Minggu, 23 Agustus 2015

Use of TOR in our system as a network security device when we execute access

1. Format TOR in your system with command :
# /etc/init.d/tor start enter

2. Type Proxychains that TOR has been used in our system for securities.
# proxychains enter
3. Format your Proxy position and browse ipchicken to get our new ID shadow.
 
4. To find out if we've camouflaged position when we open a web.






Tidak ada komentar:

Posting Komentar