On Fri, Sep 09, 2011 at 05:43:50AM +0000, tor-ad...@orionjurinform.com wrote 2.2K bytes in 45 lines about: : Very intresting what is the vulnerabilities they used for breaking systems?
This question can likely only be answered by the authorities. The obvious attacks are against the webserver itself (apache, IIS, nginx, etc) or some interpreted language, like PHP, Python, or Java. Hidden services provide the path and addressing to a destination. They don't provide the application or content at the address. You need some sort of daemon/server software to provide the content and application. -- Andrew pgp key: 0x74ED336B _______________________________________________ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk