• What is the dark web
  • Are there any things better than TOR
  • How to use VPN in Linux
  • Why is VPN useful to hackers
  • Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line




    Download 6,34 Mb.
    Pdf ko'rish
    bet193/203
    Sana10.01.2024
    Hajmi6,34 Mb.
    #134102
    1   ...   189   190   191   192   193   194   195   196   ...   203
    Bog'liq
    Linux This Book Includes 4 Manuscripts The Underground Bible

    Tor browser bundle
    If you are not skeptical about the tor service, you can use the tor browser
    bundle which sends the request through the service. Every hacker should
    learn using the TOR browser because it makes detection very very difficult
    and also users can look at the dark web and its important contribution to the
    hackers. 
    What is the dark web? 
    The dark web is like the down layer of the internet that is often untouched
    and undiscovered by normal search engines and browsers due to various
    reasons. TOR websites have a .onion link and are very statically built
    websites. 
    The dark web is famous for black hat hackers because everything that goes
    around there is illegal and theft. We did not advise you to do anything
    illegal, but it would be a good case study to look at the people who ethical
    hackers will be fighting on. 
    Are there any things better than TOR? 
    As of now, the TOR browser bundle is the best way to hide your identity or
    spoof things. But virtual private networks (VPN) can also be used to
    maintain anonymity and from a different wide variety of servers. We will
    talk about virtual private networks in detail in the next section .


    How to use VPN in Linux?
    Before discussing the installation process, we will, in brief, discuss the
    VPN technology. 
    Virtual private networks are at first used in private industries and
    government institutions to maintain a group of people even when they are
    off-site. However, people have found a way to share their servers with other
    people without transferring any information about the sender and receiver.
    This made VPN popular and useful for a lot of users and mostly for hackers
    because of its ability to hide the location of the user.
    Why is VPN useful to hackers? 
    a) Virtual private networks hide the network address of your system and
    link it with another so that you will have anonymity.
    b) Virtual private networks can help you get past through a lot of firewalls
    and intrusion detection systems that are built-in industries.
    c) Virtual private networks not only help you hide your information but also
    helps to make sure that all of your network information that is being
    transmitted is encrypted. Not sure how this works? Let us give an example. 
    Imagine that you are using a public WiFi network where a lot of other users
    are connected. Not all WiFi dongles have WPA2 advanced security
    configuration so your network packets that consist of a lot of sensitive
    information including your passwords, credit cards can be easily
    compromised by someone who is on the same network and using wireless
    networks sniffing tools like air crack. 
    Due to these complications, virtual private networks are recommended to be
    used when you are not an in-home network. Now in the next section, we
    will look at how to install any VPN in any Linux systems. 

    Download 6,34 Mb.
    1   ...   189   190   191   192   193   194   195   196   ...   203




    Download 6,34 Mb.
    Pdf ko'rish

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line

    Download 6,34 Mb.
    Pdf ko'rish