Skip to main content

10 people who are surprisingly Arab ❗

  10 people who are surprisingly Arab ❗ Despite the fact that individuals of Arab drop aren't regularly celebrated in the news, particularly with strains in the Middle East, ISIS, and the previous War on Terror, you may be shocked to realize that some of you. Araian Girl:Source-Wikimedia Despite the fact that individuals of Arab plunge aren't frequently celebrated in the news, particularly with strains in the Middle East, ISIS, and the previous War on Terror, you may be astounded to realize that a portion of your #1 performers have Arabic legacy.  Whatever your generalizations and suppositions might be, a portion of these names may astonish you. It simply demonstrates that individuals are really difficult to classify and these stars are no special case.  Here are a couple of stars whose predecessors or even guardians came from some place in the Middle East. Since they are not named Mohammed doesn't make their family any less authentic A large number of them have progen...

How to become anymonous in online?

How to become anymonous in online?

Anonymous, Source-Wikimedia


 hi everyone this is infoweb from ehacking.net the objective of this video is to discuss the tools and techniques to stayanonymous online I have already discussed this topic beforehowever the objective of making this video is to summarize all these otherthings tools and techniques that you can use to achieve the anonymous status in2020 so these are the topics that we will cover the basic foundationor the intro of the anonymity the tools or techniques for example the VPN, TOR, Whonix, Tails and obviously the difference between them the drawbacks ofeach and the advantages of of each you know tools and technique. There is nothingwrong to be anonymous and controlling your own personal privacy if you aredoing the legitimate business there are I mean several ways to do this and let'sstart with the VPN first, okay so you might have heard the term VPN before VPNis the stand for the Virtual Private Network it is a technology that allowsyou to connect to one or more computer by using a private network from publicinternet connection your IP just think of your IP your IP is your own IP isjust like your home address and you use your IP assigned by the ISP in order toconnect with the other servers for computers available from the internet oronline what VPN does VPN mask your IP with the one assigned by them by the VPNservice provider they'll mask your IP with their own and then theywill allow you to browse the Internet or make the connections between yourmachine to the class to this server machine server sideso this is the working of a VPN think about it. You want to communicate with aserver you want to open a website let's say google.com what you will do you willopen your browser and hit the IP or the domain name what it does? the datatravels through local network to the Internet or public network and from thepublic network or Internet it reaches to the server end or the destination endand then through the destination and the server responds with the web page thesimilar thing goes with the chatting or any other way of communication likesending files video calling or whatever you do on the Internetif you do not use WPA and then it goes like this but if you use a VPN then aVPN client hit the VPN server first and then the VPN server marks to your IPyour V's the user IP with with an IP of their own let's suppose if you want tochange your location to somewhere else - Germany - UK or USA the VPN serviceprovider assign that IP of their own they own that particular IP the own thatlocation server and then once you you have been assigned the IP your datapacket hit the destinations server the destination server think that somewherefrom USA or the other location water visit our website now server thenrespond back and then the VPN services server handle these this process ofinformation so this is how the VPN machst your IP or this is how the VPNworks there are several drawbacks of the VPN as well and let's see okay is forany user VPN might be an easy setup since you just need to download your VPNapplication and installed install it on your device but it has the drawback ofbeing monitored by the VPN service providers as they allowto use their private servers in exchange for your data there have been caseswhere VPN service providers are monitoring the data from their users fortheir own benefits in that way your communication is not all private but bemonitored by VPN provider so this is the drawback of a VPN you will be you canhide hide your identity but the VPN server provider can monitor what you aredoing online what type of websites you are visiting what type of data you aretransferring so not completely anonymous at allnow we are moving towards the another amazing technology called tor, toralso called Onion Router is a it is a free and opensource software for enabling anonymous communication it is designed to stoppeople tracking your browsing habits including government agencies andcorporations the name Onion Router refers to the way that to protects yourdata by wrapping it into multiple layers of encryption like an onion so this isthe typical working of a tor tor browser if you install a tor browser then yourtor browser X as a tor client whenever you hit a particular IP or a particulardestination or your told browser it goes something like this the Green Line showsthe encrypted Tor network however the red dotted line shows the unencrypted orthe plain communication okay so the destination server does not know thesesend an IP or send a real location because every time whenever you visit aparticular web site every time tor assign you a new IP because here becausethe communication goes something like this there are several thousands ofservers available over the internet that are the part of the tor network and theact as an exit relay how it works it is just like simple tor browser routes allthe web traffic to the Tor network this is the typical Network and it makes itanother it makes is unable to to reveal your own identity as the image showstour consists of three layer proxy like layers of an onion at first Tor browserconnects at random to one of publicly listed and regards bounces thoughttraffic through our randomly selected middle relay but is it really beingselected randomly even this particular I said relay doesn't know about the middlerelay whenever at all our transfer information happen this middlerelational it being selected randomly and finally the traffic directed thatyou know the traffic through the third and final exit relay. So this ishow tor protects the privacy or ensure the anonymity of a user let's movefurther ok so this we have discussed this okay so let's discuss the drawbackof drawbacks of Tor your ISP the Internet service provider can see thatyou are using tor however the ISP cannot see the activities you are doing on Tornetwork but is still it the highest peak and raise an alarm situation or the ISPthink that you are doing something suspicious other another disadvantage ofusing lift or a client or tor browser is that or not all your traffic or not allyour communication is hidden for example only the websites or only the trafficonly the communication that you will do on the tor browser is encrypted by thetor network while other applications for example if you are using Skype or anyother software the data was not being the data will not be you knowcryptid using the Tor network because you have installed the tor client inorder to use the Tor network now we have WHONIX is one of my my favoriteand amazing amazing it is an amazing distribution Linux distribution based onDebian it is used to provide anonymity privacy and security on while browsingthe internet it consists of two main components first component is theconnects workstation it is actually the desktop machine that uses that has allthe textual applications for example web browser chatting softwares and etceteraetcetera etcetera while the second component of thisconnects system is onyx could get away this connects get way is the only wayfor honex workstation to communicate with the outside world through internetwe will see the concept in the working phenomena working structure of the wholeX both components in the whonix structure the whonix workstation and whonix geteway are the VirtualBox virtual machine appliances so as to run it on anyoperating system that has a VirtualBox for example this is the host machine youcan have Windows host machine the Linux host question Mac OS or whatever theoperating system you use but you need to install the whonixin a VirtualBox virtual setup at first the virtual the whonix workstation andGateway are configured for host machine workstation consists or as I said thatthe desktop application routes of all its traffic to the Gateway which isconnected to the workstation that is whonix gateway now Gateway is furtherconnected with the Tor network for accessing the internet connects gatewayis the only way for the workstation to transmit the information throughinternet because the workstation is an isolated machine andthere's no idea about its own host IP and configuration you can even see inthe picture that this network workstation is our typical isolated machineit does not know the actual IP of this host machine it can only communicate tothe Internet by using its own gateway that is connected with the Tor networkas you can see in the picture that all the traffic that goes through theGateway is torified however the host machine does not participate in the whonixprivate network and that is why it continues to use its normal internetconnection hence the traffic is nontorified it isit is a huge advantage of isolating the workstation from a network to keep an IPaddress private even if any application in a whonix workstation iscompromised it is almost impossible to reveal your IP address because it doesnot know your IP this is how the whonix works. it has two components workstation,gateway; workstation is the desktop that contains all the application it is anisolated machine this gateway is connected with the wok station get me isthe only way to access the Internet and it uses the Tor network has everythingbeing storified in the Horrocks power station probe X although conics providestransparency of your IP address it has unnoticeable disadvantage interms of physical security if your host machine is ever compromised all thestored personal information and your internet browsing activity could also bediscovered easily so this is the only disadvantage of using the tool or usingthe honex think that if someone get access to your PC your laptop your mainMac OS then these someone can see that you are using connects for whatever thepurpose now we are going to discuss tails tailsis another amazing concept and it is the life system based on the debian-basedLinux operating system with the aim to provide the anonymity and privacy ifyour goal is to leave no trace of your activity on MN the host machine then youshould use tails rather than honex you can start ill OS on almost any computerfrom a USB device or even a DVD tail cent is to tell tales just like UNIXalso uses the advantage of Tor network in order to communicate with theinternet however it leaves it leaves no trace on the system you are using sinceyou are you are using a live system that does not mean create the history doesnot even save any file or folder or anything life means it runs on a USBdevice all you have to do is to download the live operating system write it on aUSB and then just simply plug in into a machine into a laptop PC or Mac and thenare put it to use the life tails operating system that uses the Tornetwork in order to connect with the internet the portability of this tailsOS solve the major drawback of the UNIX operating system because it leaves notraces on the host machine at all so this is the typical working of the tailsand UNIX who's the winner the question is what do you think the best tool ortechnique in order to stay anonymous online well if you if you really want toachieve the complete anonymous status or anonymity online then of core tail isthe clear winner with all the advantages or the other technology however itdepends on your usage as well I would personally prefer honex if you do if youdon't have any risk in order to be caught physicallyobviously the have obviously the video this video is for educational purposeonly we don't recommend or we don't encourage you to use all you to involvein any illegal activity however yes it is you to judge the best platform orbest technology to stay anonymous I have compared all all for example the VPN thetor tor concept is amazing but using the Tor and client or tor browser only it'snot this complete solution you can use UNIX or tail in order to becomeanonymous online so this is it if the concept of the tools and techniques tobecome anonymous so if we have discussed the technique and the tools that can beused to be anonymous online and the next level we do you can see the link downbelow or above that I have practically shown you how to configure the honex andtails so see you in this video take care all right 

Comments

Popular posts from this blog

How to increase mamory?

  How to increase mamory? Thinking  So think about this: Nowadays, a lot of peopleare obsessed with a healthy lifestyle. They eat wholesome food, workout at the gym,and all that jazz. But they tend to forget that our brain needsexercise too. Especially if you've started having memorylapses more often. Um, what did I just say? Oh yeah. So, if people keep saying you have the memoryof a goldfish, don't fret! Just try these simple brain exercises to helpyou out. 1. Read books aloudIn 2017, the University of Waterloo conducted an experiment where they asked 95 participantsto read silently, listen to someone else read, listen to a recording of themselves reading,and read out loud in real-time. Later, participants were required to repeatwords they read. It turned out, the word recall was greatestin the group that read aloud to themselves. When you speak and hear yourself speakingat the same time, it helps the brain to store the information. You can practice this exercise with your fr...

Shocking facts about India

 Shocking facts about India   Long ago, when giant lizards roamed the Earthand Netflix wasn’t around, the Asian continent got crashed into by an unexpected visitorthat ended up being a life-long neighbor. Uh, come again? Hey, I’m talking about India and its fascinatinghistory since its days as a massive piece of land floating in the ocean! Counting down from… 9. Advanced Surgery from Ancient TimesIf you think plastic surgery is a modern convenience, you’re up for a big surprise. India had it covered more than 2,500 yearsago, way back in the 6th century B.C.E.! Somewhere around that time, there lived anoutstanding doctor by the name of Sushruta. He’s called one of the founding fathersof surgery and for good reason: his Sushruta Samhita is a real gem of a book. It covers over 1,100 diseases, all kinds ofmedicinal plants, and dozens of surgical procedures. But what’s probably the most jaw-droppingthing about the book is that it also described surgical reconstruction of the nose! ...

Things that have to know before visiting Russia, Instructions for travelling Russia.

  Things that have to know before visiting Russia, Instructions for travelling Russia.  the absolute worst thing about living in russia is that everything you eat has like sour cream or   some other kind of dairy in it and then you get really fat and you fart a lot so that's it for   this video thank you for watching just kidding i actually really fell in love with russian   milk products and tvorog while i was here i don't actually think i can live without tvorog after   this but and this is a very big but, if you're thinking about living here or even just spending   a longer holiday then there is one very important negative aspect to life here that you need to know and this is it the absolute worst horrible thing about life in russia here is the system itself   the official bureaucracy the administration and why do i suddenly have such fantastic   epiphanies about po...