How to Setup a High-Security TOR Laptop  Using Kali Linux 2.0 + VirtualBox + Whonix + Bridges + Tor: Dark Net Science Book 1 Buy on Amazon

https://www.ebooknetworking.net/books_detail-B015LCNLU2.html

How to Setup a High-Security TOR Laptop Using Kali Linux 2.0 + VirtualBox + Whonix + Bridges + Tor: Dark Net Science Book 1

Publisher2StonesMedia

Book Details

Author(s)Boyd Stone
Publisher2StonesMedia
ISBN / ASINB015LCNLU2
ISBN-13978B015LCNLU4
Sales Rank9,911
MarketplaceUnited States  🇺🇸

Description

REVISED on November 23, 2015

If you already bought this book prior to November 23, you can see what was updated by going to the Pastebin.com page set up for this book.

Wanna Be A Ghost On The Internet?

"This book offers up a step by step recipe for setting up a secure internet browsing system based upon Tor. It's a list of actions to take, not a lot of backstory. I recommend this if you are interested in the nuts-and-bolts of security software selection and set-up."

>>>You need to read this book because:

  • You'll get a computer that has dozens of ethical-hacking (AKA penetration-testing or just pentesting) apps pre-installed or quickly available including: aircrack-ng, burpsuite, hydra, john the ripper, maltego, maltego-teeth, metasploit, metasploit-framework, nmap, zaproxy, sqlmap, wireshark, and many more. See the whole listing of tools at: http://tools.kali.org/tools-listing
  • You'll get a computer that is easily encrypted and has LUKS Encryption Nuke built in. It'll let you “nuke” your install by entering a boot password that destroys, rather than decrypts the data on your drive. Handy for emergencies.
  • You'll get a computer like the hacker 'nachash' is talking about when he says, "You may wish to have a setup similar to an anonymous middle box, preferably without public IPs where possible, so if your application gets rooted tor isn't affected." Whonix does that for you: the Whonix Gateway makes a torified connection to the Internet, while the Whonix Workstation connects to the Gateway via an isolated network.
  • You'll get Privacy. (Which is not secrecy, but rather the ability to selectively reveal yourself to the world.)
  • You'll get another kind of privacy: preventing Google, advertisers, and government agencies from knowing what you're searching online for.
Donate to EbookNetworking
Prev
Next