Changes between Version 85 and Version 86 of AnonymityModule


Ignore:
Timestamp:
Jul 6, 2011 2:40:14 PM (13 years ago)
Author:
jhudson
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • AnonymityModule

    v85 v86  
    77Throughout this exercise you will:
    88 * Learn about various forms of anonymity and be able to decide which is best to use according to personal and logistical constraints
    9  * Set up a web server in Linux
    10  * Set up a proxy server
    11  * Capture web traffic using tcpdump
    12  * Analyze that traffic using wireshark
     9 * Use DETER to do the following:
     10   * Set up a web server in Linux
     11   * Set up a proxy server
     12   * Capture web traffic using tcpdump
     13   * Analyze that traffic using wireshark
    1314
    1415Anonymity is important because it allows two users to communicate without fear of someone eavesdropping or figuring out their location.  When two systems communicate directly, it makes it easy for someone to figure out who is talking to who and what they are saying.  This is important because it can keep large companies and organizations from collecting your information. Anonymity tools can help them communicate more securely. There are a couple of types of tools that can be used for this.