Registered | last year |
Last Visited | 3 weeks ago |
Total Posts | 136 |
by TripleBypass in Userspace Software
...
![]() | TOR Hacker last year |
Type: SOCKS5
SOCKS Host: 127.0.0.1
Port: 9050
That's default Tor settings.
by scavy in General Questions
...
![]() | TOR Hacker last year |
Register a new yahoo or gmail address and send a letter to bridges@bridges.torproject.org with the line 'get bridges' by itself in the body of the mail.
They will provide you some addresses for Tor bootstrap.
by Preznik in Userspace Software
...
![]() | TOR Hacker last year |
Is it possible to find out, what IP address does Firefox tries to connect?
I mean, that "application level alert" - what information does it show? Maybe
# tail -n 100 /var/log/syslog
will show more info?
by mouse2113 in General Questions
...
![]() | TOR Hacker last year |
Delete all cookies & get New Identity. If no - again New Identity.
Somebody is parsing Google from TOR Exit nodes, that's why many IPs got blacklisted.
by rafaelpalmeiro in General Questions
...
![]() | TOR Hacker last year |
Tor opens its own socks5 proxy on localhost, so you cannot put in your browser both.
To use your normal HTTP/HTTPS proxy settings you should 'torify' your browser from outside, means route all it's traffic transparently to Tor. I am not sure this could be easily done on Windows, but there are m
by Lux in Userspace Software
...
![]() | TOR Hacker last year |
No, you cannot specify city "in general" like you do this with country. Only by listing the exact addresses which you know are from that city.
by ertom in General Questions
...
![]() | TOR Hacker last year |
1) Wait until it fully connects to Tor
2) Run this command in command shell (replace user@remote.host with actual username and hostname of your SSH account):
$ torify ssh -D 8080 user@remote.host
3) It will asks for ssh password. Enter it.
4) Open browser and put these proxy settings
by ertom in General Questions
...
![]() | TOR Hacker last year |
For SSH it should be something like this:
$ torify ssh -D 8080 user@remote.host
Where:
ssh -D creates SOCKS5 proxy on port 8080 (known as "ssh tunneling")
torify ... wraps the above command with Tor (see ssh over Tor)
by Lux in Userspace Software
...
![]() | TOR Hacker 7 days ago |
You can pick any IP address from Tor Network Map. So if somebody runs ExitNode in your city, then yes, you can pick up a city.
viewtopic.php?f=2&t=18267#p18686
by danblukk in Security Questions
...
![]() | TOR Hacker 8 days ago |
Does Tor encrypt everything that comes out from my PC, even the DNS requests to resolve the domain "illegalsite.com"?
I hope the destination IP of the site illegal.com are only visible inside the IP packets coming out from the
Tor's exit relay, not in the packets coming out from my PC and e
by adrenalina in General Questions
...
![]() | TOR Hacker last month |
Tor is not Vidalia and Vidalia is not Tor. Tor is (relatively) small program, designed to work like a system service, or network daemon, and not an end-user app. Tor runs on different platforms, and some of them have no GUI at all. That's why it is configured with torrc file and not graphically.
...
by brembrem in General Questions
...
![]() | TOR Hacker last month |
Please, can you tell me what country are you from? It's so interesting, I've never talked directly to a person who lives in censored country. How it's like?
If 'censored' means that some websites are blocked (like youporn in Turkey, erowid in Russia, youtube in Egypt, spotify in Europe ...) an
by ghattasak in Userspace Software
...
![]() | TOR Hacker last month |
Thank you for posting so informative screenshot.
As far as I can see there, you use 127.0.0.1:9050 as SocksListenAddress/Port in your Tor settings.
And Mozilla tries to use 127.0.0.1:9150 as a local proxy.
I think this is the reason why "The proxy server is refusing connections"
by tornoob in General Questions
...
![]() | TOR Hacker last month |
Try ORPort 9001 or some other big number (>1024). Often this helps.
by deep in Userspace Software
...
![]() | TOR Hacker last month |
Hello, deep
I don't understand your second question. What kind of hosting are you talking about? Someone who doesn't let you know IP of your hosted site? Is this shared hosting? Or something like Blogger or Tumblr in *.onion zone? Or what?
Usually you buy VPS, log into it directly via ssh
by schema in General Questions
...
![]() | TOR Hacker last month |
Look how it is done in Whonix.org
And also please check this tutorial: viewtopic.php?f=2&t=18337 It was written for Raspberry Pi, but should work for any other router with Linux.
by BennyBallbags in Userspace Software
...
![]() | TOR Hacker last month |
How do you download files? Tor Browser Bundle or ..? What OS?
by brembrem in General Questions
...
![]() | TOR Hacker last month |
Just disable that programs in your firewall, leave it only proxychains with direct access to internet. Even if some program won't get proxified properly - it will fail to connect rather than reveal your IP.
by Python in General Questions
...
![]() | TOR Hacker last month |
Try Tails or (even better) Whonix.
Whonix is a VirtualBox's guest system with all network traffic transparently routed to Tor. Inside that Box you can freely install any plugins, Flash, even trojan horses and rootkits - they will never know your real IP address.
by Anonymoose in General Questions
...
![]() | TOR Hacker last month |
Don't use your regular browser with Tor! It keeps cookies, saved passwords, unique ID3-tags from cache and many other things that could compromise your anonymity. Every time you visit a site that has Google Analytics code on it (even torforum.org has it), your browser tracks unique identifier.