How to get rid of Webalta
One of the search engines of the Russian Internet is Webalta. She has a kind of promotion technology. This is reflected in the fact that many Internet users once detect…

Continue reading →

How to set up Wi-Fi on tablets with different operating systems
A tablet is a modern and widespread gadget in our time, and it is not surprising that many users who have it are interested in the question of how to…

Continue reading →

Rules of work and behavior on the Internet
Every Internet user should be clearly aware that the Internet can not only benefit, but also cause considerable harm. To avoid trouble, strictly follow the recommendations and rules listed below.…

Continue reading →

Making the internet anonymous: TOR network

Many people are already aware that anonymity on the network is important not only for the reason that you want to visit any resources with impunity. Many users are forced to use the so-called onion network to perform basic work operations or to avoid unnecessary control over their actions. Unfortunately, our life is not as harmonious as we would like, so almost every user has to use the TOR network sooner or later.

For example, a network may be useful to you if you visit an unfamiliar computer where you are afraid to leave your data to strangers. TOR erases all traces of a visit, and also masks the route, so that in the future it becomes simply impossible to find out which computer and who performed any actions.

Some browsers, such as Chrome, carefully suggest using the incognito mode, but it’s obvious that at the same time some information is logged and is not completely safe.

What is a Tor network?
TOR is a virtual tunnel system through which all network information passes. In essence, the system operates on the basis of an application that disguises websites and other information that can be used to identify a user’s computer.

Deciphering the name explains the term onion network. The Onion Router – this is the abbreviation for TOR. Why is the word bow present? Because the route is masked in a multilayer way, and onions, as you know, have a hundred clothes.

When TOR is turned on, a basic browser is launched, which forms a user-friendly and familiar interface. In fact, the computer perceives the application as a regular Firefox browser. When connected to any site, the TOR network finds 3 random nodes, then selects individual keys, and encrypts the data using them on the entire route path.

Each node perceives only its own key, and immediately after decryption of the first node, TOR switches to the next node, which again decrypts with the next key, then decrypts the other nodes and moves to the end point of the route with such jumps.

How does this happen in real life?
Suppose you run the TOR browser. What happens next?

1.You enter the site address;

2. The TOR client requests addresses in the directory server. Then several addresses are selected from the list that are instantly encrypted;

3.Then a packet of keys is sent to the first node, where only the address of the next node can be decrypted, but not all the others. Having received permission, proceeds to the next point on the route;

4. After the end point of the route is reached, the access signal is sent back in the same way.

Since each part of the chain is encrypted, using a TOR network becomes the safest way to avoid snooping.

How to use the TOR network?
First, you need to find a site from which you can download the TOR client. This is not difficult to do, because at the request of TOR, the Russian version of any search engine will give you dozens of sites. There are many customers. Although the most popular was and remains the site torproject.org. It is in English, although you can download the Russian version of TOR from it.

Installing the plugin is simple and requires no further explanation. Even if you don’t understand anything about the Internet, you’ll figure out how to download and install the client. And it’s not difficult to use it at all. There is a small problem: the browser sometimes freezes up, then in the processes it is necessary to disable running applications: TOR.exe and Firefox.exe. And then start the client again.

Actually, if you do not use the Firefox browser, then there is no need to install it. All scripts are built into the client by default, and the browser works as an extra. You can use it at the same time and another browser, for example, your favorite Chrome or Opera. This will not affect the speed of the computer.

What you should not do in TOR
When using a browser for urgent purposes, do not forget that the network is slow, which is why it is often overloaded. Many people for some reason do not want to understand simple things: the more they load the network, for example, downloading torrent files from forbidden resources, the worse they do to themselves.

The network is supported by enthusiasts who want to bypass Internet censorship and give all of humanity (no matter how pathetic it sounds) the opportunity to surf all the corners of the network.

If you use TOR literally for all purposes, then it only slows down the network as a whole, as well as the speed of your computer, because sometimes TOR requires so many system resources that other working programs hang.

Also, do not use the TOR network for fraudulent purposes. It is worth remembering that if they want to find you, no anonymizer will help you.

TOR displays media files very poorly and often incorrectly, so some functions will simply be unavailable, or you will need to constantly restart the browser.

How to create an online store yourself
An increasing number of Internet users are thinking about how to create an online store with minimal costs and thus earn money. An online store can be attributed to the…

...

How to transfer a site to another domain: instructions
The question of how to transfer a site to another domain often arises before the "site owners". This may be necessary for a number of reasons. For example, I wanted…

...

Hard Drive Problems: Causes and Solutions
The hard drive is designed for long-term storage of files. Problems with a hard drive can lead not only to unstable computer operation, but also to the loss of important…

...

How to create robots.txt correctly
Nowadays, the Internet has spread around the world. We are almost inconceivable our day without access to the Internet, where you can view a list of news, find the necessary…

...