TheArthist Posted January 16, 2013 Report Posted January 16, 2013 (edited) Hi all,This is a tutorial for anon web surfing! NOTE: this is the tutorial I found on the internet and I'm posting it unedited, exactly as I found it. It's possible that you need to make some modifications in order for this to work. Here it goes:How to secure your computer and surf fully anonymous!This is a guide with which even a total noob can get high class security for his system andcomplete anonymity online. But its not only for noobs, it contains a lot of tips most people willfind pretty helpfull. It is explained so detailed even the biggest noobs can do it^^ :=== The Ultimate Guide for Anonymous and Secure Internet Usage v1.0.1 ===Table of Contents:1. Obtaining Tor Browser2. Using and Testing Tor Browser for the first time3. Securing Your Hard Drive4. Setting up TrueCrypt, Encrypted Hidden Volumes5. Testing TrueCrypt Volumes6. Securing your Hard Disk7. Temporarily Securing Your Disk, Shredding Free Space8. Installing VirtualBox9. Installing a Firewall10. Firewall Configuration11. Installing Ubuntu12. Ubuntu Initial Setup13. Installing Guest Additions14. Installing IRC (Optional)15. Installing Torchat (Optional)16. Creating TOR-Only Internet Environment17. General Daily UsageBy the time you are finished reading and implementing this guide, you will be able to securelyand anonymously browse any website and to do so anonymously. No one not even your ISP or agovernment agent will be able to see what you are doing online. If privacy and anonymity isimportant to you, then you owe it to yourself to follow the instructions that are presented here.In order to prepare this guide for you, I have used a computer that is running Windows Vista.This guide will work equally well for other versions of Windows. If you use a different operatingsystem, you may need to have someone fluent in that operating system guide you through thisprocess. However, most parts of the process are easily duplicated in other operating systems.I have written this guide to be as newbie friendly as possible. Every step is fully detailed andexplained. I have tried to keep instructions explicit as possible. This way, so long as youpatiently follow each step, you will be just fine.In this guide from time to time you will be instructed to go to certain URLs to download files.You do NOT need TOR to get these files, and using TOR (while possible) will make thesedownloads very slow.This guide may appear overwhelming. Every single step is explained thoroughly and it is just amatter of following along until you are done. Once you are finished, you will have a very securesetup and it will be well worth the effort. Even though the guide appears huge, this wholeprocess should take at the most a few hours. You can finish it in phases over the course ofseveral days.It is highly recommended that you close *ALL* applications running on your computer beforestarting.=== 1 : Obtaining Tor Browser ===The first step to becoming secure and anonymous online is to setup and install something called"TOR". "TOR" is short for"The Onion Router". The concepts behind TOR were firstimplemented by the United States Military, and these principles have been used to create anextremely secure mechanism for being anonymous online. In fact, millions of people world-wideuse TOR to browse the internet and communicate anonymously.TOR works by heavily encrypting your communications so that no observer can see whatwebsite you are really going to, and what information is really being sent. It all appears as abunch of random characters to any observer. You simply use the TOR web browser just as youuse any other web browser. TOR takes care of the rest.However, TOR by itself is not enough. Even when using TOR, a user can be compromised in anumber of ways. First, some websites can be set up to attempt to reveal someone's true IPaddress (their true identity) by tricking their web browser or other software to transmitting thatinformation. For this reason, anyone who uses TOR will recommend that no one have javascriptor flash turned on while browsing TOR. In this guide however, I will show you a much bettersolution.The second issue is that of human error. Even if you have TOR installed, you may accidentallyforget which browser to put in a link. You may also accidentally click on a link from anotherprogram, such as a chat program. That program might then load the link you clicked on into anon-TOR browser. When you are using TOR, you must be careful *constantly* that every linkgoes into the right browser, and that you do not accidentally click the wrong link.So then, let's begin. Obtaining the TOR Browser is easy. Simply go to the following website:http://www.torproject.orgOnce here, you may feel free to read more about what TOR is and how it works, or you mayproceed to immediately download TOR.Here is how to do so:1. Click on "Download TOR", or "Download".2. You will see text that says, "The Tor Browser Bundle contains everything you ned ... Justextract it and run. Learn more >>3. Click on this "Learn more" link. for the "Tor Browser Bundle"4. Assuming you are an English speaker, you would choose the top-most link "English (en-US)".Otherwise, pick the languagebest suited to you.5. The file being saved will be named: tor-browser-1.3.18_en-US.exeIt is ok if the number is not exactly 1.3.18, there are new versions of Tor from time to time. Atthe time that this guide was written, 1.3.18 was most current. By the time you are reading this, amore current version of TOR may exist.6. Run this file.7. You will be prompted to extract this to a directory. By default, it will be set toC:\Users\You\Downloads\ This is perfectlyok. You can also choose a different directory if you wish.8. Click "Extract"That's it. TOR Browser is NOW installed. Time to test it out!=== 2 : Using and Testing Tor Browser for the first time ===Now you have successfully downloaded and installed the Tor Web Browser Bundle. You are nodoubt anxious to begin using it. First, click on the "start" menu icon, the icon in the lower left ofyour screen with the windows logo. On the top right will be a listing that says "You","Documents", "Pictures", "Music"... "You" of course will be replaced by your user name. Clickon "You", the top most link. This will open up your main user folder.Now, locate the folder called "Downloads" and double click on it.Now, inside the "Downloads" folder, double click on the folder called "Tor Browser".Lastly, double click on the application: "Start Tor Browser"When you do, you will see the Vidalia Control Panel appear, and you will observe as youconnect to the TOR network. When this is complete, your web browser will open up and willautomatically connect to the web address: check.torproject.orgThis is to confirm that you are in fact using TOR. If you have followed this guide correctly, thenyou will see the following green text, or something similar:"Congratulations. Your browser is configured to use Tor."Now you can use this web browser the same as any other. You can go to any website you wish,and neither your ISP or anyone else will be able to see where you are going, or what you aredoing. However, there are still issues that need to be resolved, so don't begin browsing just yet.******************************************** IMPORTANT SAFETY NOTE ********************************************If you fill out a form containing your email address, your name, or any other sensitiveinformation while using the TOR browser, be aware that sometimes it is possible for an observerto see that information. When using TOR, use it to access websites and content that you are*not* connected to via your real identity or any username or nick name which links to your realidentity. Let TOR be for anonymous browsing solely. Do your online banking, or any otheractivities involving your real identity using your normal web browser.************************************=== 3 : Securing Your Hard Drive ===Being able to browse anonymously is one thing. However, you may choose to download andsave sensitive content or material to your computer which you wish to keep private. This mayinclude reading sensitive documents, viewing pictures, or storing any kind of sensitive data.If you save *anything* to your computer's harddrive, then it is possible for someone who hasconfiscated your computer to determine what it was you saved. This is often true even if youdelete the content. For example, suppose I use the Tor Browser and I navigate to a websitecontaining a sensitive document that I wish to read. If I saved that document somewhere on myharddrive, then it is possible for someone else to find it. If I *delete* that document, it may stillbe possible for someone to undelete it.Further, even if I never save it to my harddrive but I simply look at it using my word processingsoftware, it may still be saved in a number of ways including:1. Often programs keep records of filenames. The filename alone is often enough to incriminatesomeone.2. Often programs keep parts of the content viewed saved for various reasons, such as forsearching. This can include random excerpts of text, thumbnails of images, and more. Often this"partial" data is more than enough to prove what the original data was. Often the "partial" data isitself incriminating.3. Sometimes, especially if you are running low on system memory, your operating system maychoose to use your hard-disk as a temporary RAM. This is known as "SWAP". Normally,whenever you turn off your computer, whatever was in RAM is deleted. However, the data thatgoes to your SWAP may persist and it may be possible for someone to see what content you hadopen in your programs if that informationis saved in RAM.Generally speaking, you *must* have a plan to secure any content that is saved to your hard disk.Therefore, this guide would be incomplete if we did not thoroughly address this. First, there aretwo kinds of such content:1. Deliberately saved content.2. Inadvertently saved content.Deliberately saved content refers to content that you have chosen to save on your harddisk sothat you can access this content later. We will address how to do this later in the guide.Inadvertently saved content refers to content that is saved by programs you use, or youroperating system. You have no way to even know what this content might be. Therefore, this isthe most dangerous. You may browse and find a dozen sensitive documents, utterly delete them,and some program may have saved the file names and excerpts of the data. This will render yourprevious efforts futile.Content that is inadvertently saved to your harddisk comes in two flavors:1. Content that is saved to your SWAP space.2. Content that is saved by applications running on your computer, including your operatingsystem.The surest way to prevent content from writing to your SWAP space is to disable your SWAPspace altogether. This may result in your computer running a bit slower than normal, and maymean that you cannot use ram intensive games and applications during the time your SWAP isdisabled.Therefore, if you use this method, simply turn back on the SWAP when you want to use thoseram intensive applications. Also, you may choose not to take this step.Here is how to disable your swap space if you are using Windows 7:*** ADVANCED INSTRUCTIONS BELOW. SKIP THIS IF YOU ARE NOVICE OR UNCOMFORTABLE WITH THISOPERATION ****This step is recommended for advanced users only. If you are not comfortable doing this, you maysafely skip this step.*Instructions are less verbose than usual, as these steps are intended for advanced users only. If you donot fully understand these instructions, skip this step.1. From Control Panel, go to "System and Security".2. Click on "System", and then choose "Advanced system settings" in the left-most menu.3. Under the "Advanced" tab, under "Performance", click "Settings".4. Under this "Advanced" tab, under "Virtual Memory", click "Change"5. Uncheck "Automatically manage paging file sizes for all drives"6. Select "No paging file"7. Save, reboot, and follow these same first 5 steps to confirm that "No paging file" is still selected. Thismeans that you have successfully disabled your swap. This means that *nothing* from RAM will beinadvertently saved to your harddrive.To resume using SWAP again, simply click "Automatically manage paging file size for all drives." You canswitch between these two modes as you desire.Generally speaking, your computer will run fine without a swap file, provided you have enough RAM.*** END OF ADVANCED INSTRUCTIONS ***The next issue we need to address is how to prevent applications and/or your operating system fromsaving content inadvertently that you do not want saved. For this, we are going to set up a "VirtualMachine".A "Virtual Machine" is like a computer inside of your computer. Everything you do inside the VirtualMachine (vm for short) will be fully contained within itself and no one will be able to see what the vmhas been doing. Ideally, you want *ALL* of your sensitive computer usage of any kind, TOR or NON TOR,to take place within a vm. In this way, you can keep everything private that you wish while still usingyour computer fully and getting the most out of it.Don't be afraid of this sounds complicated. This guide will take you through every step slowly andmethodically. Before we can set up a vm however, we need to take another step.=== 4 : Setting up TrueCrypt, Encrypted Hidden Volumes ===If you save anything on your computer, it is likely that you do not want just anyone to be able to seewhat you have saved. You want a way to protect that information so that you can access it, andabsolutely no one else except those you trust. Therefore, it makes sense to set up a system whichprotects your information and safeguards it against prying eyes.The best such system for this is called "True Crypt". "True Crypt" is an encryption software programwhich allows you to store many files and directories inside of a single file on your harddrive. Further, thisfile is encrypted and no one can actually see what you have saved there unless they know yourpassword.This sounds extremely high tech, but it is actually very easy to set up. We are going to do so, right now:1. Go to TrueCrypt - Free Open-Source On-The-Fly Disk Encryption Software for Windows 7/Vista/XP, Mac OS X and Linux - Downloads (or go to TrueCrypt - Free Open-Source On-The-Fly Disk Encryption Software for Windows 7/Vista/XP, Mac OS X and Linux, and click on "Downloads")2. Under "Latest Stable Version", under "Windows 7/Vista/XP/2000", click "Download"3. The file will be called "True Crypt Setup 7.0a.exe" or something similar. Run this file.4. If prompted that a program needs your permission to continue, click "Continue".5. Check "I accept and agree to be bound by these license terms"6. Click "Accept"7. Ensure that "Install" is selected, and click "Next"8. click "Install"9. You will see a dialog stating "TrueCrypt has been successfully installed." Click "Ok"10. Click "No" when asked if you wish to view the tutorial/user's guide.11. Click "Finish"At this point, TrueCrypt is now installed. Now we will set up truecrypt so that we can begin using it tostore sensitive information.1. Click the "Windows Logo"/"Start" button on the lower left corner of your screen.2. Click "All Programs"3. Click "TrueCrypt"4. Click the "TrueCrypt" applicationAnd now we can begin:1. click the button "Create Volume"2. Ensuring that "Create an encrypted file container" is selected, click "Next"3. Select "Hidden TrueCrypt volume" and click "Next".4. Ensuring that "Normal mode" is selected, click "Next"5. Click on "Select File"Note which directory you are in on your computer. Look at the top of the dialog that has opened andyou will see the path you are in, most likely the home directory for your username. An input box isprovided with a flashing cursor asking you to type in a file name. Here, you will type in the followingfilename:random.txtYou may of course replace random.txt with anything you like. This file is going to be created and will beused to store many other files inside.Do NOT use a filename for a file that already exists. The idea here is that you are creating an entirelynew file.It is also recommended though not required that you "hide" this file somewhere less obvious. If it is inyour home directory, then someone who has access to your computer may find it easier. You can alsochoose to put this file on any other media, it doesn't have to be your hard disk. You couldfor example save your truecrypt file to a usb flash drive, an sd card, or some other media. It is up to you.6. Once you have typed in the file name, click "Save"7. Make sure "Never save history" is checked.8. Click "Next"9. On the "Outer Volume" screen, click "Next" again.10. The default Encryption Algorithm and Hash Algorithm are fine. Click "Next"11. Choose a file size.In order to benefit the most from this guide, you should have at least 10 gigabytes of free disk space. Ifnot, then it is worth it for you to purchase some form of media (such as a removable harddrive, a largesd card, etc.) in order to proceed. TrueCrypt can be used on all forms of digital media not just your harddisk. If you choose to proceed without obtaining at least ten gigabytes of disk space, then select a sizethat you are comfortable with (such as 100 MB).Ideally, you want to choose enough space to work with. I recommend 20 GB at least. Remember that ifyou do need more space later, you can always create additional TrueCrypt volumes using exactly thesesame steps.12. Now you are prompted for a password. THIS IS VERY IMPORTANT. READ THIS CAREFULLY*** READ THIS SECTION CAREFULLY ****** The password you choose here is a decoy password. That means, this is the password you wouldgive to someone under duress. Suppose that someone suspects*** that you were accessing sensitive information and they threaten to beat you or worse if you do notreveal the password. THIS is the password that you*** give to them. When you give someone this password, it will be nearly impossible for them to provethat it is not the RIGHT password. Further, they cannot*** even know that there is a second password.Here are some tips for your password:A. Choose a password you will NEVER forget. It may be ten years from now that you need it. Make itsimple, like your birthday repeated three times.B. Make sure it seems reasonable, that it appears to be a real password. If the password is somethingstupid like "123" then they may not believe you.C. Remember that this is a password that you would give to someone if forced. It is *NOT* your actualpassword.D. Do not make this password too similar to what you plan to really use. You do not want someone toguess your main password from this one.And with all of this in mind, choose your password. When you have typed it in twice, click "Next".13. "Large Files", here you are asked whether or not you plan to store files larger than 4 GIGABYTES.Choose "No" and click "Next"14. "Outer Volume Format", here you will notice some random numbers and letters next to where itsays "Random Pool". Go ahead and move your mouse around for a bit. This will increase therandomness and give you better encryption. After about ten seconds of this, click "Format".15. Depending on the file size you selected, it will take some time to finish formatting."What is happening?"TrueCrypt is creating the file you asked it to, such as "random.txt". It is building a file system containedentirely within that one file. This file system can be used to store files, directories, and more. Further, itis encrypting this file system in such a way that without the right password it will beimpossible for anyone to access it. To *anyone* other than you, this file will appear to be just a mess ofrandom characters. No one will even know that it is a truecrypt volume.16. "Outer Volume Contents", click on the button called, "Open Outer Volume"An empty folder has opened up. This is empty because you have yet to put any files into your truecryptvolume.*** *** DO NOT PUT ANY SENSITIVE CONTENT HERE *** ***This is the "Decoy". This is what someone would see if you gave them the password you used in theprevious step. This is NOT where you are going to store your sensitive data. If you have been forced intoa situation where you had to reveal your password to some individual, then that individual will seewhatever is in this folder. You need to have data in this folder that appears to be sensitive enough to beprotected by truecrypt in order to fool them. Here are some important tips to keep in mind:A. Do NOT use porn. Adult models can sometimes appear to be underaged, and this can cause you toincriminate yourself unintentionally.B. Do NOT use drawings/renderings/writings of porn. In many jurisdictions, these are just as illegal asphotographs.C. Good choices for what to put here include: backups of documents, emails, financial documents, etc.D. Once you have placed files into this folder, *NEVER* place any more files in the future. Doing so maydamage your hidden content.Generally, you want to store innocent data where some individual looking at it would find no causeagainst you, and yet at the same time they would understand why you used TrueCrypt to secure thatdata.Now, go ahead and find files and store them in this folder. Be sure that you leave at least ten gigabytesfree. The more the better.When you are all done copying files into this folder, close the folder by clicking the "x" in the top rightcorner.17. click "Next"18. If prompted that "A program needs your permission to continue", click "Continue"19. "Hidden Volume", click "Next"20. The default encryption and hash algorithms are fine, click "Next"21. "Hidden Volume Size", the maximum available space is indicated in bold below the text box. Rounddown to the nearest full unit. For example, if 19.97 GBis available, select 19 GB. If 12.0 GB are available, select 11 GB.22. If a warning dialog comes up, asking "Are you sure you wish to continue", select "Yes"23. "Hidden Volume Password"*** IMPORTANT READ THIS ***Here you are going to select the REAL password. This is the password you will NEVER reveal to ANYONEelse under any circumstances. Only you will know it. No onewill be able to figure it out or even know that there is a second password. Be aware that an individualintent on obtaining your sensitive information may lie to you and claim to be able to figure this out.They cannot.It is HIGHLY recommended that you choose a 64 character password here. If it is difficult to remember a64 character password, choose an 8 character password and simply repeat it 8 times. A date naturallyhas exactly 8 numbers, and a significant date in your life repeated 8 times would do just fine.24. Type in your password twice, and click "Next"25. "Large Files", select "Yes" and click "Next".26. "Hidden Volume Format", as before move your mouse around for about ten seconds randomly, andtehn click "Format".27. If prompted "A program needs your permission to continue", select "Continue"28. A dialog will come up telling you that the hidden TrueCrypt volume has been successfully created.Click "Ok"29. Click "Exit"Congratulations! You have just set up an encrypted file container on your hard drive. Anything you storehere will be inaccessible to anyone except you. Further, you have protected this content with TWOpasswords. One that you will give to someone under threat, and one that only you will know. Keep yourreal password well protected and never write it down or give it to anyone else for any reason.Now, we should test BOTH passwords.=== 5. Testing TrueCrypt Volumes ===Once you have completed the above section, you will be back at TrueCrypt. Go ahead and follow thesesteps to test the volumes you have made.1. Click "Select File..."2. Locate the file you created in the last section, most likely called "random.txt" or something similar.Remember that even though there is both an outer anda hidden volume, both volumes are contained in a single file. There are not two files, only one.3. Click "Open"4. Choose a drive letter that you are not using (anything past M is probably just fine). Click on that, Forexample click on "O:" to highlight it.5. Click "Mount"6. Now you are prompted for a password. Read the below carefully:The password you provide here will determine WHICH volume is mounted to the drive letter youspecified. If you type in your decoy password, then O:\ will show all the files and directories you copiedthat you would reveal if forced. If you type in your real password, then O:\ will show the files anddirectories that you never intend anyone to see.7. After successfully typing in your password, you will see additional detail to the right of the drive letter,including the full path to the file you selected as well as the kind of volume it is (for example, hidden).8. Right click on your "Windows Logo"/"Start Menu" icon, and scroll down to the bottom where you cansee your different drive letters. You will see the drive letter you selected, for example: "Local Disk (O:)".Click on that.9. If you selected your decoy password, you will see all the files and folders that you moved there duringthe installation phase. If you selected the real password, you will see whatever files and directories youhave placed so far into the hidden volume, if any.If you selected your hidden volume password, you may now begin moving any sensitive information youwish. Be aware that simply moving it from your main hard disk is not enough. We will discuss how toensure deleted data is actually deleted later in the guide."What is happening?"When you select a file and mount it to a drive, you are telling your computer that you have a new drivewith files and folders on it. It is the same thing as if you had plugged in a usb flash drive, a removableharddrive, or an sd card into your computer. TrueCrypt causes your computer to think that there is anentirely new disk drive on your computer. You can use this disk drive just as if it *was* actually a usbflash drive. You can copy files to it, directories, and use it just as you would use a usb flash drive.When you are done, simply close all open windows/folders/applications that are using your truecryptdrive letter, and then click "Dismount" from within TrueCrypt while you have the drive letterhighlighted. This will once again hide all of this data, accessible only by re-mounting it with the correctpassword.*** VERY IMPORTANT SAFETY INFORMATION ***When a true crypt hidden volume is mounted, someone who has access to your computer can accessanything that is inside that hidden volume. If for example you left your computer running while atruecrypt volume was mounted, then if someone gained access to your computer they would be able tosee everything you have in that volume. Therefore:*** ALWAYS REMEMBER TO DISMOUNT ANY TRUECRYPT VOLUME CONTAINING ANY SENSITIVEINFORMATION WHEN YOU ARE NOT USING YOUR COMPUTER ***You can tell that it is dismounted because the drive letter inside of "TrueCrypt"'s control panel willappear the same as all of the other drive letters, with no information to the right of the drive letter.You should practice Mounting and Dismounting a few times with both passwords to make sure youunderstand this process.Once you have copied files/folders into the hidden volume, do *NOT* touch the files or folders in theouter volume anymore. Remember that both volumes occupy the same single file, and thereforechanging the outer volume can damage the hidden volume. Once you have copied files/folders into theouter volume during the installation process, that is the last time you should do so. From that pointforward, use ONLY the hidden volume. The outer volume exists only as a decoy if you need it.=== 6. Securing your Disk ===This is an involved step which many people may not be able to do right away. If you cannot do this stepimmediately, then see section 7.At this point you should understand how to create and use TrueCrypt hidden volumes in order tosafeguard any sensitive information. Therefore, you should *NOT* keep any such sensitive informationon your hard disk. At this stage, there are two possibilities:1. You have never had any sensitive information on your hard disk. In this case, read this section but youcan certainly skip it.2. Up until now, you have stored sensitive information on your hard disk. If so, then you MUST read thissection.If you have ever used this computer to access sensitive information, then all of the security andprecautions in the world are totally useless and futile because all someone has to do is access what isleft of that sensitive information. I cannot stress this enough.You can have the most secure TrueCrypt volumes, use TOR, and be the safest most secure user in theworld. If you have not made sure that *ALL* remnants of any sensitive information are UTTERLYREMOVED from your hard disk, then all of that effort is totally pointless. You MUST take these actions tosafeguard your hard disk, or otherwise you might as well throw away this guide and follow none of theadvice herein.First, I understand that it is troublesome to have to re-format a computer, to back everything up, andreinstall everything. However, if you have ever had sensitive information on your machine, that is whatyou have to do. Take the following steps:1. Obtain a removable harddrive or usb flash drive large enough to store anything you need to save.2. Set up a truecrypt hidden volume on that harddrive big enough to hold all of that information.3. Set up the truecrypt outer volume as in the previous section. Use the previous section as a guide ifyou need to.4. Be sure you the hidden volume will have enough space to store all that you are backing up.5. Copy ALL data you need to back up/save into that hidden volume.*** IMPORTANT, READ THIS ***If you have ever used this system to access sensitive information, then you must assume that thesensitive information or remnants of it can be *anywhere* on your hard disk. Therefore, you need tomove *EVERYTHING* you intend to save into the hidden truecrypt container. You do not know wheresensitive data might be, so you are assuming it can be anywhere. This way you still have ALL of your dataand you have lost nothing.A good analogy is toxic waste. You don't know which barrel might contain the toxic waste, so you treat*ALL* the barrels as potentially toxic. This is the surest way you can protect yourself.You might be saying, "I have family photos, music, movies that I would have to move to the hiddenvolume." That is perfectly fine. Remember that you can access that hidden volume just as if it was adrive letter. In fact, ideally, *ALL* of the content on your computer (assuming you value your privacy)should be protected anyways. You lose nothing by securing all of that data.6. Once you have copied everything you intend to copy. dismount your hidden volume, reboot yourcomputer, and re-mount your hidden volume to make sure everything is there.7. Now it is time to re-format your entire hard drive. Re-install your operating system of choice (such asWindows 7), and start with a clean slate.8. Once you have reinstalled your operating system from scratch, follow sections one through five of thisguide to reach this point, and then proceed.=== 7. Temporarily Securing Your Disk, Shredding Free Space ===Like the previous section, this section applies ONLY IF there is some risk that sensitive data has everbeen stored or accessed on this computer. If you are 100% sure that sensitive information has neverbeen accessed using this computer, then you can safely skip this and the previous step.If you are not prepared to take the actions in the previous step yet, then you should follow the steps inthis section until you can. However, you MUST eventually take the actions in step six above. Do notassume you can find/delete all sensitive content. Lists of filenames, image thumbnails, randomdata, and more *ARE* sitting on your hard disk. Someone who knows how to find it, WILL. That willrender all of your other precautions totally futile.As soon as you can, follow the instructions in step six.Meanwhile, here is how you can temporarily safeguard yourself until you are able to follow thoseinstructions.1. Go through your hard disk folder by folder, deleting (or moving to a truecrypt hidden volume) anyfiles that you believe are sensitive/risky.2. When you are totally sure that you have deleted all such files, go to the following URL:http://www.fileshredder.org3. Scroll down and look for the button called "Download File Shredder" -- do NOT click any other button,as the page may have ads on it that appear to be download links.4. Save the file.5. Run the file, most likely titled: file_shredder_setup.exe6. "Welcome to the File Shredder Setup Wizard", Click "Next"7. Select "I accept the agreement" and click "Next"8. It will choose where to install it, click "Next"9. Click "Next" again when prompted for the Start Menu folder.10. "Select Additional Tasks", Click "Next" again11. Click "Install"12. Ensuring that "Launch File Shredder" is checked, click "Finish"13. You should now notice that "File Shredder" is running. You should see the program in your task bar.Click on it to bring up the control panel if it is not up already.14. On the left is a link that says "Shred Free Disk Space", click it.15. Choose the drive letter for your hard disk, typically C:\, as well as any other drives you wish to shredthe free space.16. under "Select Secure Algorithm", select "Secure Erasing Algorithm with 7 passes" and click "Next"17. Click "Start"This will take some time to finish. Once you have finished shredding your free disk space, it will beimpossible or nearly impossible for someone to find one of your deleted files and piece it back togetherto see what it once was. However, this is NOT enough.Keep in mind that there may still be records of the filenames that were deleted, partial data from thosefiles, image thumbnails, and more that may be enough to incriminate you. This is only a temporary stepyou have taken, and you absolutely must take the actions in step 6 above in order to be truly safe.=== 8. Installing VirtualBoxAnd now we get to the fun part. We are going to create a secure environment for you to browse theinternet and communicate in a way that is totally anonymous and untraceable. You will have a setupthat is so secure as to be virtually impossible to break.1. First, go to the following URL: http://www.virtualbox.org2. Select "Downloads" in the menu on the left3. Under "VirtualBox platform packages" is "VirtualBox 4.0.4 for Windows Hosts", next to that is"x86/amd64". Click that.4. Save the file. It should be titled similar to: "VirtualBox-4.0.4-7011-Win.exe5. Run the file.6. "Welcome to the Oracle VM... Setup Wizard", Click "Next"7. click "Next"8. Click "Next"9. "Warning: Network Interfaces", click "Yes" but be aware that your internet connection will betemporarily reset for a few seconds.10. Click "Install"11. A dialog saying "A program needs your permission to continue" may appear, click "Continue".12. One or more dialogs asking if you want to install "device software" may come up, select "Install"each time.13. Optionally check the box "Always trust software from Oracle Corporation."14. "Oracle VM... installation is complete", Click "Finish" ensuring that "Start Oracle VM afterinstallation" is checked.Now we have the software we need in order to set up and run virtual machines. On your task bar to thefar right, you should notice VirtualBox running. Click on the "VirtualBox" icon if needed in order to bringthe VirtualBox control panel into view.Now it is time to set up a virtual machine. For this, we need to obtain two files. Operating systems, suchas windows, are typically installed using a cd or dvd. You put the cd or dvd into your computer, you bootit up, and you follow the instructions in order to install the operating system. Virtual machineswork similarly. Before we can use a virtual machine, we have to install an operating system on it.However, we are *NOT* going to use Windows! We are going to use Linux. Do not be afraid if you haveno experience using Linux. I assure you that this will prove to be painless. We actually need twodifferent linux operating systems in order to have a secure system. Before we go through the steps ofsetting this up, I want to describe to you what we are doing.Remember earlier in the guide I explained that one of the downsides to using Tor Browser from yourmain computer is that you might accidentally put a link into a non-Tor browser. The problem with yourcomputer right now is that you can access tor sites, or non-tor sites equally well. That means that youhave to be extremely careful to ensure that you are using Tor.An analogy would be to say that you are typing on a keyboard with red and green keys. You have to becareful to only hit the green keys. If you accidentally hit a red key, then you could compromise yoursecurity and anonymity. That is *not* a good position to be in. The purpose of setting up a virtualmachine is to make certain that you cannot accidentally reveal your identity or compromise yoursecurity.The computer you are using now has two ways of accessing the internet: TOR, and Non-TOR. The virtualmachine we are setting up however will only be able to access the internet using TOR. No other wayperiod. That means that no matter what you do, no matter how hard you try, you will NOT be able toaccidentally access any website except through TOR. This *guarantees* that whatever you do on thatvirtual machine is going to be through TOR.So how do we achieve this? There are a number of ways to do so. The method presented in this guide isnot the only good way, however I do believe that it is both easy to set up and also friendly to users whomay not have a great deal of RAM.First, we are going to set up two different virtual machines. One of them will exist for the sole purposeof making sure that the other one does not accidentally connect to the internet except through TOR.This virtual machine requires very little. You will not be using it for anything. It will simply act as agatekeeper to ensure that the other Virtual Machine is safe.The second virtual machine will be what you use for internet browsing, chatting, etc. This virtualmachine will be configured in such a way that it can only use TOR and nothing else. The way we willachieve this is to force this second virtual machine to go through the first virtual machine for all internetconnections.Do not worry if this seems complicated. As with the rest of this guide, I am going to walk you throughstep by step exactly what to do.First, we have to obtain the operating systems we will need. In this case, we are going to use "DamnSmall Linux" (yes that is it's real name) for the firewall and we are going to use "Ubuntu" for the mainsystem. The advantage to using "Damn Small Linux" is that we only need 32 MB of ram and no disksapce to have an effectivefirewall.Let's set up the firewall first:=== 9. Installing a Firewall ===1. First, go to the following URL: DSL information (three l's)2. Scroll down until you see a link that says "Download"3. Under "Current Full Mirror List", click any that work. Some may not work at any given time. If onedoesn't work, simply hit back on your browser and try another one.4. At the time of this guide, the following url worked:ftp://ftp.is.co.za/linux/distributions/damnsmall/current/5. Go to the "current" directory if not already in it.6. Click on the file called: dsl-4.4.10.iso -- If you cannot find this file, choose the file closet to it. A higherversion number is fine. The file will probably be about 50 MB7. The file should take about 5-10 minutes to download based on your connection.( IF THE ABOVE STEPS WORKED FOR YOU, SKIP THIS MINI-SECTION(( If you had trouble with the above steps, read this mini-section(( With mirrors, it is often the case that a particular mirror site doesn't work. At the time of this writing,several mirrors worked. I am providing( detailed instructions for each mirror.(( Above I have already provided instructions for the mirror ftp://ftp.is.co.za(( MIRROR: GDS - http://gd.tuwien.ac.at/opsys/linux/damnsmall/(( Go to this URL, and under "Subdirectories" click on "current"( if available, select the file called "current.iso" (provided the file is at least 49 MB in size)( If not, then choose the closest file to dsl-4.4.10.iso, a higher version # is fine.(( MIRROR: http://ftp.belnet.be/packages/damnsmalllinux/(( go to "current" directory, obtain either "current.iso" (if 49 MB or higher) or find file closest to "dsl-4.4.10.iso")(( MIRROR: Index of /mirrors/damnsmalllinux.org(( go to "current" directory, obtain either "current.iso" (if 49 MB or higher) or find file closest to "dsl-4.4.10.iso")( MIRROR: Index of /mirrors/damnsmalllinux.org(( go to "current" directory, obtain either "current.iso" (if 49 MB or higher) or find file closest to "dsl-4.4.10.iso")At this point, you should have the file either "current.iso" or "dsl-4.4.10.iso" (or something similar) fullydownloaded and saved into your Downloads directory.Now, go ahead and open up VirtualBox again, most likely by clicking it on the task bar.8. Click "New" at the top left, an icon that resembles a many-pointed round star.9. "Welcome to the New Virtual Machine Wizard", click "Next"10. "VM Name and OS Type": Under "Name" type in: Firewall11. For Operating System, choose "Linux"12. For "Version", choose: "Other Linux"13. Click "Next"14. "Memory", select "32 MB" and click Next15. "Virtual Hard Disk", Uncheck "Boot Hard Disk" and click "Next"16. If a Warning dialog appears, click "Continue"17. Click "Finish"18. Now you will notice "Firewall, Powered Off" visible in your VirtualBox control panel. Make sure it ishighlighted (it should be) and then right click it, and select "Settings".19. Select "Network" in the menu to the left.20. Click on the "Adapter 2" tab.21. Check "Enable Network Adapter" and next to where it says "Attached to", select "Internal Network"from the pulldown menu.22. Click "Ok" at the bottom.23. Once again, right click "Firewall, Powered Off" and select "Start"24. Check "Do not show this message again" and click "Ok". This is just letting you know that the "RIGHTCTRL KEY" on your keyboard is the "control" key for this virtual machine.25. "Welcome to the First Run Wizard", click "Next"26. "Select Installation Media", under "Media Source" is a pull down menu. To the immediate right ofthat pull down menu is an icon with a folder. Click that folder icon.27. Locate "current.iso" or "dsl-4.4.10.iso" (or the similar file name) that you downloaded. Whenlocated, click "Open". It is likely in the "Downloads" directory of your home folder.28. Click "Next"29. Click "Finish"Now the virtual machine will start to boot up. Simply wait... (This may take up to 5 minutes.)30. One or more new dialogs may come up saying "VirtualBox Information", just click "Do not show thismessage again" and click "Ok"After a few minutes, the booting will finish and you will be looking at the desktop for your firewall virtualmachine. To the right of the window you will see some stats that look something like this:Up: 0 k/s - Down: 0 k/sProcesses: 19CPU Usage: 10%RAM Usage: 16.2MB/28.8MBetc.Congratulations! You now have a firewall running. Now we will set up this firewall to protect you so thatyou can safely use TOR from your main virtual machine.=== 10. Firewall Configuration ===At this stage you should be looking at the desktop for "DSL" (Damn Small Linux).I need to talk about the mouse first. This particular virtual machine as well as your main operatingsystem (windows) both want control of your mouse. Both cannot have control of your mouse at thesame time however. Therefore, you have to choose whether the mouse will be used by your virtualmachine, or by Windows. When you click into your virtual machine, it has the effect of passing control ofthe mouse to the virtual machine. That means you cannot move your mouse cursor past the boundariesof that virtual machine.In order to give mouse control back to windows, enabling you to move your mouse cursor anywhere,simply press the right ctrl key on your keyboard. That is to say, you have two ctrl keys. One on the left ofyour keyboard, and one on the right. Press the ctrl key that is on the right of your keyboard. This will give mouse control back to windows.Practice this a bit. Practice clicking into the window, moving the mouse cursor around, pressing rightctrl, and moving the windows mouse cursor around. Get the feel of it.You should see a window that looks something like a web browser, with some text in it including wordssuch as "Getting Started with DSL". First, close that window.( If your mouse is not working, read this mini-section.(( First, click inside the window that your virtual machine is running in. Now try moving your mousecursor. If you do not see the mouse cursor moving around, then press( RIGHT CTRL + I. Now move your mouse cursor again. If you notice that you are moving your "main"mouse cursor over the window, but you do not see the "DSL" black mouse( cursor moving, then click again into that window. If you do this a few times, you should notice that themouse begins to work. You may have to press RIGHT CTRL+I a couple( of times to get the mouse to work.1. Once the mouse is working inside of your virtual machine, go ahead and close the window entitled"Getting Started with DSL"( If you cannot see the full virtual machine window, for example because your screen resolution is set sothat some of the window goes too low, read this mini-section.(( First, press RIGHT CTRL+I until you have your main windows white mouse cursor back. Now, click on"Machine" in the menu at the top of the window.( Select "Switch to Scale Mode"(( Click "Switch"( Now you will have converted your firewall window to a smaller size, and you will be able to resize it.You may need to press "right ctrl" to get a windows mouse cursor( which you will need in order to resize this window. Now simply resize it to the size that works for you,and then click into the window to be able to use the black mouse( cursor inside the virtual machine. I recommend you maximize this window to make sure you can readeverything clearly.2. Right click anywhere on the desktop, go to System (a red folder), go to Daemons, ssh, and start.3. Right click again anywhere on the desktop, go to XShells -> Root Access -> Transparent4. Now you have a window that you can type in. Type exactly as shown below into this window, and hitenter:passwdOnce you type this and hit enter, it will ask you for a password. This is a password for full access to thefirewall. Make it at least 8 characters in size.*** IMPORTANT: Do not forget your firewall password. You will need it later in the guide. ***When you have successfully changed your password, it will say "Password changed."5. Now type exactly as shown below, into the same window:ifconfig eth1 10.0.3.16. It will not say anything after you hit enter, it will just return you back to the prompt.Now our firewall server is ready. We want to save this state so that we can get back to it easy in thefuture.Press RIGHT CTRL+S7. Now you will be looking at a window that says "Take Snapshot of Virtual Machine". Just click "Ok"8. Now, let's test this out to confirm it works as we expect. Go ahead and close the virtual machine byclicking the "X" in the top right corner. A menu will come up. Select "Power off the machine" and clickok. Do NOT check the box called "Restore current snapshot".And now you should be once again at the VirtualBox manager. You will see "Firewall(Shapshot 1),Powered Off"9. Make sure that "Firewall (Snapshot 1), Powered Off" is selected. At the top right of your VirtualBoxManager is a button that says: "Snapshots (1)". Click it.10. Click on "Snapshot 1", the top-most selection. This will highlight it.11. Now right click it, and click on "Restore Snapshot"12. A dialog box will come up asking if you are sure, click "Restore"13. Now click the "Start" button at the top with the large green arrow.14. Any dialog boxes that come up with a check box saying "Do not show this information again", simplycheck the check-box, and click ok. Do not worry about any of those.Remember, if you do not have immediate control of the mouse inside the virtual machine, simply pressRCTRL+I (press right ctrl and "I" at the same time) and click into it until you have mouse control.Now your firewall is good to go. Any time you need it, just go to the VirtualBox Manager and followsteps 9 through 14 above. You do not have to go through the whole setup process again at any time inthe future. Your firewall is ready.=== 11. Installing Ubuntu ===Now we are going to set up the main machine that you will be using TOR with.1. First, go to this URL: Home | Ubuntu2. Click on the link "Download Ubuntu"3. Click "Start Download" (This download should take 10-15 minutes)4. The filename is going to be similar to: ubuntu-10.10-desktop-i386.isoNow we wait...While you are waiting for the file to download, go ahead and make sure that your "hidden volume" ismounted in TrueCrypt to a particular drive letter. For example, O: You will need that for the next step.5. Return to your "VirtualBox Manager". It doesn't matter if the firewall is running or not.6. Click "New" (the blue round star-icon in the top left) again.7. "Welcome to the New Virtual Machine Wizard", click "Next"8. "VM Name and OS Type", under "Name", type "Primary"9. Next to "Operating System", select "Linux"10. Next to "Version", select "Ubuntu" and Click "Next"11. "Memory", by default it selects 512 MB. This is fine. 256 MB is the MINIMUM. The more memoryyou allocate, the better the virtual machine will function. Click "Next"12. "Virtual Hard Disk", Make sure "Boot Hard Disk" is checked. Make sure "Create new hard disk" isselected. Click "Next"13. "Welcome to the Create New Virtual Disk Wizard", click "Next"14. "Hard Disk Storage Type", select "Fixed-size storage" and click "Next"15. "Virtual Disk Location and Size", to the right of the text box containing "Primary" is a folder icon.Click the folder icon.16. Now we have to select a file for the new hard disk image file. On the bottom of this dialog it says"Browse Folders", click on that.17. Now click on "Computer" in the menu to the left.18. Scroll to where you see the drive letter you mounted, and double click on it. Ex: Local Disk (19. Now click "Save"20. By default 8.00 GB are selected. That is fine. If you have enough space on your hidden volume,increase this to 10 GB. Otherwise, 8 is fine.21. Under "Location", it should say O:\Primary.vdi where O: is replaced by whatever drive letter youmounted your TrueCrypt hidden volume to.22. Click "Next", then click "Finish"Now we wait for VirtualBox to create the hard drive we asked for. This may take a few minutes.Keep in mind this entire virtual machine as well as any of its contents are going to reside within thehidden truecrypt container. This ensures extra security.23. When this is done, you will see a "Summary" window. Click "Finish".24. Now, right click on "Primary, Powered Off" in your "VirtualBox Manager", and click "Start"25. Again we are at the "First Run Wizard", click "Next"26. "Select Installation Media", under "Media Source" is a pull down menu. Click the "folder icon" to theimmediate right of that pulldown menu.27. Locate "ubuntu-10.10-desktop-i386" (or the similarly named file) from your Downloads directory, orwherever you saved it. Click on it, and click "Open"28. Click "Next"29. Click "Finish"Now simply wait. Your Ubuntu virtual machine will be loading up. This may take a few minutes. Don'tworry if you see all kinds of strange messages/text. It is normal.After a few minutes, you should start to see the Ubuntu desktop load. Unlike your firewall, you willnotice that you do not have to click the mouse inside the window. It automatically happens. This is goingto be much easier than the "Firewall" step.Once everything has loaded, you will be looking at a window that says "Install" with a button that says"Install Ubuntu". If you cannot see everything, press RCTRL+F (to go full screen). You can return towindowed mode by RCTRL+F again. Any dialogs can be closed, and you can check the box that says "Donot show me this again."30. Click "Install Ubuntu"31. Check "Download updates while installing"32. Check "Install this third-party software". Click "Forward"33. Ensure "Erase and use entire disk" is selected, and click "Forward". Remember, this is NOT talkingabout your hard disk. It is talking about the 8-10 gigabyte virtual disk.34. Click "Install Now"35. Now you will be guided through a series of installation related screens. The first screen asks you toselect your timezone/time. Select your choice and click "Forward"36. Now keyboard layout, again select your choice and click Forward. If you are unsure, leave it as is orclick "Figure out keyboard layout"37. "Who are you?" For "Your name" type in: mainuser38. When you type in "mainuser" the other boxes will fill in automatically. Now click in the text box nextto "Choose a password".39. Do NOT use the same password as the firewall. Come up with a different password.40. Ensure that "Require my password to log in" as well as "Encrypt my home folder" are selected andchecked and proceed.Now simply wait until the installation is finished. The installation may take a while, and it may appear tostall at some points. As long as the ubuntu mouse cursor shows an animation that is turning around incircles, the installation *is* working. Simply wait until it is done. If after an hour or two the progress barhasn't moved at all, then go ahead and re-start the installation starting from step 24 (after closing thewindow and powering down the virtual machine).Depending on your computer, it could take 2-4 hours. Most likely, it will take about an hour. Oncefinished, you will see a dialog that says "Installation Complete" with a button that says "Reboot Now".Do NOT press the "Reboot Now" button. Close the 'X' on this window, and Power Down.41. Now, right click "Primary" and go to "Settings".42. Click on "Storage" in the left menu. Then click on the "ubuntu-10.10... .iso" under where it says "IDEController"43. To the right it says "Attributes" under that it says "CD/DVD Drive : ..." to the immediate right of thatis a cd icon. Click it.44. Select "Remove disk from virtual drive."45. Click "Ok"46. Now, making sure that "Primary" is highlighted, click the "Start" button at the top with the largegreen arrow.Now we wait for your newly installed Ubuntu machine to boot up.47. After a few minutes, you will see a dialog appear that says "mainuser-VirtualBox". Go ahead and clickon "mainuser" which has the "person icon" to the left of it.48. Now it will prompt you for your password. Enter the password you used in the installation process.49. After a minute or so, you should hear a nice login sound, and you should be fully logged into yourvirtual machine.50. Keep waiting, and a dialog will appear that says "Information avialable" and "Record your encryptionpassphrase" Click on: "Run this action now"51. Type in the same password you used to log in. After that window closes, click "Close" in the dialogbox.Congratulations! You have now set up a virtual machine as well as a firewall to protect it. Now we needto finish configuring the primary virtual machine.=== 12. Ubuntu Initial Setup ===Ok, now that we have installed Ubuntu, we need to set it up so that we can use it fully. This alsomeans making sure we can see flash on websites such as youtube.1. First, we have to install any updates that are pending. At the bottom of your screen, you shouldnotice where it says "Update Manager". Click on that.2. Now, click on "Install Updates". If you did not see "Update Manager", then skip these twosteps.3. Any time an administrative task is required, you will need to type in your password. This isthe same password you used to log in.Now we wait, this is going to download any necessary security updates to make certain we areusing the most current/secure setup possible. This may require downloading hundreds ofmegabytes. Just go ahead and let it do that, and when everything is downloaded and updated,proceed to the next step. While you wait, Ubuntu may go into screensaver mode. If so, just movethe mouse and it will ask you for your password. That will leave screensaver mode.If the updates are more than a hundred megabytes, it will take quite a while. It may take up to 2-3hours depending on your computer and internet connection. Nonetheless, this step is critical. Donot skip the updates. Besides ensuring that your setup will be secure, the updates also ensure thatall of the applications are up to date and thus most likely to function correctly. Just go ahead andwatch a movie for a couple hours, and then return and check on it.After all of the updates have been downloaded and installed, the "Update Manager" window willnow say "Your system is up-to-date" at the top. Further, it will say: "The computer needs torestart to finish installing updates.". Go ahead and press the 'X' in the top right corner of thewindow, and choose 'Send the shutdown signal". If prompted, click "Shut Down". Once it hasfully shut down, the window will disappear and you will be back at the VirtualBox manager. Goahead and right click on "Primary" and click "Start".This will restart the virtual machine.If a virtual machine fails to shutdown after 10 minutes or so, then go ahead and close the windowagain by pressing the 'X' but this time choose "Power down". If it still will not shut down, thenVirtualBox may have crashed. If so, just follow these instructions:( Follow the steps in this mini-section if a virtual machine fails to shutdown, or you need tocompletely close/restart VirtualBox.(( First, press "Ctrl+Alt+Delete", and then click "Task Manager"( Next, locate the process that is running that starts with "VirtualBox". Right click that process,and click "End Process Tree"( This should force the window to close.(( Now, restart VirtualBox by going to your start menu, All Programs, Oracle VM VirtualBoxVirtualBOx(( Now you will have the VirtualBox manager up again. To restart the Ubuntu machine, simplyright click on "Primary" and click "Start".Once your Primary vm has rebooted, you will be again at the login screen. Here as before, clickon "mainuser" and then enter in your password. Now your primary machine is fully up to date.Remember, be patient. It may take a few minutes before your virtual machine has fully booted.First you will see the background image and a mouse cursor that can move around, next youshould hear the login sound play, and finally you will see the menu at the top and bottom of yourvirtual machine window.Depending on the speed of your computer, this may take 10 minutes or more. Just be patient.Don't worry if your virtual machine appears to be running too slow, we will speed it up.Now your Virtual Machine is set up and ready for use.=== 13. Installing Guest Additions ===In order to ensure that the Virtual Machine runs smoothly as possible, we are going to installsome additional software to the virtual machine.1. Go to the "Devices" menu at the top of your virtual machine main window (Machine, Devices,Help), and go to "Install Guest Additions"2. Go to the "Places" menu at the top of your virtual machine (Applications, Places, System), andclick on "VBOXADDITIONS_4.0.4_70112" (the number may be different).3. At the top this new window will be the text "The media has been determined as "UNIXsoftware". Click on "Open Autorun Prompt"4. A new dialog may appear saying "This medium contains software intended to be automaticallystarted. Would you like to run it?" Click "Run"5. Enter your administrative password (the one you use to log into Ubuntu) and click "Ok"6. Now the VirtualBox Guest Additions installer will begin. This may take some time, so justrelax and wait. Depending on your computer, this may take 30 minutes or more.7. When this is finished, you will see the text "Press Return to close this window." Go ahead anddo so.8. Once that window has closed, go ahead and press the 'X' to close the entire virtual machinewindow. Select "Send the shutdown signal" and click "Ok".9. A dialog box will appear. Click on "Shut Down", the top most option.At this stage it is a good idea to further optimise our virtual machine. When you initially installedit, you most likely selected either 256 MB or 512 MB of RAM. If you have enough RAM tospare, then I highly recommend you increase that to at least 1 GB. Here is how to do so:1. First, right click on "Primary, Powered off" and go to Settings.2. Select "System" from the menu on the left.3. Increase the "Base Memory" to either 1024 MB (1 GB), or some higher value you arecomfortable with.It is also a good idea to increase the video memory available to the virtual machine.4. Select "Display" from the menu on the left, still inside of "Settings"5. Increase the "Video Memory" slider to the right as far as you are comfortable with. Forexample, 128 MB.6. Check the box "Enable 3D Acceleration".7. Now click "Ok" at the bottom.Go ahead and start up Ubuntu again by right clicking "Primary, Powered off" and clicking"Start"When Ubuntu loads up, go ahead and log in as before using your password. Now wait untilUbuntu is fully booted and the "Applications Places System" menu is visible.You will probably notice that your virtual machine loads up and runs faster than before.How well your virtual machine runs depends on how good your computer is. Primarily, RAMand processor speed are the most significant factors. If your computer is modern enough, youshould be able to use websites with flash and even watch videos, such as on YouTube, with noproblem. If your computer is not as modern, you will still be able to browse websites but may notbe able to watch videos. You should still be able to use most flash based websites however.*** IMPORTANT: Do NOT browse sensitive content YET. At this stage, your virtual machineis not yet configured to use TOR. ***=== 14. Installing IRC (Optional) ===*** This section is entirely optional. If you are not interested in installing IRC, skip this section.***To install IRC on your new virtual machine, follow these steps:1. Go to the "Applications" menu, and go to "Ubuntu Software Center"2. Type "kvirc" in the search box field in the top right.3. When the results return, select the one called: "KDE-based next generation IRC client" or "KVIrc".4. Click "Install"5. Enter your password when prompted.6. While it installs, you will notice a progress bar. This may take a few minutes depending on thespeed of your internet connection.7. Once it is finished installing, the progress bar will go away. Go ahead and close the "UbuntuSoftware Center".You are probably used to the close/min/max buttons being on the top right, as is the case inWindows. You will find them in the top left instead. If you don't like this, don't worry. You canchange it later.Now, let's go ahead and set up KVIrc.Remember, you are NOT truly anonymous yet.8. Click on "Applications" in the top menu.9. Go to "Internet"10. Click on "KVIrc"11. "KVIrc Setup" will appear. Go ahead and click "Next" to begin.12. "Store Configuration in Folder", click "Next"13. "Please choose a Nickname". You can leave this exactly as is, or you can choose a Nickname then click "Next".*** IMPORTANT READ THIS ***Do NOT pick a nick name you have ever used before, or a nick name that can help someonedetermine who you are.Also, do NOT fill in any other details such as location, age, real name, etc. Leave everything elseas is.You are NOT anonymous yet.14. Now you are asked to pick a theme, select "No theme" then click "Next"15. Now click "Finish" to leave the KVIrc Setup16. A new window will appear having a list of servers, click "Close"Now let's connect to the "Freenode" IRC network. By now, you may have many questions abouthow to use Ubuntu. The #Ubuntu chatroom on Freenode is a great place to start, and where youcan ask questions related to how to use Ubuntu and VirtualBox. Please remember, you are NOTanonymous yet and anything you say can be matched to your IP address. Keep the conversationrelated to technical help, or just learning Ubuntu.Do NOT discuss TOR.Do NOT discuss ANY sensitive material.Remember, this chatroom consists mostly of people who have set up Ubuntu for other reasons.Therefore, they will be able to help you configure it, and answer many questions about howUbuntu works.17. At the bottom right of KVIrc is a long text input box. Click inside that box.18. Type, exactly as shown below, including the "/" character:/server irc.freenode.net 666719. This will connect you to the Freenode IRC network. After a few minutes, you will beconnected and a dialog box will appear.20. Uncheck the box that says "Show this window after connecting", and then click "Close"21. Now, in the same text box as you typed the /server command, type the following exactly asshown below, including the "/" and "#" characters:/join #Ubuntu22. Now you are in the #Ubuntu chatroom. Feel free to discuss the Ubuntu operating system andask questions related to how to use Ubuntu. Remember:*** Do NOT discuss TOR or sensitive material. You are NOT anonymous. ***This is a good opportunity for you to learn how to set up Ubuntu to be the way you want as far ascolors, layout, theme and so forth. When you have finished, simply close the "KVIrc" window.=== 15. Installing Torchat (optional) ===*** This section is entirely optional. If you are not interested in installing Torchat, skip thissection. ***Torchat is a program you can use to communicate securely and anonymously with other Torchatusers. It is only useful if you already know someone who is using it. If you do not know someoneusing Torchat, then it is best to skip this section and come back to it in the future when you wantto install Torchat.These instructions work for Ubuntu 10.10.First, installing Torchat is a bit tricky because Ubuntu does not include Tor by default in itsrepositories. Tor is a requirement for torchat, and therefore we have to first install Tor onUbuntu. Doing so is not too difficult.1. First, go to "Applications" -> "Accessories" -> "Terminal". You will see a new window appearwith a prompt that looks like this:mainuser@mainuser-VirtualBox:~$2. Now, type exactly as shown below, and hit enter: sudo bash3. After entering your password, you will be at a new prompt which looks like this:root@mainuser-VirtualBox:~#4. Now, either type or copy-paste the below text into this window and then hit enter:echo "deb Index of /torproject.org experimental-lucid main" | sudo tee -a/etc/apt/sources.list sudo apt-key adv --keyserver keyserver.ubuntu.com --recv-keys 886DDD895. After you do this, you should see the following at the bottom of your window:gpg: Total number processed: 1gpg: imported: 1 (RSA: 1)6. Now, we should be able to install tor. In this same window, type the following commands, oneat a time:apt-get updateapt-get install vidalia privoxy tor7. (press Y and enter when prompted)Now we need to obtain the Torchat installation file, follow these steps:8. In firefox on Ubuntu, go to the following URL: torchat - messenger application on top of the Tor network and it's location hidden services - Google Project Hosting9. On the left under where it says "Downloads"10. One of the files listed will end in .deb, for example torchat-0.9.9.deb. Click on that file name.11. On the next page, again click on the file name. This should begin the file download.12. By default, Ubuntu wants to open this file using the "Ubuntu Software Center". This iscorrect.Now wait until the file finishes downloading, and then the "Ubuntu Software Center" willappear. Follow these steps:1. Press "Install"2. Type in your password when prompted.After a short wait, Torchat will be installed.To start Torchat, go to "Applications" -> "Internet" -> "Torchat Instant Messenger"=== 16. Creating TOR-Only Internet Environment ===Up until now, we have been using our Virtual Machine to access the internet directly. This was necessaryso that we could install updates, software, and get a feel for how to use Ubuntu.Now it is time to force Ubuntu to connect to the internet using TOR Only. At the end of this phase, yourUbuntu virtual machine will be usable as a secure and anonymous TOR based browsing environment. Itwill be *impossible* for you to access the internet except through TOR, and therefore you can restassured that anything at all you do online through the Ubuntu virtual machine will be through TOR.First, we need to shut down any running virtual machines. If "Primary" is running, click the 'X' in the topright to close it. Select "Send shutdown signal" and then select "Shut Down" when prompted. If"Firewall" is running, go ahead and close it in the same way, but choose "Power off".After a minute or so, you should be back to your VirtualBox Manager, with neither virtual machinerunning.1. Right click on "Primary, Powered Off" and go to "Settings"2. Select "Network" from the menu on the left.3. Next to "Attached to" is a pull down menu. Right now it is set to "NAT". Choose "Internal Network"and click "Ok"4. Click "Firewall" to highlight it, and then click on "Snapshots (1)" in the top right.5. Right click on "Snapshot 1" and then select "Restore Snapshot". Select "Restore" if prompted.6. Right click "Firewall" and click "Start"Now your Firewall will be resumed exactly where it had been previously set up. The last commandentered should still be visible.Before you proceed, make sure that TOR is running on your main Windows computer. If it is, you will seean "Onion" icon visible in your task bar. Click on that icon and you should see the "Vidalia ControlPanel". Make sure that it says "Connected to the TOR Network". If so, you are ready to proceed. If notthen please see section 2 : "Using and Testing Tor Browser for the first time" to re-start TOR. Once TORis running, proceed.Let's restart Ubuntu:7. Right click "Primary" and click Start. Log in as normal.8. After fully logged in, open "Firefox" by clicking the orange "Firefox" logo at the top, next to "System".9. Try to go to any website, such as Google. Try at least 3-5 different websites. You should notbe able to connect to any of them.Note: If you attempt to go to websites you have already been to using Ubuntu, they may appear to loadbecause they are cached.10. In Firefox on Ubuntu, go to "Edit" and "Preferences"11. Click on the "Advanced" icon12. Click on the "Network" tab13. Under "Connection" it says "Configure how Firefox connects to the internet". To the right of that is a"Settings" button. Click that button.14. Select "Manual proxy configuration"15. Next to both "HTTP Proxy" and "SSL Proxy" type in: 127.0.0.116. Set the port to 8118 for both "HTTP Proxy" and "SSL Proxy"17. Next to "SOCKS Host" type: 127.0.0.118. Set the port for "SOCKS Host" to 905019. Make sure that "SOCKS v5" is selected at the bottom.20. Click "Ok" and then "Close"Now we have instructed Firefox to use TOR. However, Firefox cannot use TOR yet. Right now, Ubuntu iscompletely unable to connect to the Internet. We are going to change that.21. Go to "Applications" -> "Accessories" -> "Terminal"22. Type in: sudo bash (and hit enter)23. Type in your password if prompted.24. Type in the following commands exactly as shown below (or copy paste them):ifconfig eth0 10.0.3.2/etc/init.d/polipo stop/etc/init.d/tor stop/etc/init.d/privoxy stop(Note: the last three commands, those beginning with /etc/ are only necessary if you installed Torchat)Now you have told your Ubuntu machine to join the same network that your Firewall is on. Now we canestablish a tunnel for TOR data to flow from our Ubuntu machine, through the Firewall, into yourWindows guest machine. We need to establish two such tunnels.The first tunnel for port 9050 data, and the second tunnel for port 8118 data. When these two tunnelsare set up, it will be possible for you to use your Ubuntu machine to access any website using TOR.Further, it is still completely impossible for your Ubuntu machine to access the Internet in any otherway.25. Your terminal window should still be open. Type in the following command exactly as shown (orcopy paste it):ssh -N -L 9050:10.0.2.2:9050 root@10.0.3.126. Type "yes" if prompted. When prompted for the password, give your Firewall password. Not yourUbuntu password.After you hit enter, you will see the cursor go to a blank line and nothing else happens. This simplymeans the connection you requested is active. If the connection were to stop for any reason, you wouldreturn to a command prompt. If you want to terminate the connection yourself, simply hit CTRL+C. Youcan type in the same ssh command again if you need to re-open the tunnel.27. Now we are going to open the second tunnel. In your terminal window, go to "File" and "Open Tab".This will open up a tab for a second terminal without affecting the first.28. Now, type exactly as shown below to open the second tunnel:ssh -N -L 8118:10.0.2.2:8118 root@10.0.3.129. Return to Firefox. Go to the "File" menu and uncheck "Work Offline" if it is checked.30. Go to the URL: Are you using Tor?If you see the text: "Congratulations. Your browser is configured to use Tor" then you are all set! YourUbuntu virtual machine is now NOT connected to the internet in any way. However, you can browse anywebsite using TOR, even Youtube. You do not have to be afraid of javascript or Flash. Any files you saveonto your virtual machine will automatically be saved in the encrypted truecrypt volume you set upearlier. In fact, everything the virtual machine does will be contained within that truecrypt volume.Further, even if someone somehow managed to remotely gain full root access to your Ubuntu machine(absurdly unlikely to happen), they would still not be able to see *anything* about who you are, or whatyour real IP address is, or even that you are using a Virtual Machine. To them, it would appear that theUbuntu machine is your main computer. They would be totally unable to compromise your identitybased on this alone.However, keep the following in mind. If someone were to gain access to your Ubuntu machine, theyWOULD be able to see anything you have used it for or any files you have saved. Therefore, Irecommend for the sake of absolute security, do not store anything on your Ubuntu virtual machine thatidentifies you. This is just a precaution. It is virtually impossible that someone would manage toremotely gain access to your Ubuntu machine.=== 17. General Daily Usage ===Much of this guide has involved detailed one-time setup processes. From now on, all you have to dowhen you want to use TOR from your Ubuntu virtual machine is to follow these steps. Every step listedis a step you have already done, so feel free to re-visit earlier sections if you need help.1. Start TrueCrypt, and mount your hidden volume which contains your virtual machine.2. Start VirtualBox3. Start TorBrowser Bundle.4. Click "Firewall" to highlight it, and then click on "Snapshots (1)" in the top right.5. Right click on "Snapshot 1" and then select "Restore Snapshot". Select "Restore" if prompted.6. Right click "Firewall" and click "Start"7. Right click "Primary" and click Start. Log in as normal.8. Go to "Applications" -> "Accessories" -> "Terminal"9. Type in: sudo bash (and hit enter)10. Type in your password if prompted.11. Type in the following commands exactly as shown below (or copy paste them):ifconfig eth0 10.0.3.2/etc/init.d/polipo stop/etc/init.d/tor stop/etc/init.d/privoxy stop(Note: the last three commands, those beginning with /etc/ are only necessary if you installed Torchat)12. Your terminal window should still be open. Type in the following command exactly as shown (or copy paste it):ssh -N -L 9050:10.0.2.2:9050 root@10.0.3.113. Type "yes" if prompted. When prompted for the password, give your Firewall password. Not yourUbuntu password.14. In your terminal window, go to "File" and "Open Tab".15. Now, type exactly as shown below to open the second tunnel:ssh -N -L 8118:10.0.2.2:8118 root@10.0.3.116. Return to Firefox. Go to the "File" menu and uncheck "Work Offline" if it is checked.17. Go to the URL: Are you using Tor?If you see the text: "Congratulations. Your browser is configured to use Tor" then you are all set!Enjoy!Phew, now i have it complete ! I admit its quite extensive, not to say enourmous, but its the best how-toon anonymity and other safety procedures i have found so far. It secures your sys black-hat style^^ :Black Hat Briefings - Wikipedia, the free encyclopedia (for those of you who dont know black hat ^^)You dont have to do all steps at once. You can do a little of it every time you have an hour or two tospare. I think for the whole procedure you will need roughly 8-12 hours. I think its written in a wayeverybody should be able to follow. If there are still steps unclear just ask, i will see if i can help you.btw this is written for noobs, but the tips here are interesting for allmost everybody.P.S.: Once you have installed TOR you can get access to TOR hidden services and other interesting deepwebpages. If you want some links for your first steps into this hidden part of the internet just PM me. Ifthere is a lot of requests i will write an extra thread with the most important websites in the deepweb.One thing before you get started : most deepweb pages arent online 24/7. So if you cant reach a certainwebsite be patient and try again and again till you get access. Another thing : you will find websites thatare pretty shocking and disturbing. In 99.5% you will see beforehand what you find on those sites, so ifyou dont want to see certain things dont klick on the links.Enjoy, and stay safe!Sursa : http://dppmfxaacucguzpc.onion/ Edited January 17, 2013 by TheArthist Quote
lutulik Posted January 17, 2013 Report Posted January 17, 2013 A mai fost postat exact la fel + ca nu ai pus nicio sursa. Quote