{"id":47371,"date":"2023-04-26T02:01:38","date_gmt":"2023-04-25T18:01:38","guid":{"rendered":"http:\/\/lrxjmw.cn\/?p=47371"},"modified":"2023-04-26T02:01:38","modified_gmt":"2023-04-25T18:01:38","slug":"six-security-operating-system","status":"publish","type":"post","link":"https:\/\/lrxjmw.cn\/six-security-operating-system.html","title":{"rendered":"\u76d8\u70b96\u5927\u5b89\u5168\u64cd\u4f5c\u7cfb\u7edf"},"content":{"rendered":"
\u5bfc\u8bfb<\/td>\n | \u5b89\u5168\u64cd\u4f5c\u7cfb\u7edf\u662f\u6307\u8ba1\u7b97\u673a\u4fe1\u606f\u7cfb\u7edf\u5728\u81ea\u4e3b\u8bbf\u95ee\u63a7\u5236\u3001\u5f3a\u5236\u8bbf\u95ee\u63a7\u5236\u3001\u6807\u8bb0\u3001\u8eab\u4efd\u9274\u522b\u3001\u5ba2\u4f53\u91cd\u7528\u3001\u5ba1\u8ba1\u3001\u6570\u636e\u5b8c\u6574\u6027\u3001\u9690\u853d\u4fe1\u9053\u5206\u6790\u3001\u53ef\u4fe1\u8def\u5f84\u3001\u53ef\u4fe1\u6062\u590d\u7b49\u5341\u4e2a\u65b9\u9762\u6ee1\u8db3\u76f8\u5e94\u7684\u5b89\u5168\u6280\u672f\u8981\u6c42\u3002\u4e0b\u9762\u5c31\u4ecb\u7ecd\u51e0\u6b3e\u5b89\u5168\u7684\u64cd\u4f5c\u7cfb\u7edf\uff01<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n 1.whonix<\/strong><\/div>\n <\/p>\n Whonix\u662f\u4e13\u4e3a\u9ad8\u7ea7\u5b89\u5168\u548c\u9690\u79c1\u8bbe\u8ba1\u7684\u684c\u9762\u64cd\u4f5c\u7cfb\u7edf\u3002\u5b83\u73b0\u5b9e\u5730\u89e3\u51b3\u653b\u51fb\uff0c\u540c\u65f6\u4fdd\u6301\u53ef\u7528\u6027\u3002\u5b83\u901a\u8fc7\u6545\u969c\u5b89\u5168\uff0c\u81ea\u52a8\u548c\u684c\u9762\u4f7f\u7528Tor\u7f51\u7edc\u4f7f\u5728\u7ebf\u533f\u540d\u6210\u4e3a\u53ef\u80fd\u3002\u4e00\u4e2a\u91cd\u65b0\u914d\u7f6e\u7684Debian\u5e93\u5728\u591a\u4e2a\u865a\u62df\u673a\u4e2d\u8fd0\u884c\uff0c\u63d0\u4f9b\u4e86\u4e00\u4e2a\u57fa\u672c\u7684\u9632\u6076\u610f\u8f6f\u4ef6\u548cIP\u6cc4\u6f0f\u7684\u4fdd\u62a4\u5c42\u3002\u9884\u5b89\u88c5\u7684\u9884\u914d\u7f6e\u5e94\u7528\u7a0b\u5e8f\u53ef\u4ee5\u4f7f\u7528\uff0c\u5b89\u88c5\u5176\u4ed6\u5e94\u7528\u7a0b\u5e8f\u6216\u4e2a\u6027\u5316\u684c\u9762\u4e0d\u4f1a\u5371\u53ca\u7528\u6237\u3002Whonix\u662f\u552f\u4e00\u4e00\u4e2a\u79ef\u6781\u5f00\u53d1\u7684\u64cd\u4f5c\u7cfb\u7edf\uff0c\u8bbe\u8ba1\u7528\u4e8e\u5728\u865a\u62df\u673a\u5185\u90e8\u8fd0\u884c\u5e76\u4e0eTor\u914d\u5bf9\u3002<\/p>\n \u5b89\u88c5\u65b9\u6cd5:<\/p>\n \u2460\u4e0b\u8f7dVirtualBox\u548c\u6269\u5c55\u7a0b\u5e8f\u5305\uff1aWhonix-Workstation.ova\uff0cWhonix-Gateway.ova\u4e09\u4e2a\u6587\u4ef6\uff1b\r\n\u2461\u5b89\u88c5VirtualBox\uff0c\u52a0\u8f7d\u6269\u5c55\u7a0b\u5e8f\u5305\uff1b\u8fd0\u884c VirtualBox\uff0c\u201c\u7ba1\u7406\u201d\uff0c\u201c\u5bfc\u5165\u865a\u62df\u7535\u8111\u201d\uff0c\u628a\u4e0b\u8f7d\u7684ova\u683c\u5f0f\u6587\u4ef6\u5bfc\u5165 Virtual Box\u4e2d\uff0c\u5148\u5bfc\u5165Whonix-Gateway.ova\uff0c\u540e\u5bfc\u5165Whonix-Workstation.ova;\r\n\u2462\u542f\u52a8Whonix-Gateway\uff1b\r\n\u2463\u542f\u52a8 Whonix-Workstation\u3002<\/pre>\n |