Screencast: How Tor improves Web surfing privacy and security audits

In an on-screen demonstration, learn how Tor can be used to ensure that surfing habits aren't recorded by malicious hackers.

Watch in full-screen

Can't see the screen? View Peter's Tor demo in a larger window.
Tor is a security tool that permits anonymous Web surfing. While it's a tool that can be used both by white hats and gray hats alike, all information security pros should be aware of how it works.

In this screencast, Peter Giannoulis of The Academy.ca details not only how Tor can be used by individuals to ensure their surfing habits aren't recorded by malicious hackers, but also how IT professionals involved in auditing networks can mask their location so that a more thorough audit can be conducted.

For more information about the tool you've seen here:

  • Executive Editor Dennis Fisher examines how Tor network 'bridges' help evade blockers.
  • In this podcast, learn how Tor peer-to-peer privacy could be hacked.

    Want more screencasts? Make sure to check out our other demonstrations of today's security tools.

    About the author:
    Peter Giannoulis, GSEC, GCIH, GCIA, GCFA, GCFW, GREM, CISSP, is an information security consultant in Toronto, Ontario. He currently maintains www.theacademy.ca, which provides organizations streaming video on how to configure and troubleshoot many of today's top security products. He also serves as a technical director for GIAC.

  • This was first published in October 2008

    Dig deeper on IT Security Audits

    Pro+

    Features

    Enjoy the benefits of Pro+ membership, learn more and join.

    0 comments

    Oldest 

    Forgot Password?

    No problem! Submit your e-mail address below. We'll send you an email containing your password.

    Your password has been sent to:

    -ADS BY GOOGLE

    SearchCloudSecurity

    SearchNetworking

    SearchCIO

    SearchConsumerization

    SearchEnterpriseDesktop

    SearchCloudComputing

    ComputerWeekly

    Close