Showing 1 open source project for "privoxy"

View related business solutions
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 1

    atcacl

    Misc sysv boot scripts and wrappers for security and/or convienence

    ...Once set up the commands are; dhcp0, dhcp1, idown, torstart, and torstop. dhcp0 and dhcp1 take down the eth0 and eth1 interfaces, randomize the MACs, bring the interfaces back up, and connect with dhcp again. idown shuts the interfaces down (including wlan0, wlan1), randomizes the MACs, and takes no further action. torstart starts tor and privoxy. torstop stops tor and privoxy. These are just useful scripts to make such operations easy commands, they are a convenience tool and use other programs to do the real jobs. Also included are instructions on how to have your MAC randomized on boot.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB