DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Get Help
CyberMaterial
Home Tutorials

Install Tor Browser on Linux (Ubuntu, CentOS)

by Sofia V.

Reading Time: 2 mins read
in Cyber Professionals, Tutorials

Install Tor Browser on Linux (Ubuntu, CentOS AWS Workspace)

  1. Download TOR tar package from https://www.torproject.org/download/ (Linux Version)
  2. It will usually save in Downloads folder, however if you have a different settings you will have to check in which folder the package downloaded.
  3. Go to terminal and search for such folder. In my case: ‘Downloads’ folder.
//START//

$ cd /Downloads

//END//

 

  1. After that, type the following command to extract the Tor setup file’s contents. :
//START//

$ tar -xvJf tor-browser-linux64-9.0.10_en-US.tar.xz

//END//

 

    • Disclaimer: [tor-browser-linux64-9.0.10_en-US.tar.xz] is the file name. It can be different if you are located in other country or you want it to be in a different language. In my case the name is en-US because I choose that specific package.
  1. Open the Tor browser’s directory
//START//

$ cd tor-browser_language

//END//

 

    • My case:
$ cd tor-browser_en-US

//
Where language is the language tag for your selected version of Tor, then press enter.
  1. Now run Tor, type:
$ ./start-tor-browser.desktop
//

 

  1. Add Tor Browser to applications
$ ./start-tor-browser.desktop --register-app

//

 

  1. Done

 

Any questions: follow me on twitter!

Tags: AWSKali LinuxLinuxTor
ADVERTISEMENT

Related Posts

How to Harden Privacy’s Settings on Social Media

How to Harden Privacy’s Settings on Social Media

April 16, 2023
How To Secure Your Twitter Account With Google Authenticator

How To Secure Your Twitter Account With Google Authenticator

March 30, 2023
How To Block Scam Calls – Tutorial

How To Block Scam Calls – Tutorial

March 24, 2023
How to assess the security of your email?

How to assess the security of your email?

March 16, 2023

More Articles

Quotes

“I’m increasingly frustrated at the trend”

June 1, 2022
News

Twitter: open-sources algorithm

April 3, 2023
Tool

Zenmap

November 24, 2020
Alerts

CISA Adds Vulnerabilities to Catalog

September 8, 2022
Alerts

Uber security alert scam spoofs real Uber number

September 27, 2021

Ransomware attack under investigation at Howard University

September 7, 2021
Tool

GitHub Actions

March 30, 2022
Alerts

New Linux malware targets WordPress sites by exploiting 30 bugs

December 30, 2022
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.