You are viewing a single comment's thread from:
RE: An Ethical Hackers Guide: Part 5 - Methodology and Tools
Dude!! Just read it all now ☺ im exited to see about setting up to run all through tor, thats sounding fucking great! Im a perfect tester to follow your instructions as I will try it on my laptop and if i manage to do it from that future post,then anyone can hahaha
Haha awesome :) I can definitely help you out if you get stuck anywhere. Nothing better than a Tor-box. Not reliable for anything large, but good enough anonymity for the average misuse :P
Sounds like it eliminates the need for a vpn?!