ReviewEssays.com - Term Papers, Book Reports, Research Papers and College Essays
Search

Tor Network

Essay by   •  February 9, 2011  •  Study Guide  •  264 Words (2 Pages)  •  706 Views

Essay Preview: Tor Network

Report this essay
Page 1 of 2

Hello and welcome to this

The 39th edition of Risky Business

on this week podcast

we'll be hearing all about tor network

it's build as an anonymizer

a way for internet users to connect to webstie

without the operators of those website knowing who's visiting

basically, it's block your IP

think of it as a caller ID blocking for your internet connection

although there's huge controversy a couple of months ago

when a swedish hacker

Dan Egurstad

Set-up a road TOR exit note

now that's where data passes from the encrypted path of the TOR network

to the outside word in clear text

and he examined the information that came through this exit node

now he wounded up intercepting the emails and mail password

of Goverment, embassy, NGO, and corporates

initially, we though that Dan was able to do this. because the organizations was using TOR

in a silly way

thinking, it was encrypting all of their traffic

but as we'll find out, Dan said the password he intercept was already use by hackers

who already compromise the mail accounts

the bad guys was using TOR to mask their attack

in august, swedish hacker dan egurstad

gain access to a thousand sensitive Embassy, NGO and corporate email accounts

he'd later one hundred of those online

drawing fire

from the IT security community

but the question on everybody lips

was

...

...

Download as:   txt (1.7 Kb)   pdf (50.6 Kb)   docx (9.5 Kb)  
Continue for 1 more page »
Only available on ReviewEssays.com