-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

An Ethical Guide to Cyber Anonymity
By :

We discussed how we can create a virtual machine with proper network configuration in Chapter 8, Understanding the Scope of Access. Once you have created a virtual machine, it can be used for multiple purposes. Remember that virtual machines also work like physical machines on a network. When you check your virtual machine from the network perspective, there is not much difference between the physical machine and the virtual machine. Both will have IP addresses assigned, run an operating system, and have applications installed. When we concentrate on the privacy factor, it provides the advantage that we can revert the virtual machine to a previous state whenever we want, or we can simply reset the virtual machine every time we need to. It will look like we're using a new system every time we access the network.
Once you revert a virtual machine, all the trackers, cookies, and scripts that attackers plant will be removed from the...
Change the font size
Change margin width
Change background colour