Тёмный

Introduction to TOR 

Eli the Computer Guy
Подписаться 1,1 млн
Просмотров 319 тыс.
50% 1

For Classes, Class Notes and Blog Posts:
www.EliTheCompu...
Join the Conversation at Our Online Community:
ETCGNetwork.com
Visit the Vlog RU-vid Channel at:
/ elicomputerguylive
Follow us on Facebook at:
/ elicomputerguy
Follow us on Twitter at:
/ elicomputerguy

Опубликовано:

 

28 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 289   
@elithecomputerguy
@elithecomputerguy 11 лет назад
You are correct. Keyloggers/ malware can grab your info as you use your system, but the connection between you and the first relay is encrypted. I put in a correction annotation at the end of the video. Thanks for bringing this up. Cheers, Eli
@noname89636
@noname89636 7 лет назад
I am the lead IT administrator at my job....yeah me....and I still use RU-vid to keep me abreast on new tech stuff and to also keep up with the basics. I am so in charge of IT education, mainly making sure employees don't do anything stupid. A lot of them do not understand technical jargon and your videos show me different ways to explain things to the simple social media minds.
@noname89636
@noname89636 7 лет назад
You are also hot and it makes watching your videos even more enjoyable :)
@noname89636
@noname89636 7 лет назад
By the way I am a Marine Corps (female) Afghan vet. I got into the IT world back in 2010 when I got out and through a veteran hiring organization, went private contracting overseas and got to learn on the job.
@Flowshizzel
@Flowshizzel 10 лет назад
Thank you for this tutorial. I'm writing my Bachelor paper on this but I'm no computerwizz. As a communications major, this was really helpful!
@autohmae
@autohmae 5 лет назад
6:25 this would be wrong, traffic is encrypted all the way to the exit/end node. But people can see you are connected to the Tor network, this might already be a problem for many people. Also when using both Tor and HTTPS to the website you are visiting then everything is encrypted of course, even the last part from the Tor exit/end node to the website, because the website uses HTTPS.
@JDono64
@JDono64 11 лет назад
Cryptogon has a good article on the "exit node" aspect of TOR. Which was dev by grants from US Mil to help activists in cough cough undemocratic countries. The forward thinking of certain aspects of the scientific mil security internet development arena is truly remarkable.
@kelseydrew5685
@kelseydrew5685 8 лет назад
Thanks for this. I saw a documentary and was curious what this was. Super informative.
@TremendousSax
@TremendousSax 11 лет назад
With Tor your traffic does not go through between 3 and 10 relays each time. Rather, Tor always sends your data through three relays. Every 10 minutes (unless changed by the user explicitly) new circuits are chosen.
@kennydelapiedra1292
@kennydelapiedra1292 11 лет назад
You are such a great help Eli, thank you so much for sending this link to my email.. Keep up the good work man! Cheers!
@davidbayer7715
@davidbayer7715 10 лет назад
Appreciate the intro, Eli, but I'd like to send you a pair of handcuffs for future videos.
@polygeratic
@polygeratic 11 лет назад
Loved the intro Eli and thank you. Many threats to company's and individuals come from the deepnet How can we protect our systems?
@rehmsmeyer
@rehmsmeyer 9 лет назад
Psst., NSA... You here?\
@tdhfc
@tdhfc 9 лет назад
Yeah, hi !
@NYorkin
@NYorkin 9 лет назад
Everything you do on the deep/surface web will NEVER be deleted. Its simply a matter of time, resources and perseverance to restore that information and link it to the perpetrator. Every click you make, every button you type , everything showing up on the screen, is traceable. This is NOT being negative, its being knowledgeable. You can NEVER feel safe on the internet if you are breaking international or national laws. Breaking the law using Tor / Tails ALWAYS comes with a very real risk no matter what country you live in. Ignorance is no excuse to the law.
@NYorkin
@NYorkin 9 лет назад
If the content you are viewing is illegal in the country your are in, then you are taking a VERY big risk to get a knock on the door. Child pornography, for example, will send you straight to prison, when investigators prove that such content was viewed from your PC. You do not even have to "interact", or download or print it out etc. The clicks on your mouse leading to this content, can easily be reconstructed. Viewing this content can brand you for life and ruin your reputation - even if it was not you actually viewing it.
@PureAlbanianWarrior
@PureAlbanianWarrior 10 лет назад
Awesome video. Keep them coming. I'm watching all of them.
@gophop
@gophop 9 лет назад
A thing to realize: NSA has back doors to ISPs. They can often read your traffic between your computer and the ISPs gateway. They would know, if you're accessing the TOR network. Given the attraction of TOR to certain groups of people, where do you think the NSA and FBI do a bulk of their spying, on the popular sites of the web or the TOR network? The fact that someone uses TOR already puts them higher up in the list. Although, the clever ones would use several layers of obfuscation on top of TOR.
@elithecomputerguy
@elithecomputerguy 11 лет назад
that will be discussed in my next video...
@mrliberty1776ma
@mrliberty1776ma 11 лет назад
But Eli what happens if someone that is a suspected terrorist is connected to your server and the DHS comes to your house breaking the door down at 2 AM while you and your family are sleeping and then THEY hold you on trumped up BS charges and detain you for a " Indefinite " amount of time only because a suspect was connect to you through the internet???
@chrishynes1503
@chrishynes1503 8 лет назад
How is everyone not tracked when they download the tor browser from the surface web? You would think nsa, etc would just install bits of software into anyone's computer who downloads tor from www.torproject.org and monitor the people that download the tor browser.
@PennsylvaniaEAS
@PennsylvaniaEAS 4 года назад
They would have to make that data for Linux Mac and windows , tor can be installed on all of them
@varun009
@varun009 10 лет назад
Is there a mechanism by which you can send two signals out. One that goes to the site intended while the other bounces off a false relay through you and back along the original path so that if they manage to track through the relays they go in circles?
@banedostanic
@banedostanic 10 лет назад
TOR - The Onion Router Not as safe as we think...everything is trackable and crackable more or less. Ask NSA :)
@paismonster
@paismonster 10 лет назад
so there is no way to anonymously communicate?
@banedostanic
@banedostanic 10 лет назад
If we are talking about NSA and other intelligent agencies etc. I believe EVERYTHING is being monitored my them. Privacy doesn't exist anymore. What I've learned is that Security is very important but very relative as well. Cheers :)
@RichardTakeshita
@RichardTakeshita 10 лет назад
How the fuck do you know?
@banedostanic
@banedostanic 10 лет назад
***** Is that even a browser? :) Don't give me wrong, TOR is great! I just believe that 100% security doesn't exist. Cheers
@Spills51
@Spills51 6 лет назад
People who don't know what they are doing get caught. Nothing more.
@astropicop.6543
@astropicop.6543 11 лет назад
Hi Eli, this is your second video I am watching today. So far, I find them good, thank you for your sharing. I have few questions for you though : -Check your video at 06:06, you are saying that encryption is only done during communication within the relays. When I checked back to the Tor project website, I could see that connections are encrypted from the first node ( your computer ) to the last relay. Am I wrong ?
@timb.955
@timb.955 6 лет назад
That's some really cool information. Thank you!
@oluwafemmyemman777
@oluwafemmyemman777 11 лет назад
Thanks alot Your videos are very good materials for the 70-410 exam however can you please start on the 70-411 and 70-412 materials as well please. That would be really cool. Thank you very much
@Brainbuster
@Brainbuster 10 лет назад
Anybody know what video he mentioned "s" in? I've been puzzled about this concept lately...how an image or video can leak private data.
@sabymondal
@sabymondal 10 лет назад
Amazing- both Tor and Eli !
@MajorEasley
@MajorEasley 8 лет назад
Amazing Class Thank you. basically what I gather is. You have nothing to hide why bother with Tor!!
@yaseenevo
@yaseenevo 7 лет назад
thank you very much Eli, I love your videos.
@Bulletproof9767
@Bulletproof9767 11 лет назад
Is TOR similar to a VPN?
@derAiTiLer
@derAiTiLer 11 лет назад
Good Video. I just used the Tor Bundle many times on a School Network in the past. But they had a really good Administrator and he found a way to block der Tor Connection. Even the bridges won´t work. ;) It was a nice cat and mouse game but finally he won :D Oh besides.... here in Germany you may get in trouble if you run a tor relay node. So if you install that pice of Software to let others run their tor connection trough your own private relay. Greetz
@astropicop.6543
@astropicop.6543 11 лет назад
What are you looking for exactly ? Anonymity ?
@Sandimanist
@Sandimanist 10 лет назад
There is something I wonder about The relays you go through. He said the encryption does not work from you to the first relay and from the last relay you came from to the server, but the rest of the line is encrypted.How can they still find you?
@YuvalCoder
@YuvalCoder 11 лет назад
may i suggest you to create reverse engineering tutorial, and introduction ? its very nice subject, have a great day
@willowklan
@willowklan 8 лет назад
I thought only the exit node is not encrypted, cuz according to security knows-it-all the traffic from you to the entry node is AES encrypted. right from the start (tor bundle). is this true?
@finalman26thabullz53
@finalman26thabullz53 6 лет назад
Which one should i download to get past a ban on chat ave??? Will somebody help me pls...??
@yiuwahlee
@yiuwahlee 8 лет назад
@Eli Tor only support its web browser or not. If yes, how can I hide/mass my public IP on my gateway for any applications?
@kavatava8576
@kavatava8576 8 лет назад
and what if I am looking for very underground, rare music? I already use some p2p apps for that like Soulseek and DC++, but there are still artists and demos that i cannot buy or download. I'm guessing if I can't find this music on google and some site designed for sharing music and p2p apps, having Tor won't help me in this search?
@TremendousSax
@TremendousSax 11 лет назад
It started as a research project at the Naval Research Labs, but it's now maintained by the Tor foundation, a non-profit. You can go and read the code if you want to audit it and determine if a backdoor is there. Also, after you do so you can compile your own Tor browser or Tor daemon or write your own. Futher, the Internet started as a research project by the military, funded by ARPA. So how "safe" is it really? By your logic we should avoid it altogether. Don't judge Tor by its origins.
@Roosyer
@Roosyer 11 лет назад
That is a very healthy and nicely trimmed beard
@A1A334
@A1A334 8 лет назад
I get ya, but all I want to do is download torrents, what is a good one to use on my mac
@99baking
@99baking 8 лет назад
Just download it, the cops aren't going to fucking storm your house because you downloaded some illegal music. Don't use tor to torrent. Ever.
@abrahamdetrinidad8984
@abrahamdetrinidad8984 8 лет назад
why not use tor?
@badcopnodonut607
@badcopnodonut607 6 лет назад
I just listened to your video where you scoffed at being anonymous....?
@derpynation1448
@derpynation1448 11 лет назад
If you install Tor on a VM does that change amount of anonymity you have?
@astropicop.6543
@astropicop.6543 11 лет назад
A VPN might be fast, but does it do all what Tor is doing ? :)
@Sphenique
@Sphenique 11 лет назад
You're a King!
@Tsunami3323_
@Tsunami3323_ 10 лет назад
hey Dude my name is Eli too and i loved your video and explanation. keep up the good work . cheers mate
@NerdFromDenmark
@NerdFromDenmark 10 лет назад
EliTheOtherGuy :D
@Tsunami3323_
@Tsunami3323_ 10 лет назад
NerdFromDenmark i see what you did there :D that was good
@NerdFromDenmark
@NerdFromDenmark 10 лет назад
Eli Alvarado Thank you, :D
@Tsunami3323_
@Tsunami3323_ 10 лет назад
NerdFromDenmark Best regards From Mexico my Friend
@NerdFromDenmark
@NerdFromDenmark 10 лет назад
Eli Alvarado Wish you the best from Denmark! :D
@WayneMickel
@WayneMickel 7 лет назад
Can you explain how to sign up for Tor's Blackbook alternative to Facebook
@mrliberty1776ma
@mrliberty1776ma 11 лет назад
I'm FAR from being worried about Myself though I am a bit more worried about Eli Not protecting himself Even though he has done NOTHING wrong!!!
@jumbo3046
@jumbo3046 9 лет назад
sir!! how come the firewall let's the encrypted traffic through, as every computer person knows about bypassing security as it is available on the internet, the firewall designers coded the firewall and allowed the encrypted traffic??
@ravenlunatic7909
@ravenlunatic7909 8 лет назад
thanks,when i down loaded tor,it highly recommended still using a ip hider,do i need it? i'm not doing anything violent or anything,yeah,mabey just check out some herb sites or whatever,do i still need another proxy switchysharp ext.like that? thanks.
@astropicop.6543
@astropicop.6543 11 лет назад
what would you trust then ?
@depthoffield4744
@depthoffield4744 9 лет назад
In Syria, users lives depend on Tor, some individuals where chopped to pieces because of questionable Internet activities.
@harshavardhan306
@harshavardhan306 8 лет назад
but if CNN knows the IP of the last node can't they trace back the previous nodes IP and continue to do so until they figure out the source...?
@nosibalasi3345
@nosibalasi3345 8 лет назад
Can TOR and Psiphon be used on android phone simultaneously? ?
@Mr16faces
@Mr16faces 10 лет назад
quick question, i was running chrome with facebook open and tor, is there a way to identify me?
@Alberturkey54
@Alberturkey54 8 лет назад
how do I get around school network security in order to access blocked sites? Will a simple proxy do that?
@gamingkin4278
@gamingkin4278 7 лет назад
use netsurf you can put the .exe on a school server, put it on a usb, dropbox, etc.
@Alberturkey54
@Alberturkey54 7 лет назад
GamingKin cool thanks
@iconoclasticat
@iconoclasticat 7 лет назад
I"m brand new to Tor. The title says 'Introduction to Tor'. This guy is all over the place. Sure, I'll figure it all out, but when you're making an 'Introduction' video, you mght want to take some notes before you turn on the camera, so you have some sense of continuity. He should have started with the downloading of the browser and gone from there. He might also try to learn to talk without using his hands.
@elithecomputerguy
@elithecomputerguy 7 лет назад
... ... I'm telling you man.. these idiots giving away free education really need to be put in their place... get the hell off of RU-vid is what I say to them... and imagine using his hands as a part of his communication... just horrible... failing RU-vid Channel is what I say... you better unsub and run away now...
@peopleoftherepublicofcheez9627
@peopleoftherepublicofcheez9627 10 лет назад
love how none of these vids give download links to tor! i don't blame u!
@wigzenga
@wigzenga 10 лет назад
Am I right to think Tor would be virtually impossible to track on a quantum computer? Because it would be able to reroute the connection many times in a small amount of time?
@seotools3699
@seotools3699 10 лет назад
Get your best AutoHide IP tool on ebay www.ebay.com/itm/331043261530?ssPageName=STRK:MESELX:IT&_trksid=p3984.m1555.l2649
@Sam-vk8nx
@Sam-vk8nx 8 лет назад
Eli can use Tor legally in US?
@ifeanyichukwuudochu8435
@ifeanyichukwuudochu8435 11 лет назад
Hi Eli, please i need ur help. i set admin password on my laptop BIOS setup and cant remember it. I have opened my laptop, removed the CMOS batttery but it did not help the situation. i need to format my laptop very urgently. When i opened my laptop i was hoping to find a BIOS password rest jumper, but i did not find one. My laptop specifications: Dell latitude inspiron N3050 64-bit, 4gb ram, 500 hdd, running win 7 ultimate. please help me out.
@MICBeatboxer
@MICBeatboxer 8 лет назад
Is there a way to change the fact that it changes routes every 10 minutes ?
@bensialiabdellah1427
@bensialiabdellah1427 8 лет назад
+Erik Jönsson how?
@hackbot4450
@hackbot4450 9 лет назад
can the isp see the sites i am visiting if i use tor
@dtheundertale3799
@dtheundertale3799 7 лет назад
With Tor you are leaving the world and entering the heaven of safety on the net.
@KingAwesomeWind
@KingAwesomeWind 11 лет назад
Nice video. Though, I knew about TOR before.
@EpicDoesStuff0
@EpicDoesStuff0 9 лет назад
Two questions: Is it safe to log into any accounts, such as Facebook, Twitter, ect? And if so, if you post something, is it traceable with your standard IP or another IP you're using on Tor?
@171TITO
@171TITO 9 лет назад
***** I've never been on fakebook. 😆
@SuperMetallimies
@SuperMetallimies 9 лет назад
HaileyDoesStuff Never go to twitter in dark web, its a child porn site.
@AbelinNyjiraaY4Y69
@AbelinNyjiraaY4Y69 9 лет назад
HaileyDoesStuff Very unsafe to log into ANYTHING via Tor. It's an easy way to give away your information and anonymity. Most people recommend using separate proxies and a lot of times even a separate computer with none of your personal things for surfing Tor. Even with all of this if you, for whatever reason, want to make an account on a Tor website or an email of some sort DO NOT use your personal email and NEVER use personal information about yourself in your usernames or passwords.
@VANSmallhousen
@VANSmallhousen 9 лет назад
Just don't look under your bed
@EmilJelecevic
@EmilJelecevic 9 лет назад
Abelin Nyjiraa if i hard rest my old personal laptop is it ok to use coz there used to be shit on there before
@juliandias4982
@juliandias4982 8 лет назад
@Eli the Computer Guy is there any way i can email you i have some questions for you plzzzzzz
@ksutkowski
@ksutkowski 9 лет назад
Is it safer to run or more secure to run tor in a virtual machine?
@gingerflakes101
@gingerflakes101 9 лет назад
KSUTKOWSKI - Visual FX and Digital Production Use Tails
@gingerflakes101
@gingerflakes101 9 лет назад
KSUTKOWSKI - Visual FX and Digital Production Use Tails
@EncouragementTherapy
@EncouragementTherapy 11 лет назад
Awesome great context thanks!!
@TheNameTooSexyToShow
@TheNameTooSexyToShow 8 лет назад
What is the Dark Web used for? Or good for? (I really don't know, sorry, I want to learn)
@MrPokesmot32
@MrPokesmot32 8 лет назад
I've heard some screwed up things
@TheNameTooSexyToShow
@TheNameTooSexyToShow 8 лет назад
Ancalagon Ullr I've installed Tor and looked around. Almost vomited and deleted it.
@ESamperT
@ESamperT 8 лет назад
I've always wondered if non of these intelligence agencies haven't really come out with any software which neutralizes tor's activities and finds out what your IP address really is?
@jeezybling150
@jeezybling150 11 лет назад
Do they hav tor 4 mobile
@heinzie5
@heinzie5 11 лет назад
i went on tor, had one look at the front page of that wikipedia like site, decided it would be best to definitely not click on anything whatsoever. closed tor. my entire darknet experience in a nutshell.
@sherekaan5048
@sherekaan5048 5 лет назад
Is this Torguard VPN?
@kasper7867
@kasper7867 8 лет назад
thenks al lot
@Dave-md3sj
@Dave-md3sj 8 лет назад
Does this mean that your internet provider and employer cant see your browsing history??
@Apollo_1641
@Apollo_1641 7 лет назад
ComboGaming use vpn for that
@sivejdlamini6087
@sivejdlamini6087 9 лет назад
so everyone that watched this video is a potential treat...hahaha..
@mm-wv6jk
@mm-wv6jk 7 лет назад
I've heard you can steal money from Bank accounts and do other illegal stuff
@minimi.gaming1209
@minimi.gaming1209 9 лет назад
some one told me that if you download tor then you is on a list that fbi can see, is that true, (excuse my english.)
@GrOuNdZeRo7777
@GrOuNdZeRo7777 10 лет назад
I wouldn't worry about the NSA as much as I would about the FBI, DEA or the ATF while surfing these sites, Does software like Peerblock mitigate the risks involved with the 'Dark Net'?
@CandidateRaymond
@CandidateRaymond 10 лет назад
lol dude, NSA works the internet, feeds the intelligence to those other agencies.
@GrOuNdZeRo7777
@GrOuNdZeRo7777 10 лет назад
Why? Policing is not their job, That's the FBI.
@GrOuNdZeRo7777
@GrOuNdZeRo7777 10 лет назад
Haha! Nothing like a government agency where fapping wasn't such a great temptation during routine work! ;)
@GrOuNdZeRo7777
@GrOuNdZeRo7777 10 лет назад
I thought many companies and government agencies that do most harm to Peer 2 Peer and in this case the Dark Web have fixed IPs? But I guess you are right unfortunately...
@okekeniadikpe3866
@okekeniadikpe3866 2 года назад
Nice
@finalcutfinalcut
@finalcutfinalcut 10 лет назад
how to lock tor pfsense or squid
@damiencallaghan9389
@damiencallaghan9389 5 лет назад
What is this Interweb stuff this dude keeps banging on about???
@9milNL
@9milNL 11 лет назад
Since it is invented by the US naval research lab makes me not trust Tor at all, when considering the whole NSA prism stuff..
@wfpnknw32
@wfpnknw32 9 лет назад
i guess it's not so much about being totally safe from nation states if they're actively looking for you but just making it enough of a pain they wont do it by default.
@timwilliams5021
@timwilliams5021 9 лет назад
Where can I download tor safely?
@elanadeshina7521
@elanadeshina7521 9 лет назад
Just look it up and download it.
@patrickdunn7804
@patrickdunn7804 9 лет назад
+Tim Williams torproject.org is the official developer's site to download it.
@omgwtfbbqalekx
@omgwtfbbqalekx 11 лет назад
MSE is overrated. I did a "Stress test" on my old pentium 4. I loaded the box with plenty of trojans, worms, spyware, malware and scanned the box one by one with different anti-virus products. Nod32 came out on top with the most catches.
@paske2001
@paske2001 11 лет назад
I guess I can use it to post infamous things about judges in Brazil..........
@MuhammadMirza58
@MuhammadMirza58 3 года назад
Brah i wish yu were my computer teacher.
@shortcutDJ
@shortcutDJ 11 лет назад
it was built by dev's like Jacob Appelbaum he is an insane good hacker
@davidfigueroa8335
@davidfigueroa8335 10 лет назад
Tor is not safe anymore...
@ditjedatje9741
@ditjedatje9741 9 лет назад
Devad Davad False. Just something that was said to discourage people to use it.
@davidfigueroa8335
@davidfigueroa8335 9 лет назад
Ditje Datje I went to a cybercafe and used Tor I dont think they are lying, and i dont know how can the whole deep web communitie,and is safer to use Tail if you get breach the virtual machine will be affected not your physical machine..
@Natural3621
@Natural3621 7 лет назад
Its possible to hack Tor network Swedish hacker Dan Egrstad hacker did that.
6 лет назад
they dont want you to use it. because it work
@marecoolshit
@marecoolshit 5 лет назад
nothing not safe
@kallel5155
@kallel5155 6 лет назад
Watch your hand gestures man
@astropicop.6543
@astropicop.6543 11 лет назад
Instead of asking in here, why didn`t you ask google. The answer for your question is Yes.
@domnichols3892
@domnichols3892 9 лет назад
how do u use tor without the tor browser?
@Augsterful
@Augsterful 9 лет назад
DOMO NIK lmao are you serious?
@michealmyers3293
@michealmyers3293 11 лет назад
The NSA, FBI, and more are hosting Exit Nodes, which is bad for anonymity on so many levels.
@atlasshrugged2u
@atlasshrugged2u 11 лет назад
Really great video, thanks so much Eli I don't think I want to go to the darkweb after all but it's good to know what it is and how to use it if necessary :)
@kasper7867
@kasper7867 8 лет назад
if you wanna fight astrid joe better watch out of mij knuckle he is so sharp en puntig
@lurchaddams3601
@lurchaddams3601 9 лет назад
I hear you can brows the North Korean internet through Tor
@MADDMOODY516
@MADDMOODY516 8 лет назад
+Lurch Addams +Andrew Meyer i have a feeling my mother is monitering what sites i go on somehow since i'm on her router/modem, is this possible? Also can tor block this?
@DontFuckWitDreDay
@DontFuckWitDreDay 10 лет назад
Regardless, though, thank you for protecting people on youtube from the NSA
@RB130235
@RB130235 11 лет назад
Dark black web next please eli computer god
@arthvader3489
@arthvader3489 7 лет назад
oh cool back when he wasnt angry
@nufsed1901
@nufsed1901 10 лет назад
Hem makes it sound like the .onion site are hosted by tor and that is very wring, tor just makes them accsesible it does not all of them, that is just very wrong.
@MrAdrianaangel
@MrAdrianaangel 8 лет назад
Using Tor is the only way you can practice Freedom of Religion in America. Isn't that right, boys? :)
@Aly_Fahmy
@Aly_Fahmy 7 лет назад
in anywhere really
@Ultra_plays_Ultron
@Ultra_plays_Ultron 8 лет назад
and BITCOIN NOW
Далее
TOR Security Concerns and Considerations
29:13
Просмотров 187 тыс.
Introduction to Cloud Computing
1:16:50
Просмотров 1,4 млн
Understanding Switches
58:10
Просмотров 1,4 млн
How To Access The Dark Web (Using Tor)
11:29
Просмотров 766 тыс.
How To Secure and Anonymize Your Online Activity
25:10
Просмотров 466 тыс.
Introduction to Voice Over IP
1:01:21
Просмотров 1,5 млн
Introduction to Servers
53:41
Просмотров 1,4 млн
Birth of BASIC
38:13
Просмотров 1,2 млн
Incredible Dangers in Browsers (Affects all of them)
21:02
Network Mapping
51:20
Просмотров 497 тыс.
The Ultimate Guide to Using Tor Browser Securely
10:17