Sunday 9 June 2013

Want to Surf Anonymously ? Use Tor Browser !!

Want to Surf Anonymously ? Use Tor Browser !!


Tor Browser Bundle
The Tor browser protects you from bouncing your communications around a distributed network of relays run by volunteers all around the world. It prevents somebody watching your internet connection from studying what web pages you visit. Also it prevents web sites getting your physical location. In some countries, the government block some web site for some reasons. Tor browser lets you access the sites which are blocked.
The main advantage is, Tor Browser let you use in windows, linux and mac platforms without installing any software. It let you use Tor in flash drive as portable app. Tor works only with Mozilla Firefox web browser. Tor Browser Bundle include Tor, Vidalia, a modified Firefox ESR, and Torbuttoni. In default flash is disabled, you can turn it on from settings.


Want Tor to Really Work
You need to change some of your habits, as some things won’t work exactly as you are used to.
  1. Use the Tor BrowserTor does not protect all of your computer’s Internet traffic when you run it. Tor only protects your applications that are properly configured to send their Internet traffic through Tor.
  2. Don’t enable or install browser pluginsThe Tor Browser will block browser plugins such as Flash, RealPlayer, Quicktime, and others: they can be manipulated into revealing your IP address.
  3. Use HTTPS versions of websitesTor will encrypt your traffic to and within the Tor network, but the encryption of your traffic to the final destination website depends upon on that website. To help ensure private encryption to websites, the Tor Browser Bundle includes HTTPS Everywhere to force the use of HTTPS encryption with major websites that support it.
  4. Don’t open documents downloaded through Tor while onlineThe Tor Browser will warn you before automatically opening documents that are handled by external applications. DO NOT IGNORE THIS WARNING.
  5. Use bridges and/or find companyTor tries to prevent attackers from learning what destination websites you connect to.
Screenshots
UntitledUntitled1Untitled2

Downloads

No comments:

Post a Comment