

That should cause the Webshield to trace http requests using the 9050 port but, as I reported yesterday, doing that caused every browse request from (the torpark installed) Firefox to timeout.

I did that with the port 9050 in the redirect list for Webshield. In the Webshield it is possible (as I did) to uncheck the "Ignore local communications" box. The port 9050 is not used for any external communications by tor it is purely the internal (that's what localhost means) port associated with the SOCKS host proxy set up in the customized Firefox. The Webshield is set up, by default, to not trace any internal communications of the system. Using the OptinProcess for the tor programs is not very useful, the whole point of the tor programs is to encrypt the http transactions to make them completely unreadable by anyone and any other program. It will cause avast to scan (as I discovered in my testing yesterday and as cshinn101 reports) the few http accesses made by the tor programs in obtaining status information on the tor network and the preliminary setting up of the tor "circuit". I have carefully read Martosurf's post and I very much regret to say that I believe, exactly as described, it will be completely ineffective in causing avast to scan any of the http activity issued by the customized version of Firefox. Please check it by yourselves an put back your own experiences in this topic. detected by avast! could get thru protection!!

voila! no single dialer, trojan, malware, etc. I then put north to some questionable websites to check if this was working and. To the avast4.ini file located in the C:\PROGRAM FILES\ALWIL SOFTWARE\AVAST4\DATA folder (c:\archivos de programa\alwil software\data folder for you spanish speaking people ) OptinProcess=OperaUSB.exe, Opera.efe, op.com, torpark.exe, tor.exe, torcircuits.exe So, I found that if you set avast! correctly it can scan Torpark traffic like any other common browser.įor me to work, I just added (check bold) I first get curious about Torkpark when I read this topìc because I was using -until that time- Vidalia-Tor-Privoxy bundle with Opera 9 USB, switching between normal conections and proxies ones via F12 hotkey.īut Torpark really took my attention and I decided to investigate it a little. Hello, first of all greetz to all forum supporters, specially szc and alanrf for his hard work researching for this topic In my scan of the forum I did not see any reference to such a request. It might well be worth asking there for advice on using torpark so that an antivirus like avast can scan the http responses. The torpark developer has a forum dedicated to support of the function. Perhaps there are others familiar with SOCKS host proxy use who might have more effective suggestions. However that just resulted in every browser request being timed out. To see if avast could trace the http requests to localhost:9050 I added the port to the list of redirects in the Webshield and unchecked the "Ignore local traffic" box. It appears that the http requests from Firefox are then routed via the proxy to tor.exe which encrypts it and launches it into the anonymizing "circuit" that has been set up already. I confess at this point that I am not familiar with SOCKS host proxy use. However it is set up to use a SOCKS host (v5) proxy to localhost:9050.
Avast webshield use stream filter portable#
This is basically the current production version of portable Firefox. Once the tor "circuit" has been established the customized version of Firefox is started. the web request is finally decoded at an exit server and passed to the intended destination bearing no trace of the originating IP address. It first uses tor.exe to set up a "circuit" or route through the network of tor servers that transfer web connections that are encrypted through a maze of servers. The program is initiated by executing the process torpark.exe - this process is not a browser it is used to initiate the browsing environment.
Avast webshield use stream filter Pc#
When the USB device is removed no data is left on the PC at all to indicate it was ever used. It is intended for use with such devices as a USB keychain where it can be loaded, the USB device plugged in to a PC and the package used for anonymous web browsing. It consists of a strictly contained implementation of a customized version of (portable) Firefox along with the web traffic anonymizer function tor. I installed torpark to get a better idea of how it works.
