Skip to main content

10 people who are surprisingly Arab ❗

  10 people who are surprisingly Arab ❗ Despite the fact that individuals of Arab drop aren't regularly celebrated in the news, particularly with strains in the Middle East, ISIS, and the previous War on Terror, you may be shocked to realize that some of you. Araian Girl:Source-Wikimedia Despite the fact that individuals of Arab plunge aren't frequently celebrated in the news, particularly with strains in the Middle East, ISIS, and the previous War on Terror, you may be astounded to realize that a portion of your #1 performers have Arabic legacy.  Whatever your generalizations and suppositions might be, a portion of these names may astonish you. It simply demonstrates that individuals are really difficult to classify and these stars are no special case.  Here are a couple of stars whose predecessors or even guardians came from some place in the Middle East. Since they are not named Mohammed doesn't make their family any less authentic A large number of them have progenit

How to become anymonous in online?

How to become anymonous in online?

Anonymous, Source-Wikimedia

 hi everyone this is infoweb from the objective of this video is to discuss the tools and techniques to stayanonymous online I have already discussed this topic beforehowever the objective of making this video is to summarize all these otherthings tools and techniques that you can use to achieve the anonymous status in2020 so these are the topics that we will cover the basic foundationor the intro of the anonymity the tools or techniques for example the VPN, TOR, Whonix, Tails and obviously the difference between them the drawbacks ofeach and the advantages of of each you know tools and technique. There is nothingwrong to be anonymous and controlling your own personal privacy if you aredoing the legitimate business there are I mean several ways to do this and let'sstart with the VPN first, okay so you might have heard the term VPN before VPNis the stand for the Virtual Private Network it is a technology that allowsyou to connect to one or more computer by using a private network from publicinternet connection your IP just think of your IP your IP is your own IP isjust like your home address and you use your IP assigned by the ISP in order toconnect with the other servers for computers available from the internet oronline what VPN does VPN mask your IP with the one assigned by them by the VPNservice provider they'll mask your IP with their own and then theywill allow you to browse the Internet or make the connections between yourmachine to the class to this server machine server sideso this is the working of a VPN think about it. You want to communicate with aserver you want to open a website let's say what you will do you willopen your browser and hit the IP or the domain name what it does? the datatravels through local network to the Internet or public network and from thepublic network or Internet it reaches to the server end or the destination endand then through the destination and the server responds with the web page thesimilar thing goes with the chatting or any other way of communication likesending files video calling or whatever you do on the Internetif you do not use WPA and then it goes like this but if you use a VPN then aVPN client hit the VPN server first and then the VPN server marks to your IPyour V's the user IP with with an IP of their own let's suppose if you want tochange your location to somewhere else - Germany - UK or USA the VPN serviceprovider assign that IP of their own they own that particular IP the own thatlocation server and then once you you have been assigned the IP your datapacket hit the destinations server the destination server think that somewherefrom USA or the other location water visit our website now server thenrespond back and then the VPN services server handle these this process ofinformation so this is how the VPN machst your IP or this is how the VPNworks there are several drawbacks of the VPN as well and let's see okay is forany user VPN might be an easy setup since you just need to download your VPNapplication and installed install it on your device but it has the drawback ofbeing monitored by the VPN service providers as they allowto use their private servers in exchange for your data there have been caseswhere VPN service providers are monitoring the data from their users fortheir own benefits in that way your communication is not all private but bemonitored by VPN provider so this is the drawback of a VPN you will be you canhide hide your identity but the VPN server provider can monitor what you aredoing online what type of websites you are visiting what type of data you aretransferring so not completely anonymous at allnow we are moving towards the another amazing technology called tor, toralso called Onion Router is a it is a free and opensource software for enabling anonymous communication it is designed to stoppeople tracking your browsing habits including government agencies andcorporations the name Onion Router refers to the way that to protects yourdata by wrapping it into multiple layers of encryption like an onion so this isthe typical working of a tor tor browser if you install a tor browser then yourtor browser X as a tor client whenever you hit a particular IP or a particulardestination or your told browser it goes something like this the Green Line showsthe encrypted Tor network however the red dotted line shows the unencrypted orthe plain communication okay so the destination server does not know thesesend an IP or send a real location because every time whenever you visit aparticular web site every time tor assign you a new IP because here becausethe communication goes something like this there are several thousands ofservers available over the internet that are the part of the tor network and theact as an exit relay how it works it is just like simple tor browser routes allthe web traffic to the Tor network this is the typical Network and it makes itanother it makes is unable to to reveal your own identity as the image showstour consists of three layer proxy like layers of an onion at first Tor browserconnects at random to one of publicly listed and regards bounces thoughttraffic through our randomly selected middle relay but is it really beingselected randomly even this particular I said relay doesn't know about the middlerelay whenever at all our transfer information happen this middlerelational it being selected randomly and finally the traffic directed thatyou know the traffic through the third and final exit relay. So this ishow tor protects the privacy or ensure the anonymity of a user let's movefurther ok so this we have discussed this okay so let's discuss the drawbackof drawbacks of Tor your ISP the Internet service provider can see thatyou are using tor however the ISP cannot see the activities you are doing on Tornetwork but is still it the highest peak and raise an alarm situation or the ISPthink that you are doing something suspicious other another disadvantage ofusing lift or a client or tor browser is that or not all your traffic or not allyour communication is hidden for example only the websites or only the trafficonly the communication that you will do on the tor browser is encrypted by thetor network while other applications for example if you are using Skype or anyother software the data was not being the data will not be you knowcryptid using the Tor network because you have installed the tor client inorder to use the Tor network now we have WHONIX is one of my my favoriteand amazing amazing it is an amazing distribution Linux distribution based onDebian it is used to provide anonymity privacy and security on while browsingthe internet it consists of two main components first component is theconnects workstation it is actually the desktop machine that uses that has allthe textual applications for example web browser chatting softwares and etceteraetcetera etcetera while the second component of thisconnects system is onyx could get away this connects get way is the only wayfor honex workstation to communicate with the outside world through internetwe will see the concept in the working phenomena working structure of the wholeX both components in the whonix structure the whonix workstation and whonix geteway are the VirtualBox virtual machine appliances so as to run it on anyoperating system that has a VirtualBox for example this is the host machine youcan have Windows host machine the Linux host question Mac OS or whatever theoperating system you use but you need to install the whonixin a VirtualBox virtual setup at first the virtual the whonix workstation andGateway are configured for host machine workstation consists or as I said thatthe desktop application routes of all its traffic to the Gateway which isconnected to the workstation that is whonix gateway now Gateway is furtherconnected with the Tor network for accessing the internet connects gatewayis the only way for the workstation to transmit the information throughinternet because the workstation is an isolated machine andthere's no idea about its own host IP and configuration you can even see inthe picture that this network workstation is our typical isolated machineit does not know the actual IP of this host machine it can only communicate tothe Internet by using its own gateway that is connected with the Tor networkas you can see in the picture that all the traffic that goes through theGateway is torified however the host machine does not participate in the whonixprivate network and that is why it continues to use its normal internetconnection hence the traffic is nontorified it isit is a huge advantage of isolating the workstation from a network to keep an IPaddress private even if any application in a whonix workstation iscompromised it is almost impossible to reveal your IP address because it doesnot know your IP this is how the whonix works. it has two components workstation,gateway; workstation is the desktop that contains all the application it is anisolated machine this gateway is connected with the wok station get me isthe only way to access the Internet and it uses the Tor network has everythingbeing storified in the Horrocks power station probe X although conics providestransparency of your IP address it has unnoticeable disadvantage interms of physical security if your host machine is ever compromised all thestored personal information and your internet browsing activity could also bediscovered easily so this is the only disadvantage of using the tool or usingthe honex think that if someone get access to your PC your laptop your mainMac OS then these someone can see that you are using connects for whatever thepurpose now we are going to discuss tails tailsis another amazing concept and it is the life system based on the debian-basedLinux operating system with the aim to provide the anonymity and privacy ifyour goal is to leave no trace of your activity on MN the host machine then youshould use tails rather than honex you can start ill OS on almost any computerfrom a USB device or even a DVD tail cent is to tell tales just like UNIXalso uses the advantage of Tor network in order to communicate with theinternet however it leaves it leaves no trace on the system you are using sinceyou are you are using a live system that does not mean create the history doesnot even save any file or folder or anything life means it runs on a USBdevice all you have to do is to download the live operating system write it on aUSB and then just simply plug in into a machine into a laptop PC or Mac and thenare put it to use the life tails operating system that uses the Tornetwork in order to connect with the internet the portability of this tailsOS solve the major drawback of the UNIX operating system because it leaves notraces on the host machine at all so this is the typical working of the tailsand UNIX who's the winner the question is what do you think the best tool ortechnique in order to stay anonymous online well if you if you really want toachieve the complete anonymous status or anonymity online then of core tail isthe clear winner with all the advantages or the other technology however itdepends on your usage as well I would personally prefer honex if you do if youdon't have any risk in order to be caught physicallyobviously the have obviously the video this video is for educational purposeonly we don't recommend or we don't encourage you to use all you to involvein any illegal activity however yes it is you to judge the best platform orbest technology to stay anonymous I have compared all all for example the VPN thetor tor concept is amazing but using the Tor and client or tor browser only it'snot this complete solution you can use UNIX or tail in order to becomeanonymous online so this is it if the concept of the tools and techniques tobecome anonymous so if we have discussed the technique and the tools that can beused to be anonymous online and the next level we do you can see the link downbelow or above that I have practically shown you how to configure the honex andtails so see you in this video take care all right 


Popular posts from this blog

10 Highest paying jobs in Dubai

  10 Highest paying jobs in Dubai Money; information Hub  Hi everyone, welcome back to my new post. In this post, we are going to talk aboutthe top 10 high in demand jobs in dubai in 2021. But before we continue, let me tell you whymany people are migrating to Dubai UAE in search for greener pastures, before we talkabout the top 10 High in demand jobs in this great country. Working in the United Arab Emirates can bea great way to fast forward your career, paving the way for new opportunities and greaterresponsibility. Dubai in particular is becoming a global hubfor business and is already certainly the Middle East’s prime location for commerceand enterprise. Earnings are tax free in the UAE, meaningyou don’t need to pay for taxes. The weather in Dubai is favorable for living-Dubai enjoys an average of 342 sunny days every year, so you can plan a barbecue orpicnic without worrying about the weather. Dubai has a strong economy, Dubai’s currency,the Emirati Dirham (AED), has remained stab

Why Apple products is very expensive?

  Why Apple products is very expensive? Apple logo  We all know Apple is an American company and enjoys making a large chunk of their revenue domestically. But Apple sells their products in many international markets and even has retail stores in 24 foreign countries. Some of those 17markets, like Japan, have accessto Apple products at a price comparable to the US. For example an iPhone XS costs 112,800 yenin Japan, which is about 1,058 USD. And when you consider the country’s 8% salestax is included in that price, it actually makes the iPhone XS about $20 cheaper than in the US. Although this fluctuates depending on the conversion rate. But not every country is lucky enough to pay comparable prices for Apple products. To buy the base model iPhone XS, you’d haveto pay $1,235 in Mexico, $1,285 in India, $1,454 in Sweden, and $1,800 in Brazil. And these high prices have prompted customersto fly to the US just to buy a new iPhone. So why exactly are Apple products so expensivein these cou

What is DNA?

  What is DNA?    Deoxyribonucleic acid or DNA for short is the molecule that carries the genetic information in all living organisms In terms of structure, DNA's a polymer that's made of four sub-units known simply as A (adenine), C (cytosine), T (thymine), and G (guanine) Each of these sub-units has three main components: a unique nitrogenous base, a phosphate group, and a sugar They connect together through their phosphate groups to form these long polymer chains, which are the basis of DNA The order of the sub-units is extremely important and it's how the genetic information is stored It gets a little more complicated though because DNA isn't just one chain, it's actually two and they're held together by interactions between the nitrogenous bases This interaction is known as hydrogen bonding Where A likes to pair with T and C with G This hydrogen bonding along with various other intermolecular forces twists the DNA into its characteristic ladder-like structu