Note: If you have a Windows 8 UEFI based computer or are planning to move to one, don't select the Darknet Bootable USB, as it is BIOS-based and may not work on your UEFI computer. This bootable USB does not work on Apple Mac hardware. If you have a Windows 8 (UEFI) or Apple Mac computer consider the Darknet Extreme Virtual Machine instead.
Version 1.1.3
This is a professionally configured secure USB bootable drive with Linux OS (ubuntu Desktop 12.04 LTS) and i2p (Invisible Internet Project) configured to launch automatically at startup. TrueCrypt 7.1a is installed and ready for use as is GnuPG. i2p-bote plugin (secure distributed email) is installed and running. Tor browser bundle is installed with Atlantis and Silk Road urls bookmarked. Firefox configured for secure browsing.
Version 1.1.3 now provides support for running virtual machines and virtual appliances within the Darknet Bootable USB environment using the VMware Player 4, provides the JonDo proxy and JonDoFox Firefox plugin for anonymous browsing. Using the JonDo proxy connected with Tor provides an additional layer making web surfing even more anonymous than Tor alone.
This Darknet Bootable USB has undergone an OpenVAS 4 vulnerability scan (www.openvas.org). The OpenVAS 4 Full and very deep ultimate scan configuration (adjusted for Linux) performed 11,538 different Network Vulnerability Tests (NVTs) on this system. The OpenVAS 4 scan report indicates that this Darknet Bootable USB is a LOW vulnerability risk!
The OpenVAS 4 vulnerability scan report is included on the USBs Linux Desktop and is also available upon request.
This USB is designed for those who want to quickly and easily start using the i2p network. No configuration is necessary. Just boot the USB drive and start your i2p experience.
(This bootable USB drive is for standard PC computers. Not Apple Macs.)
Added bonus! Security and anonymity books in pdf format (in the Computer Forensics ebooks folder on the Linux Desktop):
- Anonymous Security Starter Handbook
- Beware the Dangers of Metadata
- Computational Forensics
- Computer-Aided Forensic Facial Comparison
- Computer and Intrusion Forensics
- Computer Forensics - A Pocket Guide
- Computer Forensics Computer Crime Scene Investigation
- Computer Forensics For Dummies
- Cyber Forensics
- Digital Forensics for Network Internet and Cloud Computing
- EnCase Computer Forensics
- Forensic Computer Crime Investigation
- Forensic Computing - A Practicioners Guide
- Hacking Exposed Computer Forensics
- Handbook of Computer Crime Investigation-Forensic Tools and Technology
- Handbook of Research on Computational Forensics Digital Crime and Investigation
-Incident Response and Computer Forensics
-Incident Response and Computer Forensics Toolkit
-OpenVPN-2 Cookbook
- Privacy Protection and Computer Forensics
- Scene of the Cybercrime Computer Forensics Handbook
- The Best Damn Cybercrime and Digital Forensics Book Period
- Virtualization for Security
Buyer Stats
Comment
Rating
Freshness
5/5
Works as advertised. I'm writing this review by using it right now.
3 months ago
Buyer ID 68460060, amount $45.75, 4 months old with 16 purchases.