Friday 13 June 2014

Protect your privacy with TOR

Everyone in the world wants to browse the Internet anonymously. You have different ways to stay anonymous on the web like proxy servers, VPN servers, etc. but sometimes most of the proxy servers are blocked in public place where you want to access the Internet.
For this you have one option other that proxy sites i.e TOR.


TOR logo
What is TOR ?

TOR which stands for The Onion Router is a free software that is the best software for anonymity, privacy and unblocking websites.
 

TOR has thousands of servers in different parts of the world through which user's data routed and tunneled in encrypted format with the intention of keeping it completely anonymous.
 

It not only protect your privacy by keeping you anonymous, it keeps your communication on the Internet completely secure. It can be downloaded free of cost from https://www.torproject.org.

How TOR works ?

When you want to connect to the secure and anonymous network you first need to install TOR on your computer. When you have configured your browser to connect to the Internet through TOR and once TOR receives your request to connect to the domain name (For ex. www.google.com) that you want to connect, it will first connect to the TOR directory server and download a list of available TOR relay nodes (i.e. onion routers) that it potentially connect to.

TOR will now create a secure and encrypted network between you and the domain you want to connect to and route the connection by randomly selecting onion routers one after the other.
 

TOR always connect to three randomly selected onion routers in any part of the world before connecting the user to the destination system, hence it ensures the anonymity of the user. TOR always an advantage over the poxy servers by ensuring that it always connect to three different onion routers and on the other hand proxy routed through only a single system.

Once TOR circuit has been created, it will continue to be used for all the connection for 10 minutes or so, after which all new connections will be given completely new TOR circuits. It is also possible to change TOR's circuit sooner than 10 minutes if needed and in this case your identity also changes on the Internet.

How to use TOR ?

*. Download TOR Browser Bundle from here.

*. After downloading it can be extract anywhere on your computer or you can use it by extracting it on your USB pen drive. To launch TOR double click on start TOR Browser icon.


TOR browser files

*. After you launch TOR you will be presented the Vidalia control panel and TOR will connect to its directory server and download a list of TOR onion routers. and then try to establish a secure and encrypted connection. As soon as secure Tor connection established the Mozilla Firefox browser window will automatically open. 

vidalia control panel

*. The Firefox window that opens will also say Congratulations. Your Browser is configured to use Tor.

tor browser started

*. You can check your connection for anonymity by visiting http://www.whatismyipaddress.com.

*. Note that only the Mozilla Firefox Browser which automatically opens will work with TOR and all the other installed applications and browsers will not automatically connect to TOR.

If your college or organization block access to the Tor project website then you can download it by email also. To download it from email send an email to gettor@torproject.org and make sure you typed help in body of email and they will reply you with the instructions to download Tor and if you are using Windows then you have to reply them with keyword windows in the body of email.

Enjoy safe, anonymous and secure browsing on the Internet.

Thursday 12 June 2014

How to Remove Shortcut virus from pen drive

pen drive shortcut virus

Probably everyone will have to suffer from the problem of Shortcut in USB pen drives or flash drives.

It can be very dangerous if you have any important data in the USB pen drive or flash drive. You have to format it for removing shortcut and all the data lost by this process.
But here is a solution for this problem. It is very easy and simple process to remove the shortcut virus.


pen drive shortcuts

It mainly causes due to some malware attack and it generates Autorun.inf file which converts all the files and folders into shortcut.

How to solve the problem ?
 


Apply following steps to solve the issue

*. Attach the USB pen drive or flash drive to the computer.


*. Press Win+R to open the Run command processor and type cmd to open Command Prompt.

*. Now type attrib -h -r -s /s /d f:\*.* and press Enter. Here f: is the drive on which the USB pen drive or flash drive is attached.

cmd commands

*. That's it now you can see all your files and folders as it is in the USB pen drive or flash drive.

Wednesday 11 June 2014

Browse Anonymously with Tails OS

You want more security for your internet browsing and want to surf the web anonymously then here is the solution for you. The Tails OS which will give you anonymity in browsing the web.

What is Tails ?


tor browser with tails OS

Tails is an operating system which is build for anonymous surfing of the internet. It can also be use to bypass some restrictions that have been implemented by local system administrator. (for ex. the security firewall in colleges, offices and other public places)
It is a free and open source licensed OS that means you can use it absolutely free.
 

It is bootable from live CD or pen drive or SD card. Tails uses Tor to provide users with secure encrypted anonymous access to the Internet.

Steps to install Tails

*. The first step to download the Tails OS from their official website here. It's latest version is approximately 980 MB. If you want to install it using pen drive then you also need Universal USB installer. You can download it from here. It will allow you to install Tails on the USB pen drive and make it bootable.
Use formatted pen drive for successful installation.


universal usb installer to boot OS from USB

*. Plug in your USB pen drive and start the Universal USB installer software. After it's installation it will ask you to choose the Linux Distribution you wish to install, select Tails and then choose the path of the downloaded Tails OS .iso file and select the drive on which you want to install. Take a look on the warnings that will pop up after pressing OK about your data on the pen drive. The complete installation process takes few minutes but not more as other OS needed.

universal usb installer ready

*. Once installation is over restart your computer by pluging in USB pen drive. Before Windows starts booting, quickly press Esc, F12, F2 or other keys that your system specified for accessing BIOS settings. Look for the Boot priority or Boot sequence and make sure USB device boot priority should be higher. After that save the setting and start the computer. It will Boot from the USB pen drive.
 

*. Now follow the instructions to install Tails OS. 

tails OS manage drive

Now you are free to browse Internet anonymously with Tails and it has some useful built in applications like Pidgin Instant Messanger, Tor, Browser and others and these applications are pre-configured to give you anonymity on the Internet.

Enjoy being anonymous on the Internet.

Working of Internet

All of us using internet everyday and we can say that now we are unable to live using internet today. But can we imagine how it works ? Don't worry we will see now how the internet actually works.
internet connection logo

Working of the Internet

*. The data you access on your PC is stored on the main computer that we call as Server and the data sent from the server to the client. The client is a computer from which request sent to the server for accessing data on it. Client can be laptop, PC or smartphone. These both are the end points that make a chain of the internet.

*. Every client/server use a network card to access the internet and a unique address called the IP address.

*. All the data sent to the internet is in the form of packets. When you click on any image on the webpage, the data that makes up that image is divided into smaller parts i.e. packets and then these packets sent over the internet and when every packet reach to its destination then they combine to form an image that you clicked.

*. Remembering IP address is a very worse thing to do, isn't it ? But to solve this problem domain name system included. It is basically a contact book that keep track of the IP addresses and their associated names. DNS is a domain name server that hosts a database of domain names that can be referred to.

For example: http://www.google.com can be written on the address bar as 74.125.239.96

What happen when you type a website address ?

url logo

*. If you type 'www.facebook.com' in the address bar.

*. Your computer translates that data into the request that is sent via your local Internet Service Provider (ISP), which will then connect to the DNS server for knowing the IP address of 'www.facebook.com'

*. The local ISP will have regional ISP above it. The regional ISP will in turn contact a Network Service Provider (NSP) that will contact a Network Access Point (NAP). All these are routers. Once the DNS tells the system the IP address that you are looking for, all these routers will try to find that IP address.

*. Once the addresses are resolved and the server located, your request is finally submitted and the server responds with data. The data is sent in the form of packets.

*. So then finally the packets arrive to the client. They are already with the information needed and you browser then automatically collects and combines the data and interpret it. These all things happens in a matter of millisecond.

Popular Posts