

Privoxy can be customized by users, for both stand-alone systems and multi-user networks. Privoxy is a “privacy enhancing proxy”, filtering web pages and removing advertisements. Privoxy - Privoxy is a free non-caching web proxy with filtering capabilities for enhancing privacy, manipulating cookies and modifying web page data and HTTP headers before the page is rendered by the browser. Tor’s intended use is to protect the personal privacy of its users, as well as their freedom and ability to conduct confidential communication by keeping their Internet activities unmonitored. Using Tor makes it more difficult to trace Internet activity to the user: this includes “visits to Web sites, online posts, instant messages, and other communication forms”. Tor directs Internet traffic through a free, worldwide, volunteer overlay network consisting of more than seven thousand relays to conceal a user’s location and usage from anyone conducting network surveillance or traffic analysis. Tor - Tor is a free and open-source software for enabling anonymous communication. Their implementations may involve specialized hardware, software, or a combination. Virtual machines are based on computer architectures and provide functionality of a physical computer. Virtual Machine - In computing, a virtual machine (VM) is an emulation of a computer system. It was developed by Mati Aharoni and Devon Kearns of Offensive Security. Kali Linux has over 600 preinstalled penetration-testing programs, including Armitage (a graphical cyber attack management tool), Nmap (a port scanner), Wireshark (a packet analyzer), John the Ripper (a password cracker), Aircrack-ng (a software suite for penetration-testing wireless LANs), Burp suite and OWASP ZAP web application security scanners. Kali - Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing.

So, what will we be talking about? A quick glossary:
