through a GELI encrypted GEOM. (No plain-text ever touches the disk.)
much better - use keyboard password.
Edit the rc.conf file to spoof the Ethernet (MAC) hardware address to
be a new pseudo-random value at each boot. Configure the system to
automatically receive an IP address via DHCP.
On Thu, 12 Mar 2009 13:47:07 -0400, T.
freebsd-questi...@lists.goldenpath.org wrote:
You want a transparent tor proxy, which you setup with freebsd and pf.
Thanks much for the help. If my modest Python script used to download
some web pages goes through Tor, is there a way for the remote web
Thanks much for the help. If my modest Python script used to download
some web pages goes through Tor, is there a way for the remote web
server to somehow trace this connection back to me?
if you won't help them with extra info in request headers - no.
Gilles wrote:
On Thu, 12 Mar 2009 13:47:07 -0400, T.
freebsd-questi...@lists.goldenpath.org wrote:
You want a transparent tor proxy, which you setup with freebsd and pf.
Thanks much for the help. If my modest Python script used to download
some web pages goes through Tor, is there a
On 3/12/09, Gilles gilles.gana...@free.fr wrote:
Hello
I'd like to download information from our competitor's web site,
without their knowing it's from us.
Do you know of an alternative for FreeBSD, ie. a solution that will
let me connect to a web server through at least one other host, and
Hello
I'd like to download information from our competitor's web site,
without their knowing it's from us.
The Tor network works fine, but they don't seem to provide a *nix
version, much less a command-line version (the download script will
run on a non-X FreeBSD 6.3 server).
Do you know of an
On Thu, 12 Mar 2009 10:12:48 +0100
Gilles gilles.gana...@free.fr wrote:
I'd like to download information from our competitor's web site,
without their knowing it's from us.
?
The Tor network works fine, but they don't seem to provide a *nix
version
/usr/ports/security/tor/
Andreas
--
On Thu, 12 Mar 2009 10:42:53 +0100, Andreas Rudisch cyb.@gmx.net
wrote:
/usr/ports/security/tor/
Thanks Andeas. Up to now, I only used the Tor client for Windows that
comes with Privoxy, so never used Tor as-is, and never on the command
line.
If someone's used to using Tor, I have a couple of
I'd like to download information from our competitor's web site,
without their knowing it's from us.
so tell me address and i will download and send it ;)
The Tor network works fine, but they don't seem to provide a *nix
there is tor for unix in ports. tor works fine i used it a lot and
Thanks Andeas. Up to now, I only used the Tor client for Windows that
comes with Privoxy, so never used Tor as-is, and never on the command
line.
If someone's used to using Tor, I have a couple of questions. On
FreeBSD, I intend to use it to run a Python script to connect to a
remote web server
On Thu, Mar 12, 2009 at 12:08 PM, Gilles gilles.gana...@free.fr wrote:
On Thu, 12 Mar 2009 10:42:53 +0100, Andreas Rudisch cyb.@gmx.net
wrote:
/usr/ports/security/tor/
Thanks Andeas. Up to now, I only used the Tor client for Windows that
comes with Privoxy, so never used Tor as-is, and
2009/3/12 Gilles gilles.gana...@free.fr:
Hello
I'd like to download information from our competitor's web site,
without their knowing it's from us.
The Tor network works fine, but they don't seem to provide a *nix
version, much less a command-line version (the download script will
run on
Chris Rees wrote:
2009/3/12 Gilles gilles.gana...@free.fr:
Hello
I'd like to download information from our competitor's web site,
without their knowing it's from us.
The Tor network works fine, but they don't seem to provide a *nix
version, much less a command-line version (the download
On Thu, 12 Mar 2009 13:40:54 +0200, Ross Cameron abal...@gmail.com
wrote:
Not to put a damper on everyone's fun but wouldn't just be easier to go to
an internet cafe, run you're web scraper from a USB drive and leave?
Not if the script will run for three days ;)
On Thu, 12 Mar 2009 07:16:15 -0500, Kevin Kinsey k...@daleco.biz
wrote:
It probably is, but you're assuming his competitors know that
he works for their competition, and, for that matter, that
Giles is his real name, etc., etc.
Exactly ;)
___
On Thu, 12 Mar 2009 11:38:13 +0100 (CET), Wojciech Puchar
woj...@wojtek.tensor.gdynia.pl wrote:
set up tor and use it as socks proxy with your browser and python script. You
don't need privoxy for that.
Thanks for the tip. I'll look into how to modify the Python script to
use SOCKS instead.
On Thu, 12 Mar 2009 11:38:13 +0100 (CET)
Wojciech Puchar woj...@wojtek.tensor.gdynia.pl wrote:
set up tor and use it as socks proxy with your browser and python
script.
You don't need privoxy for that.
but isn't the point of of using privoxy to strip identifying
information from http
On Thu, 12 Mar 2009 11:37:26 +0100 (CET), Wojciech Puchar
woj...@wojtek.tensor.gdynia.pl wrote:
there is tor for unix in ports. tor works fine i used it a lot and
stopped. Why - because it got to widely known and there are actually less
secure
than not using it at all.There are lots of hackers
On Thu, Mar 12, 2009 at 03:04:05PM +, RW wrote:
On Thu, 12 Mar 2009 11:38:13 +0100 (CET)
Wojciech Puchar woj...@wojtek.tensor.gdynia.pl wrote:
set up tor and use it as socks proxy with your browser and python
script.
You don't need privoxy for that.
but isn't the point of of
Gilles wrote:
On Thu, 12 Mar 2009 10:42:53 +0100, Andreas Rudisch cyb.@gmx.net
wrote:
/usr/ports/security/tor/
Thanks Andeas. Up to now, I only used the Tor client for Windows that
comes with Privoxy, so never used Tor as-is, and never on the command
line.
If someone's used to using
T. wrote:
I just enable the control port locally and telnet to it.
To get new circuits, on the control port (assuming you haven't set any
authentication):
AUTHENTICATESIGNAL NEWNYM
Typo, that should be with a line break, obviously:
AUTHENTICATE
(you'll get a response, then).
You don't need privoxy for that.
but isn't the point of of using privoxy to strip identifying
information from http requests that would otherwise undermine tor.
if python script won't put any extras - what info you want to strip out?
___
stopped. Why - because it got to widely known and there are actually less secure
than not using it at all.There are lots of hackers that run modified tor that
do analyzes/changes
what going through. I stopped when i once used it on my bank webpage and got
message about
change of SSL key!!!
23 matches
Mail list logo