Screencast: How Tor improves Web surfing privacy and security audits

In an on-screen demonstration, learn how Tor can be used to ensure that surfing habits aren't recorded by malicious hackers.

Watch in full-screen

Can't see the screen? View Peter's Tor demo in a larger window.
Tor is a security tool that permits anonymous Web surfing. While it's a tool that can be used both by white hats and gray hats alike, all information security pros should be aware of how it works.

In this screencast, Peter Giannoulis of The details not only how Tor can be used by individuals to ensure their surfing habits aren't recorded by malicious hackers, but also how IT professionals involved in auditing networks can mask their location so that a more thorough audit can be conducted.

For more information about the tool you've seen here:

  • Executive Editor Dennis Fisher examines how Tor network 'bridges' help evade blockers.
  • In this podcast, learn how Tor peer-to-peer privacy could be hacked.

    Want more screencasts? Make sure to check out our other demonstrations of today's security tools.

    About the author:
    Peter Giannoulis, GSEC, GCIH, GCIA, GCFA, GCFW, GREM, CISSP, is an information security consultant in Toronto, Ontario. He currently maintains, which provides organizations streaming video on how to configure and troubleshoot many of today's top security products. He also serves as a technical director for GIAC.

  • This was first published in October 2008

    Dig Deeper on IT Security Audits



    Find more PRO+ content and other member only offers, here.



    Forgot Password?

    No problem! Submit your e-mail address below. We'll send you an email containing your password.

    Your password has been sent to: