Search the Community
Showing results for tags 'VirtualBox'.
Found 6 results
-
ANSWERED Zerotier Ubuntu Eddie - Possible?
GhastMaster posted a topic in Troubleshooting and Problems
Hello, I am running Ubuntu 18.04 with zerotier installed and using the eddie client(network lock enabled). Is there a way to have zerotier connected? Edit: Inside or outside airVPN would be fine. -
Good Evening, I had a couple of questions about setting up a VPN with VirtualBox. I believe I have it setup properly, but thought Id ask just to be sure. (Hope this is the right place to ask...) Linux Disto: Ubuntu 16.04.3 64bit VirtualBox: 5.2.2 r119230 So, to start, I setup the VM with 4GB RAM, and 150GB of storage, and keep the network adapter attachment set to NAT(Not sure if it should be left like this). I install ubuntu as usual, and once completed, I begin by disabling IPv6 using the commands: sudo nano /etc/sysctl.conf I then add the three lines: net.ipv6.conf.all.disable_ipv6 = 1 net.ipv6.conf.default.disable_ipv6 = 1 net.ipv6.conf.lo.disable_ipv6 = 1 I then reboot and run the following command: cat /proc/sys/net/ipv6/conf/all/disable_ipv6 which replies with '1'. Success...I think. I reboot again to be sure and still see it dispayed as '1'. I download from the AIRVPN website the Linux-Debian/Ubuntu Eddie Client. I install Eddie using: sudo apt install "File Location" Successfully installs. I then notice it has 2 commands listed below in the download: wget -qO - https://eddie.website/repository/keys/eddie_maintainer_gpg.key|sudo apt-key add - This commands replies with a single line stating "OK" The next command doesnt work Deb is not a valid command: deb http://eddie.website/repository/apt stable main No biggy...probably. Afterwards, I do a quick "My IP" seach and see that both the host and guest public IPs are the same. I disable webRTC in Firefox, turn off tracking and history and rebooted the VM again. I check to make sure IPv^6 is disable in the Eddie Preferences, turn on network lock, login, and select my favorite AirVPN server. Once connect, I check with IPleak.net, and see that it connect properly. No leaks (as far as I can tell). I check my connection on my host, and it appears as normal(not connected to the VPN). With all this, I assume my VPN + VM setup is complete. The fact that my Public IP was the same kinda worries me, but it changed in the Guest OS after connecting to the VPN, so I assume it is setup properly. If anyone can confirm if this setup is valid, that would be fantastic. Thanks, That One Guy
-
Hi, I don't really know where to ask this, so I'll give a try. I'm currently using eddie 2.12.4 on W10 with virtualbox. I'm trying to set up an ubuntu server inside virtualbox and install a LAMP stack inside of the VM. I've been trying to access the server inside the VM from the host, but I have no idea on how to do that. Using standard NAT adapter on VBox I get internet access from inside the VM, but there's no way to access the server inside the VM. I would ideally have internet access form inside the VM and be able to locally access the VM without exposing it to the internet. Any suggestion? I'm happy to give more details on my setup. Cheers!
-
VIRTUAL MACHINES AND VPN This is a quick short guide to anyone wanting to use VPN over a virtual machine, and also how to use TOR and VPN in a virtual machine. REQUIREMENTS 1. Virtualization software such as: Oracle VM Virtualbox (Free) https://www.virtualbox.org/ VM Ware Workstation (Proffesional Software) http://www.vmware.com/uk/products/workstation.html Windows Virtual PC (Freeware but can only install systems for Windows XP and up) https://www.microsoft.com/en-us/download/details.aspx?id=3702 These are the three most popular options for virtualization software. I personally recommend using Virtualbox if you don't want to pay a lot of money for VM Ware, although it is packed with features and is probably the most advanced virtualization software on the market, hence why it is used by professionals and large companies. 2. An ISO image of the operating system you'd like to use. If you want general purpose virtualization, such as testing applications, I recommend Windows. If you want to use TOR, refer to the TOR section down below. 3. A decent computer. What you will be basically doing is running a computer inside your computer. Yeah I know, Inception, right? Anyway, you should have a decent computer for this, and I recommend minimum of 8gb of RAM. You should also have a decent CPU as it will also affect the performance of the virtual machine. 4. A VPN. If you are on this forum you should be using Air, but this should work with any properly configured VPN. CONFIGURATION I won't go through the set up and installation of a operating system in a virtual machine in this guide because there are plenty of resources out there that explain how to do this. Make sure you are connected to your VPN on your host machine (The computer you are running the virtual machine on). Once you have your virtual machine configured, be it Linux or Windows or any operating system, the essential thing you need to do is switch your virtual machines network adapter to use NAT. It is absolutely essential that you do this, otherwise your true IP address will be used by the virtual machine. Bridged modes simply use your network adapter hardware directly, which reveals your real IP. The NAT (Network Address Translation) mode uses your host operating system's IP address, and if your VPN is configured properly it will mean the virtual machine is using the exact same VPN connection your computer is using. USING TOR IN A VIRTUAL MACHINE If you want to use TOR in a virtual machine, you have two options. You can either use the TOR Browser like in a regular computer, running it on Windows or Linux, whatever your choice may be. I personally recommend using Tails, an operating system designed for anonymity and usage of TOR. TAILS Tails is a live operating system designed for anonymity and privacy, and is released under the GNU/GPL license. All of the source code of the applications that tails uses that are not taken directly from upstream Debian packages are available on their git repositories, they have a guide here: https://tails.boum.org/contribute/git/ The great thing about tails is that it is crammed with programs and features for anonymity, security and privacy. It has email clients, tools for public keys and GPG, disguising the operating system as Windows 8 if you want to use it in public places, instant messaging clients, and many, many more. So now that you know what Tails is, you probably can't wait to get it. The best part is that it is a live operating system, and you don't need to install it. Tails homepage: https://tails.boum.org/ They also made a great installation guide if you want to install Tails to a usb stick: https://tails.boum.org/install/ To use tails in a virtual machine, they have made a guide here: https://tails.boum.org/doc/advanced_topics/virtualization/virtualbox/ (The steps for virtualbox in Linux are pretty much the exact same as in Windows) MAKE SURE YOU USE NAT IN THE TAILS VIRTUAL MACHINE Hope you found this guide useful, and don't forget to send it to friends to help them use the internet privately, and securely
-
Basically BitBox (Browser in the Box) is a VirtualBox VM with a reduced Debian Linux installation in which a Firefox or Chrome browser is started directly after it's launch. The developer company Sirrix AG is based in Saarbrücken, Germany, and didn't intend to provide maximum anonymity. Instead, they focused on maximum security. You can easily install your favorite anonymity addons and browse (more or less) secure and (more or less) anonymous. BitBox on sirrix.com BitBox download from sirrix.com Video about BitBox by german YouTuber SemperVideo
-
I thought I would pose this question here as I cannot find a clean answer searching online. I run AirVPN via my Tomato router and it works great. I have a computer on my LAN that serves as a host for a VirtualBox guest VM that runs my torrent client. Both the host computer and guest VM run Windows 7. I would like to allow the guest VM to only have Internet access and have no access at all to either the host computer or the rest of the LAN. Does anyone know how I would do that? Much thanks!