Time
1 hour 55 minutes
Difficulty
Beginner
CEU/CPE
2

Video Transcription

00:00
Hello Peoples of the Interwebs. This is Tim Stover and welcome to the next video on our comprehensive guide to the Tor browser.
00:14
On this episode, we're taking a bit of a detour and talking about Firefox, which is very similar to tour. Then you'll see why
00:22
my name is tempest over again. Okay, Before we get much further into this course, let's look over the pre wax and there aren't any.
00:31
This video is on downloading, installing the Firefox browser and what is the private tap on doesn't make you an elite hacker.
00:38
This is your first video with me. Welcome aboard. I'll recommend going back watching the previous videos as I deal with a great set up to where we are now.
00:47
As you can read here. Basic networking is a plus, but not required. Also, you basically just haven't need and or we want to be Nona's online, especially since eyes, peas or Internet service providers Ken Log and will log all that you're doing
01:03
due to the fact we're in discussions now of the Deep Web, Dark Lab and Dark Net. I'm going to give you the proper schools, teach you how to use them and advise on how to safely navigate the deep Web dark Web dark. But that said, this is not an endorsement of going there illegally at your place of work or home.
01:22
Nor, unfortunately, if anything should happen to you, your equipment or any other possessions is cyber or myself liable. Please be careful.
01:32
Okay, so we played it with Tor a bit. This is Fire Fox. We're going to download, install and talk about what the Firefox
01:38
private browser does and does not.
01:42
First off, I'm using the Windows 10 p.m. On being where Workstation pro. 15.
01:47
This one is set up with the Tor browser, but no Firefox. If you think we're going to be downloading this one Firefox with EJ, you gross. No, no, we're going to be meta and download Firefox with Tour because that's how we do
02:02
my main computer most. My laptop's haven't active Firefox browser with bookmarks on it and so forth.
02:08
I actually used Firefox for most my browsing on day to day basis, honestly, so we're going to be operating, at least for the foreseeable future with this Windows 10 VM.
02:19
First things first, let's get your
02:22
Firefox browser installed and
02:25
Like I said, we're going to be using the Tor browser because I'm not touching the edge.
02:31
I think the edges a YouTube guitarist
02:35
we're using Microsoft Edge.
02:36
So that's start up tour.
02:43
Okay? And there's our tour
02:46
browser up running.
02:47
We're going to be going into search engines. And what search engines are best to use that don't track you.
02:53
Probably in the next video. We'll have time for this video. So we're going to be looking up
03:00
Firefox.
03:07
I will tell you now, Duck, Duck, Go and may have mentioned this is the last thing you believe is a really great retention because they don't track or keep logs of anything you're doing so again, browser security. Edge of chrome currently has it or not, But a lot of time to see ads and different things like
03:25
download Firefox here where you want to go with. Usually you want to go with the website of the company who created that browser, and that's gonna be your best bet in terms of downloading secure
03:37
and not tampered with
03:39
program. So we're gonna use the Mozilla the organ muscle created Firefox.
03:46
Okay, way hit. Download now.
04:00
Okay. This is what I wanted you guys to see.
04:03
This is tour. Being safe and secure
04:06
Tour cannot display this file. You need to open it with application. Some types of files can cause applications to connect to the Internet without using tour to be safe.
04:16
It's basically is telling you
04:18
that you can be tracked and it can download and run things without tour. If you're not careful, we know we're on Mozilla Network's Web sites,
04:30
so we're actually gonna be fine. So that's why you're gonna see this pop up if you're using tour to download Firefox like I am
04:39
and we're lying discounts Gonna save it
04:43
Downloads folder.
04:49
Okay, so it looks like we have it saved
05:00
and let's run the installer.
05:04
See verified Publisher. That's what you want to see.
05:36
All right, and success that's close out tour de anymore,
05:42
and we have firebox,
05:45
okay, and here's our Firefox browser. Here's a privacy notice that they share to keep things running smoothly. We complain with that in the options.
05:57
So the first thing we're going to be doing
06:00
is these three lines here take you to all of your options and add ons and so forth we're gonna play with Maddon's,
06:09
uh, in a bit.
06:12
So first, check the options. Here.
06:17
We got the usual amount of stuff of what's going on.
06:25
Home browser, Home page. We're gonna play with
06:30
here searching General play without later.
06:35
Right here we have content blocking,
06:39
which allows you to set up
06:41
to not have ah, trackers tracking you.
06:51
Firefox is very good about this. I do a lot of voice conferencing
06:56
and it will check with you before it opens up the microphone camera, etcetera through browsing through like zoom or sky bird. You know, Skype. Other programs.
07:12
Here's what meant about allowing Firefox's and
07:15
data. I don't do that. Usually
07:17
black dangerous content servers, Certificates for servers.
07:27
Awesome. Okay, let's go to
07:30
private window.
07:31
No, private browsing will not make you an elite hacker. Private tab. What does it do?
07:38
Private browsing automatically erases your browsing information such as passwords, cookies and history, leaving no trace after you in the session. Baier Fox also has content blocking, which prevents hidden trackers from collecting your data across multiple sites and slowing down your browsing. Important
07:55
Private browsing doesn't make you anonymous on the Internet,
07:59
your Internet service provider, employer or the sites themselves can still gather and will gather information about pay. Did you visit private browsing? Also doesn't protect you from key loggers or is by where that may be installed in your computer. Myth. One. Private browsing makes you anonymous on the Internet.
08:18
Like I just said, Marine reality. Private browsing does not mask your identity or activity. Online websites can still got information about your visit, even if you're not signed in, and so can instruments providers. I asked peas. If you use your device at work, your company may be able to monitor the Web sites you visit.
08:37
Or if you surf the Web at home,
08:39
your cable company or their partners may have and actually do have, in most cases, access to your browsing information.
08:48
Myth to private browsing removes all traces of your browsing activity. Finger computer. In reality, private browsing works by removing cookies, browsing history and password stored while you're browsing. Once you close your private window, if you download a file from website, it will remain on your computer,
09:07
though it will not appear in the download manager and Firefox.
09:09
Also, if you book market site while I'm private window, it will remain in your bookmark list. Myth. Three. Private browsing doesn't display any browsing history. Private browsing will by default, display visited sites and bookmarks as you type in the address bar
09:26
thes air. The Urals saved a fire fox during normal browsing. You don't want to see these adjusting. You could just d select them. Your Firefox Options, Privacy and Security panel
09:37
going Privacy and security
09:43
suggest browsing history Bookmarks. Open taps
09:50
Myth four. Private browsing will protect you from keystroke loggers and spyware. In reality, pilot browsing does not protect you from our installed in your computer. This information and more can be found at https Colin Sasha's support dot Mozilla dot or GE backslash e in
10:07
dash US.

Up Next

Guide to the Tor Browser

This is a comprehensive Tor Browser guide to getting through the mystique of the Tor Browser including, but not limited to: major misconceptions, installation, history, strengths and weaknesses, discussions on onion addresses, and ending on a comparison of the Deep Web and Dark Web.

Instructed By

Instructor Profile Image
Tim Stover
Cybersecurity Research Analyst
Instructor