preview

Nt1310 Unit 8 Lab 8

Decent Essays

Tor

LAB 8
Hayati Cakici
06/27/2015
Dr. Lehrfeld - CSCI-3500 - Info Security & Assurance
East Tennessee State University

Purpose In this document you will learn how to use the alternative ways to search the Internet anonymously using Tor and proxy servers.
Materials and Tools In order to get better insight about what we try to do here we need to know some terms that used in this document.
Tor: “Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy.
Why Tor: Using Tor protects you against …show more content…

There some other tools may provide better anonymity than Tor. Since Tor runs on your computer this makes your system vulnerable. Using a proxy server will make your Internet access work more efficiently. It will work like a barrier between you and outside world. You can also use proxy server almost with chat applications. This provides better security than Tor. A proxy is “a virtual private network is one specific type of proxy which provides you with the ability to work remotely and securely”. The particular VPN will belong to you. This makes proxy more secure than Tor. Of course proxy servers have vulnerable sides too. “Proxy server will provide you with security and anonymity, the proxy itself has to decode your traffic to send it through. This means it can see everything you're doing, unless you use SSL connections. So you need to trust it.” Since both of them have dark sides. Instead of using one of them, it will be more secure to combine

Get Access