22.05.2023 Views

Tor_and_The_Dark_Net_Remain_Anonymous_and_Evade_NSA_Spying_by_James

Tor

Tor

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

because these closed source proprietary operating systems are not open to scrutiny and

auditing the way open source Linux distributions are. There are more Windows users and

thus more exploits available for Windows.

Running your operating system in a Virtual Machine, even if your host OS is Linux

(remember Virtual Box can run on Linux) will help cut down on the retention of any

malware you might pick up when on the internet. Do not go to any potentially harmful

sites on your freedom fighting computers. Do not open any emails from anyone that you

do not trust 100%. Regularly format your hard drives to keep them clean of any hidden

viruses.

If you are unsure if something is safe, test it on a computer only meant for testing and one

that is not connected to the internet. If you can reset your boot sector on your hard drive

from time to time that would be a good idea as well, because you can get master boot

sector viruses that would boot up a virus before your computer even boots into the OS.

Flash your BIOS, the BIOS is the first thing that runs when you turn on your computer, if

you have a virus in your BIOS, there is no antivirus that can remove it, you would need to

flash your BIOS and install a new firmware. Make sure the firmware is 100% trustworthy

as infected firmware is the most common way to get a BIOS virus.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!