Tor itself is perfectly safe, it is an anonymity network but it also does have it's own firefox based browser bundle that lets you download it and set it up in a simple way. Tor is a safe download but check the sha hashes and such, make sure it is the download the tor website actually meant you to get.
Just so, what does Tor do exactly?
Tor aims to conceal its users' identities and their online activity from surveillance and traffic analysis by separating identification and routing. It is an implementation of onion routing, which encrypts and then randomly bounces communications through a network of relays run by volunteers around the globe.
Removing Tor Browser from your system is simple:
- Locate your Tor Browser folder. The default location on Windows is the Desktop; on Mac OS X it is the Applications folder.
- Delete the Tor Browser folder.
- Empty your Trash.
using Tor on Windows is still less dangerous than using IE6 on Windows. ;-) The recent shellshock vulnerability shows that no operating system is truly safe. The newer the version of Windows is, the more user data it stores, and the harder it is to disable and eliminate those usage tracks.
Such addresses are not actual DNS names, and the .onion TLD is not in the Internet DNS root, but with the appropriate proxy software installed (in most cases, The TOR browser bundle), Internet programs such as Web browsers can access sites with .onion addresses by sending the request through the TOR network.
Tor Exit Nodes are the gateways where encrypted Tor traffic hits the Internet. This means an exit node can be abused to monitor Tor traffic (after it leaves the onion network). It is in the design of the Tor network that locating the source of that traffic through the network should be difficult to determine.
Such addresses are not actual DNS names, and the .onion TLD is not in the Internet DNS root, but with the appropriate proxy software installed, Internet programs such as web browsers can access sites with .onion addresses by sending the request through the network of Tor servers.
- If you are as paranoid as I am, you can go into the config of FireFox and do it yourself.
- Open a new tab in Tor Browser.
- Go to Address: “about:config” (without the address part and quotations…)
- Double Click that preset, notice it changes from True to False.
Tor relays are also referred to as "routers" or "nodes." They receive traffic on the Tor network and pass it along. Check out the Tor website for a more detailed explanation of how Tor works. There are three kinds of relays that you can run in order to help the Tor network: middle relays, exit relays, and bridges.
Tor bridges, also called Tor bridge relays, are alternative entry points to the Tor network that are not all listed publicly. Using a bridge makes it harder, but not impossible, for your Internet Service Provider to know that you are using Tor.
TCP: Typically, Tor uses TLS over TCP as its transport protocol. The well known TLS port for Tor traffic is 443. Tor commonly uses ports 9001 and 9030 for network traffic and directory information.
Internet Explorer 4.x or 5.x (Windows)
- Open the Tools menu.
- Click Internet Options…
- Click the Security tab.
- Click the Internet symbol (a globe).
- Click the Custom Level… button.
- In the Settings list, scroll down to Scripting.
- Under Active Scripting, select either Enable or Disable.
- Click OK.
- Giving the user more control over the browser.
- It Handling dates and time.
- It Detecting the user's browser and OS,
- It is light weighted.
AJAX allows web pages to be updated asynchronously by exchanging small amounts of data with the server behind the scenes. This means that it is possible to update parts of a web page, without reloading the whole page. Classic web pages, (which do not use AJAX) must reload the entire page if the content should change.