EssaysForStudent.com - Free Essays, Term Papers & Book Notes
Search

Tor Network

By:   •  Essay  •  264 Words  •  May 21, 2010  •  1,080 Views

Page 1 of 2

Tor Network

Hello and welcome to this

The 39th edition of Risky Business

on this week podcast

we'll be hearing all about tor network

it's build as an anonymizer

a way for internet users to connect to webstie

without the operators of those website knowing who's visiting

basically, it's block your IP

think of it as a caller ID blocking for your internet connection

although there's huge controversy a couple of months ago

when a swedish hacker

Dan Egurstad

Set-up a road TOR exit note

now that's where data passes from the encrypted path of the TOR network

to the outside word in clear text

and he examined the information that came through this exit node

now he wounded up intercepting the emails and mail password

of Goverment, embassy, NGO, and corporates

initially, we though that Dan was able to do this. because the organizations was using TOR

in a silly way

thinking, it was encrypting all of their traffic

but as we'll find out, Dan said the password he intercept was already use by hackers

who already compromise the mail accounts

Download as (for upgraded members)  txt (1.7 Kb)   pdf (52.3 Kb)   docx (10.7 Kb)  
Continue for 1 more page »