Good write-up of the Tor storm worm variant at f-secure blog
http://www.f-secure.com/weblog/#1272
For those not tracking the storm worm... this has been one of the
most prolific worms of recent months. It's the same thing behind the
fake youtube emails, e-greeting card infections and th
I've seen a VM that routes all traffic over TOR, invisibly to the
O/S. (Not sure what they do about UDP).
Developed at Georgia Tech.
On Wed, Mar 07, 2007 at 12:56:22AM -0500, James Muir wrote:
> http://blogs.zdnet.com/security/?p=114
The approaches suggested won't work if you use Firefo
Your proposal is quite realistic, though to get good bi-directional
bandwidth would probably cost a lot more than you project, as you'd
want colocated servers, not servers on DSL lines.
I believe that the exit nodes are one of the weakest points in a Tor
network. If you don't know who is op
Privoxy routes DNS through TOR.
Question: does Java in a browser run through the browser's IP stack?
If so, its DNS packets would go through the SOCKS proxy and Privoxy,
then TOR. Right?
At 9:46 PM -0800 3/6/07, Michael_google gmail_Gersten wrote:
Well, first, this is just the normal exit
4 matches
Mail list logo