Meni
Forumi
Nove poruke
Sve teme
Najnovije teme
Nove poruke
♫ Radio
Dnevnici
Dnevnici Vanjskog Uzgajanja
Dnevnici Unutrašnjeg Uzgajanja
Završeni Vanjski Dnevnici
Završeni Unutrašnji Dnevnici
Novo
Popularne teme
Nove poruke
Najnovije aktivnosti
Članovi
Trenutno prisutni
Forumi
Prijava
Registracija
Nove poruke
Sve teme
Najnovije teme
Nove poruke
Meni
Install the app
Install
Objavite odgovor
Forumi
Sve što nema svoje mjesto
Svijet Interneta i Kompjutera
Sigurnosni rizik na forumu (netu)
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
Koristite zastareli pregledač. Možda neće pravilno prikazivati ove ili druge veb stranice.
Trebali biste nadograditi ili koristiti
alternativni pregledač
.
Poruka
<blockquote data-quote="Vutragenjo" data-source="post: 43830" data-attributes="member: 4"><p>Eto za sve plasljive korisnike ovog foruma jedna super vijest. Uskoro uvodimo secure server kao sto je Antilopa pomenula gore. Sve ce biti enkriptovano uskoro tako da ce briga biti dovedena na nulu!</p><p></p><p></p><p>Takodje ako uzgajate doma a bojite se da se registrujete i chatate sa nama. Pa vrlo malo ima razlike da li ste registrovani ili ne. Toliko ljudi dodje na forum da bi bilo tesko pratiti ipove i registracije i poruke. Znaci nema brige ali ako ste bas paranoicni onda:</p><p></p><p>-----------------------------------------------------</p><p></p><p><a href="http://www.torproject.org/download.html.en" target="_blank">http://www.torproject.org/download.html.en</a></p><p></p><p>-----------------------------------------------------</p><p></p><p>Tor by itself is <em>NOT</em> all you need to maintain your anonymity. There are several major pitfalls to watch out for: <ol> <li data-xf-list-type="ol">Tor only protects Internet applications that are configured to send their traffic through Tor — it doesn't magically anonymize all your traffic just because you install it. <strong>We recommend you use <a href="http://www.mozilla.org/firefox" target="_blank">Firefox</a> with the <a href="https://addons.mozilla.org/firefox/2275/" target="_blank">Torbutton</a> extension.</strong></li> <li data-xf-list-type="ol">Browser plugins such as Java, Flash, ActiveX, RealPlayer, Quicktime, Adobe's PDF plugin, and others can be manipulated into revealing your IP address. You should probably <a href="http://plugindoc.mozdev.org/faqs/uninstall.html" target="_blank">uninstall your plugins</a> (go to "about<img src="/styles/default/xenforo/smilies/245.gif" class="smilie" loading="lazy" alt=":p" title="Stick Out Tongue :p" data-shortname=":p" />lugins" to see what is installed), or investigate <a href="https://addons.mozilla.org/firefox/1237/" target="_blank">QuickJava</a>, <a href="https://addons.mozilla.org/firefox/433/" target="_blank">FlashBlock</a>, and <a href="http://noscript.net/" target="_blank">NoScript</a> if you really need them. Consider removing extensions that look up more information about the websites you type in (like Google toolbar), as they may bypass Tor and/or broadcast sensitive information. Some people prefer using two browsers (one for Tor, one for unsafe browsing).</li> <li data-xf-list-type="ol">Beware of cookies: if you ever browse without Tor and Privoxy and a site gives you a cookie, that cookie could identify you even when you start using Tor again. You should clear your cookies frequently. <a href="https://addons.mozilla.org/firefox/82/" target="_blank">CookieCuller</a> can help protect any cookies you do not want to lose.</li> <li data-xf-list-type="ol">Tor anonymizes the origin of your traffic, and it encrypts everything inside the Tor network, but <a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ExitEavesdroppers" target="_blank">it can't encrypt your traffic between the Tor network and its final destination.</a> If you are communicating sensitive information, you should use as much care as you would on the normal scary Internet — use HTTPS or other end-to-end encryption and authentication.</li> <li data-xf-list-type="ol">While Tor blocks attackers on your local network from discovering or influencing your destination, it opens new risks: malicious or misconfigured Tor exit nodes can send you the wrong page, or even send you embedded Java applets disguised as domains you trust.</li> </ol></blockquote><p></p>
[QUOTE="Vutragenjo, post: 43830, member: 4"] Eto za sve plasljive korisnike ovog foruma jedna super vijest. Uskoro uvodimo secure server kao sto je Antilopa pomenula gore. Sve ce biti enkriptovano uskoro tako da ce briga biti dovedena na nulu! Takodje ako uzgajate doma a bojite se da se registrujete i chatate sa nama. Pa vrlo malo ima razlike da li ste registrovani ili ne. Toliko ljudi dodje na forum da bi bilo tesko pratiti ipove i registracije i poruke. Znaci nema brige ali ako ste bas paranoicni onda: ----------------------------------------------------- [url]http://www.torproject.org/download.html.en[/url] ----------------------------------------------------- Tor by itself is [I]NOT[/I] all you need to maintain your anonymity. There are several major pitfalls to watch out for: [LIST=1] [*]Tor only protects Internet applications that are configured to send their traffic through Tor — it doesn't magically anonymize all your traffic just because you install it. [B]We recommend you use [URL="http://www.mozilla.org/firefox"]Firefox[/URL] with the [URL="https://addons.mozilla.org/firefox/2275/"]Torbutton[/URL] extension.[/B] [*]Browser plugins such as Java, Flash, ActiveX, RealPlayer, Quicktime, Adobe's PDF plugin, and others can be manipulated into revealing your IP address. You should probably [URL="http://plugindoc.mozdev.org/faqs/uninstall.html"]uninstall your plugins[/URL] (go to "about:plugins" to see what is installed), or investigate [URL="https://addons.mozilla.org/firefox/1237/"]QuickJava[/URL], [URL="https://addons.mozilla.org/firefox/433/"]FlashBlock[/URL], and [URL="http://noscript.net/"]NoScript[/URL] if you really need them. Consider removing extensions that look up more information about the websites you type in (like Google toolbar), as they may bypass Tor and/or broadcast sensitive information. Some people prefer using two browsers (one for Tor, one for unsafe browsing). [*]Beware of cookies: if you ever browse without Tor and Privoxy and a site gives you a cookie, that cookie could identify you even when you start using Tor again. You should clear your cookies frequently. [URL="https://addons.mozilla.org/firefox/82/"]CookieCuller[/URL] can help protect any cookies you do not want to lose. [*]Tor anonymizes the origin of your traffic, and it encrypts everything inside the Tor network, but [URL="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ExitEavesdroppers"]it can't encrypt your traffic between the Tor network and its final destination.[/URL] If you are communicating sensitive information, you should use as much care as you would on the normal scary Internet — use HTTPS or other end-to-end encryption and authentication. [*]While Tor blocks attackers on your local network from discovering or influencing your destination, it opens new risks: malicious or misconfigured Tor exit nodes can send you the wrong page, or even send you embedded Java applets disguised as domains you trust.[/LIST] [/QUOTE]
Verifikacija
Objavite odgovor
Forumi
Sve što nema svoje mjesto
Svijet Interneta i Kompjutera
Sigurnosni rizik na forumu (netu)
Top
Bottom