How does a person under surveillance safely download tor or tails in a hostile environment?

One of tor’s stated goals is to help individuals such as journalists, activists and whistleblowers protect against surveillance, and in many countries people in those lines of work or activities are usually subject to surveillance, especially targeted surveillance.

Given a scenario in which a journalist working in an environment where he is subject to active targeted surveillance, how would he safely download tor? Assume that the journalist in question is using a new computer with a freshly installed Linux distribution. In what ways could an adversary with man-in-the-middle capabilities affect or compromise the download?

Does using https to download TAILS or the distribution package manager to download tor provide enough security to protect from malicious third-parties? How can someone in this scenario safely download tor or TAILS?

can someone please tell me how can we download malware pcap in ubuntu VM in microsoft azure?

I tried to download malware pcap on ubuntu VM in microsoft azure from the putty but it is not allowing me to do so .It gives following output: Permission denied Cannot write to ‘’

can someone please tell me how can we download malware pcap in ubuntu VM in microsoft azure?

Any website from where I can download databases, articles or tips or beauty or recipes or anything?

Any website from where I can download databases, articles or tips or beauty or recipes or anything?

I am trying to find some place from where I can download databases like beauty tips database, or recipe database, or articles on different topics, or jokes databases, or anything else?
Anyone knows of any such website?

Format is no issue, MySQL, mssql, xml, csv, all ok.

Why do pop up ads automatically download .exe files?

So I was using a movie streaming website, (the ones with all the pop up ads at each click). Usually I just close the ad and nothing happens but recently when the ad pops up a .exe file is downloaded and luckily chrome stopped it as it was labelled dangerous. I’m just curious as to how a file is automatically downloaded without my permission and what I can do to prevent it?

Where can i download a benign PE dataset? or at least which website is the best candidate for crawling and downloading normal executables? [closed]

I’m planning to gather a benign dataset for my ML malware detection model

the problem I’m having is finding benign PE files, i just need a source that has a dataset of normal executables, i will scan them with VT and extract benign ones, but i cant find anything useful

if there is nothing out there, then at least what is the best website that has the potential to be useful for a PE downloader crawler? (meaning its easy to crawl and automatically download .exe files without running into problems)

also another problem of using a download website is Installers, considering most of their files are installer and i need to install the program first, is there any good solution to this? is there any AutoIT script that somehow can install all types of installers ?

(I tried looking at surveys on using ML in malware detection like [1], but seems like non of the papers have released any useful benign dataset other than simple windows files which anyone can gather and is less than 10k, and very small amounts like 1000, i need to gather a large benign dataset, more than 50,000 benign files because my malware dataset is really large)


Do you ever “download” a language?

When one “downloads” a language (say, downloading the python file, or doing apt-get ruby or something), is it always the compiler/interpreter you are downloading?

In other words, does a “language” ever exist outside of its syntax and behavioral descriptions?

Perhaps standard libraries can be written in the language itself — but other than that, would it be correct to say that we ever only “download” implementations of the language?