IRC scripts or invitations to run software programs, including the IRC client software, can have “malicious software” installed within. “Malicious software” not only includes Trojan horses,
viruses, worms or intended and unintended backdoors, but also
hardcoded messages revealing SOURCE, HOST, and other seemingly
“harmless” info.
This blog article covers setting up XChat for using Tor with Freenode on Backtrack 5R1.
Prerequisites
Change the torrc file
Install XChat
Set up a nick with Freenode
Configure XChat proxy
Configure a new server
Plug leaks
That's it!
RTFM
Lilith Lela
24 Jan 2012
22 Jan 2012
Adding a non-root user on BackTrack 5R1
After installation of BackTrack 5 R1, there is only one user: root (or superuser). Root has full privileges in the operating system, and that makes our system more vulnerable to external attacks. A superuser can manage other user’s account, administer user data, install new applications, and configure system services and others. And of course, we can be that attacker if and when we mess up.
When installing on a hard disk and also using the system for some research and communication on occasion, we best create a non-root user with limited privileges and use su and sudo when we need more.
Adding a user
Adding user to groups
Add user to sudoers file
User switcher
Deleting user
More with man
When installing on a hard disk and also using the system for some research and communication on occasion, we best create a non-root user with limited privileges and use su and sudo when we need more.
Adding a user
Adding user to groups
Add user to sudoers file
User switcher
Deleting user
More with man
19 Jan 2012
Installing and configuring Tor on Backtrack 5R1
Tor is free software and an open network that helps us defend against a form of network surveillance that
threatens personal freedom and privacy, confidential
activities and relationships, and state security known as traffic analysis.
Privoxy "scrubs" (removes personal information from) the data it sends. But even Privoxy won't protect us from viruses, Java Script attacks, etc; and Privoxy can't do anything about text typed into forms. Stay aware, awake and alert.
Vidalia lets you start and stop Tor, see how much bandwidth you are consuming, see how many circuits you currently have active, see where these circuits are connected on a global map, view messages from Tor about its progress and current state, and let you configure your Tor client, bridge, or relay with a simple interface. Included in Vidalia is an extensive help system which helps you understand all of the options available to you.
In this blog article:
Installation of Tor and Privoxy
Privoxy configuration
Starting (and stopping) Privoxy
System wide configuration of clients
Starting and stopping Tor with Vidalia
Configuration per client
TorButton for Firefox
Performance: Optimisation of Firefox
Configuring console based application with proxychains
That's it for now. Enjoy!
Privoxy "scrubs" (removes personal information from) the data it sends. But even Privoxy won't protect us from viruses, Java Script attacks, etc; and Privoxy can't do anything about text typed into forms. Stay aware, awake and alert.
Vidalia lets you start and stop Tor, see how much bandwidth you are consuming, see how many circuits you currently have active, see where these circuits are connected on a global map, view messages from Tor about its progress and current state, and let you configure your Tor client, bridge, or relay with a simple interface. Included in Vidalia is an extensive help system which helps you understand all of the options available to you.
In this blog article:
Installation of Tor and Privoxy
Privoxy configuration
Starting (and stopping) Privoxy
System wide configuration of clients
Starting and stopping Tor with Vidalia
Configuration per client
TorButton for Firefox
Performance: Optimisation of Firefox
Configuring console based application with proxychains
That's it for now. Enjoy!
Subscribe to:
Posts (Atom)