Tor 0.1.2.12 RC
Tor is a toolset for a wide range of organizations and people that want to be more safe and more secure on the Internet.
|
Tor is a toolset for a wide range of organizations and people that want to be more safe and more secure on the Internet.
Using Tor can help you anonymize web browsing and publishing, instant messaging, IRC, SSH, and other applications that use the TCP protocol. Tor also provides a platform on which software developers can build new applications with built-in anonymity, safety, and privacy features.
Your traffic is safer when you use Tor, because communications are bounced around a distributed network of servers, called onion routers. Instead of taking a direct route from source to destination, data packets on the Tor network take a random pathway through several servers that cover your tracks so no observer at any single point can tell where the data came from or where it's going. This makes it hard for recipients, observers, and even the onion routers themselves to figure out who and where you are. Tor's technology aims to provide Internet users with protection against "traffic analysis," a form of network surveillance that threatens personal anonymity and privacy, confidential business activities and relationships, and state security.
Traffic analysis is used every day by companies, governments, and individuals that want to keep track of where people and organizations go and what they do on the Internet. Instead of looking at the content of your communications, traffic analysis tracks where your data goes and when, as well as how much is sent.
For example, online advertising companies like Fastclick and Doubleclick use traffic analysis to record what web pages you've visited, and can build a profile of your interests from that. A pharmaceutical company could use traffic analysis to monitor when the research wing of a competitor visits its website, and track what pages or products that interest the competitor. IBM hosts a searchable patent index, and it could keep a list of every query your company makes. A stalker could use traffic analysis to learn whether you're in a certain Internet cafe.
Tor aims to make traffic analysis more difficult by preventing eavesdroppers from finding out where your communications are going online, and by letting you decide whether to identify yourself when you communicate.
Tor's security is improved as its user base grows and as more people volunteer to run servers. Please consider installing it and then helping out.
Part of the goal of the Tor project is to deploy a public testbed for experimenting with design trade-offs, to teach us how best to provide privacy online. We welcome research into the security of Tor and related anonymity systems, and want to hear about any vulnerabilities you find.
Tor is an important piece of building more safety, privacy, and anonymity online, but it is not a complete solution. And remember that this is development codeāit's not a good idea to rely on the current Tor network if you really need strong anonymity.
tags traffic analysis use traffic tor network your communications where your could use the tor onion routers can build the internet and privacy when you communications are
Download Tor 0.1.2.12 RC
Authors software
Tor 0.1.2.12 RC
Roger Dingledine
Tor is a toolset for a wide range of organizations and people that want to be more safe and more secure on the Internet.
Similar software
Tor 0.1.2.12 RC
Roger Dingledine
Tor is a toolset for a wide range of organizations and people that want to be more safe and more secure on the Internet.
A+ Web Privacy Service 2.1
Amplusnet
A+ Web Privacy Service is an Online Service that hides your IP address and provides a high level of protection from the ever-increasing variety of Web-based online threats: online trackers, spammers, harvesters and snoops, hackers etc.
Network Traffic Monitor 2.01
Nico Cuppen Software
Network Traffic Monitor shows you which processes in your machine are causing TCP/IP network traffic, how much traffic that is, and over which IP ports this traffic takes place.
MakBit IP Traffic Watch 1.3
MakBit Software
MakBit IP Traffic Watch will helps you analyze direction and volume of Internet traffic.
VisualSniffer 2.0
BVTech Inc
VisualSniffer is a powerful packet capture tool and protocol analyzer (ip sniffer or packet sniffer) for Windows system.
MRTG 2.14.7
Tobias Oetiker
The Multi Router Traffic Grapher (MRTG) is a tool to monitor the traffic load on network links.
MZL & Novatech Traffic Statistics 1.2.0.1
MZL & Novatech TrafficStatistic
MZL & Novatech TrafficStatistic makes it possible to view statistics on network usage and has it's focus on payment relevent information.
MZL & Novatech TrafficStatistic 1.2.0.1
MZL & Novatech TrafficStatisti
MZL & Novatech TrafficStatistic service reads the user's ethernet packages and allows to see the amount of traffic consumed as an icon in the system tray.
Active Wall Traffic Monitor 5.0
Active Network CO., LTD
Active Wall Traffic Monitor is a free real time network traffic monitor software for LAN.
BL-Monitor 2.0
Computer Mail Services
BL-Monitor is based upon a timing engine that simultaneously queries and measures multiple DNSBL response time.
Other software in this category
Clustone 3.0
delacove
Its search engine will connect you with the members who already have the same trade or the same interests as you.
WinMX 3.5 beta 4
FrontCode Tech
WinMX is a completely free file-sharing program like no other.
Piolet 1.9.8
Pablo Soto
Piolet is a 3rd generation P2P network application.
Mo's Search++ 1.0.6
Mo
Mo's Search++ is a software that completes Direct Connect clients like DC++.
Blubster Free 2.6.8
Pablo Soto
Blubster is a music-sharing connection that is quickly attracting a user community.