tips.

 

 

I will Recomend you to  Download the software from its official website https://www.torproject.org/docs/tor-doc-windows.html.en   and Software is totally free but  if you like their work you can donate them

[button link=”https://www.torproject.org/docs/tor-doc-windows.html.en ” newwindow=”yes”] Download Software[/button]

 

Here i am not adding any video tutorial because in its official website there are both step by step text as well as the video reference.

So have fun and checkout my other articles and soon i will introduce you with more incredible tips tricks of windows,open source and much more .

Tor improves your security and your privacy through a network of virtual tunnels. With Tor, you have anonymous outgoing connections along with hidden services to protect not only your privacy but to give you more protection against traffic analysis attacks.

As any other solution Tor comes also with several downside you should be aware about. Here is a list of positive and negative point of this tool.

 

Benifits

  • It’s completely free and available for all os platforms like windows, Apple,Linux,BSD,Unix and much more.
  • Encrypts all traffic (incoming and outgoing) between nodes.
  • It is virtually  unbeatable .

Cons

  • The perfomance is unpredictable as it depends on routes between the Tor network nodes;
  • Not suitable for p2p applications such as Torrent;
  • It only protects applications that are configured to work through Tor.
  • While Tor blocks attackers on your local network from discovering or influencing your destination, it opens new risks: malicious or misconfigured Tor exit nodes can send you the wrong page, or even send you embedded Java applets disguised as domains you trust.”
Now if You intersted in tor Mechanism then you can easily understand this with the below images but if you are intrested in deep study you can checkout official website but i will not recomend you just install it and hav fun..

 

 

 

 

If you like post and interested in this type of article just  press Subscribe Button Dont Forget Like Our Facebook Page so that you could be aware with every trick and tips.

 

 

Reference:  https://www.torproject.org

Be the first to comment

Leave a Reply

Your email address will not be published. Required fields are marked *