Sponsored Content
Full Discussion: Tor and vm's
Special Forums Cybersecurity Tor and vm's Post 302935646 by Corona688 on Wednesday 18th of February 2015 11:09:36 AM
Old 02-18-2015
The internet works by sending information to other systems and getting information back. As such, you will never have perfect security. At best you can send to systems not known in protocols not recognized via data not understood.

vmware is very big business. They care about their own money and hence have licenses, but are unlikely to have gaping backdoors.

win8 doesn't have your personal information unless you're silly enough to give it to it. They may have scammed lots of people into believing it needs an MSN account and internet access to run, but that's just not true.
This User Gave Thanks to Corona688 For This Post:
 

3 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

TOR environment variable

My profile sets the TOR variable to $(whence vi). What is TOR used for? I appreciate any help I can get. (3 Replies)
Discussion started by: Wittich
3 Replies

2. Cybersecurity

Problem with Privoxy and Tor

Greetings, I use Debian Wheezy as an OS and I have already downloaded the Tor Browser-Bundle, which works fine. As soon as a start privoxy and set the proxy to: 127.0.0.1:8118 (socks4) in the tor browser (edit-->pref-->advanced-->settings--->http-proxy) I always get a connection refused. I... (1 Reply)
Discussion started by: Dr. Nick
1 Replies

3. Forum Support Area for Unregistered Users & Account Problems

Account Register With Tor

Hello, I would be interested in creating an account on this forum. However I have run into trouble in the process, I seem to not have permission to access the registration page. It seems that this forum has blocked registration from Tor. I am wondering if there is any way I could obtain an account... (0 Replies)
Discussion started by: Unregistered
0 Replies
TOR-GENCERT(1)							    Tor Manual							    TOR-GENCERT(1)

NAME
tor-gencert - Generate certs and keys for Tor directory authorities SYNOPSIS
tor-gencert [-h|--help] [-v] [-r|--reuse] [--create-identity-key] [-i id_file] [-c cert_file] [-m num] [-a address:port] DESCRIPTION
tor-gencert generates certificates and private keys for use by Tor directory authorities running the v3 Tor directory protocol, as used by Tor 0.2.0 and later. If you are not running a directory authority, you don't need to use tor-gencert. Every directory authority has a long term authority identity key (which is distinct from the identity key it uses as a Tor server); this key should be kept offline in a secure location. It is used to certify shorter-lived signing keys, which are kept online and used by the directory authority to sign votes and consensus documents. After you use this program to generate a signing key and a certificate, copy those files to the keys subdirectory of your Tor process, and send Tor a SIGHUP signal. DO NOT COPY THE IDENTITY KEY. OPTIONS
-v Display verbose output. -h or --help Display help text and exit. -r or --reuse Generate a new certificate, but not a new signing key. This can be used to change the address or lifetime associated with a given key. --create-identity-key Generate a new identity key. You should only use this option the first time you run tor-gencert; in the future, you should use the identity key that's already there. -i FILENAME Read the identity key from the specified file. If the file is not present and --create-identity-key is provided, create the identity key in the specified file. Default: "./authority_identity_key" -s FILENAME Write the signing key to the specified file. Default: "./authority_signing_key" -c FILENAME Write the certificate to the specified file. Default: "./authority_certificate" -m NUM Number of months that the certificate should be valid. Default: 12. --passphrase-fd FILEDES Filedescriptor to read the file descriptor from. Ends at the first NUL or newline. Default: read from the terminal. -a address:port If provided, advertise the address:port combination as this authority's preferred directory port in its certificate. If the address is a hostname, the hostname is resolved to an IP before it's published. BUGS
This probably doesn't run on Windows. That's not a big issue, since we don't really want authorities to be running on Windows anyway. SEE ALSO
tor(1) See also the "dir-spec.txt" file, distributed with Tor. AUTHORS
Roger Dingledine <arma@mit.edu>, Nick Mathewson <nickm@alum.mit.edu>. AUTHOR
Nick Mathewson Author. Tor 09/26/2014 TOR-GENCERT(1)
All times are GMT -4. The time now is 07:49 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy