Rediff.com |  Feedback  
You are here: » Rediff Home » Discussion Boards » Permalink
  
View : Single Message | Complete Thread | Read complete Discussion
what if TOR was being used ?
by CS Shyam Sundar on Oct 19, 2007 01:47 PM

Guys., being in the IT security field there are number of methods to spoof and work. One of the famous techniques include Onion Routing Techniques. A working implementation called TOR does exist and methods like proxy chaining and TOR chaining will make a hacker completely undetected and completely untraceable.

    Forward  |  Report abuse
The above message is part of the Discussion Board:
Chinese hacking army personnel's emails