Ali, Asghar; Saeed, Malik Muhammad Saad; Raza, Muhammad Awais; Raza``, Muhammad Mohsin Ali; Supervised by Asst Prof Bilal Rauf
(MCS, 2021-07)
Proxy chains,TOR,VPNs, IP spoofing, MAC spoofing have been used by us to get to a certain level of privacy or the feeling of not being tracked. All these mentioned and many other tools are employed by both a daily normal ...