On 12/22/10 20:32, Kyle Williams wrote: > On Wed, Dec 22, 2010 at 8:39 AM, > 7v5w7go9ub0o<[email protected]>wrote: > >> >> Any and ALL suggests a machine that allows only HTTP/S activity >> to/from a TOR process; to/from a TOR entry node; all other traffic >> (e.g. UDP from some sneaky plugin) is blocked. >> >> An iptables script or Windows firewall could do that. Presumably a >> second script would be invoked for normal operation. >> >> Alternatively, VMs dedicated to TOR applications could achieve >> your goal, plus protect your box if something grabs your e.g. >> browser and tries to sniff around. >> >> JanusVM(.com) does exactly this and works with any OS.
Dang......... I went to that site and was impressed; yet I was not at all inclined to try it out. WHY? .....Suddenly it dawns on me that my closed-minded attitude was because of VM-prejudice ( :-) ) - I'm a Linux user and so am oriented toward QEMU and VirtualBox (I presume that VMware is a favorite and best choice for Windows users). I'd guess there are a number of us who have never checked out JanusVM because we don't want to learn VMware just to experiment with a single application. A quick google came up with this: <http://www.ubuntugeek.com/howto-convert-vmware-image-to-virtualbox-image.html> JanusVM seems an important application; and I don't want to reinvent the wheel putting TOR into a VM! So I hope to play with conversion sometime next week. But if you already know how to do this (convert), how about putting a note on your web page telling VB and Qemu users how to use JanusVM on their VM host of choice? *********************************************************************** To unsubscribe, send an e-mail to [email protected] with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/

